Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9MgoW3Y1ti.exe

Overview

General Information

Sample name:9MgoW3Y1ti.exe
renamed because original name is a hash value
Original sample name:b5782418b0d93145d5e7d5ff762c50e3.exe
Analysis ID:1455413
MD5:b5782418b0d93145d5e7d5ff762c50e3
SHA1:8ad9d47fcd5cc8668c316f2ed8b9ce0f44b9adfb
SHA256:2364f287be72dd7aa1f3cf19ff86314a02b62f4b19792e1e06abad3567d1900c
Tags:exeSocks5Systemz
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 9MgoW3Y1ti.exe (PID: 6528 cmdline: "C:\Users\user\Desktop\9MgoW3Y1ti.exe" MD5: B5782418B0D93145D5E7D5FF762C50E3)
    • 9MgoW3Y1ti.tmp (PID: 5232 cmdline: "C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp" /SL5="$203EC,4916934,54272,C:\Users\user\Desktop\9MgoW3Y1ti.exe" MD5: 8EF7001015E126E74BC41268504CA1E2)
      • recordpadsoundrecorder32.exe (PID: 6724 cmdline: "C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe" -i MD5: 05231A29BF2470E3D5FEA74C5FD84462)
      • recordpadsoundrecorder32.exe (PID: 5068 cmdline: "C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe" -s MD5: 05231A29BF2470E3D5FEA74C5FD84462)
  • svchost.exe (PID: 5388 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
{"C2 list": ["aadolui.ru"]}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-377H9.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        SourceRuleDescriptionAuthorStrings
        00000003.00000000.2196454307.0000000000401000.00000020.00000001.01000000.00000008.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          00000004.00000000.2199461093.0000000000401000.00000020.00000001.01000000.00000008.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
              00000004.00000002.3438919346.00000000008B9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                Process Memory Space: recordpadsoundrecorder32.exe PID: 5068JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                  SourceRuleDescriptionAuthorStrings
                  4.0.recordpadsoundrecorder32.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                    3.0.recordpadsoundrecorder32.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 5388, ProcessName: svchost.exe
                      Timestamp:06/11/24-20:04:05.022218
                      SID:2049467
                      Source Port:49759
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:04:00.660933
                      SID:2049467
                      Source Port:49756
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:20.999590
                      SID:2049467
                      Source Port:49733
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:50.457825
                      SID:2049467
                      Source Port:49750
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:33.060284
                      SID:2049467
                      Source Port:49739
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:45.145687
                      SID:2049467
                      Source Port:49747
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:42.718124
                      SID:2049467
                      Source Port:49744
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:15.218492
                      SID:2049467
                      Source Port:49730
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:55.568367
                      SID:2049467
                      Source Port:49753
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:06.281713
                      SID:2049467
                      Source Port:49721
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:04:09.182356
                      SID:2049467
                      Source Port:49762
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:53.390046
                      SID:2049467
                      Source Port:49751
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:58.405789
                      SID:2049467
                      Source Port:49754
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:04:02.172905
                      SID:2049467
                      Source Port:49757
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:48.061954
                      SID:2049467
                      Source Port:49748
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:04:06.419496
                      SID:2049467
                      Source Port:49760
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:37.431894
                      SID:2049467
                      Source Port:49742
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:28.375163
                      SID:2049467
                      Source Port:49736
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:34.520546
                      SID:2049467
                      Source Port:49740
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:38.944323
                      SID:2049467
                      Source Port:49743
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:43.506708
                      SID:2049467
                      Source Port:49746
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:29.131237
                      SID:2049467
                      Source Port:49737
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:00.558791
                      SID:2049467
                      Source Port:49720
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:04:10.647905
                      SID:2049467
                      Source Port:49763
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:17.343055
                      SID:2049467
                      Source Port:49731
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:54.130080
                      SID:2049467
                      Source Port:49752
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:12.287039
                      SID:2049467
                      Source Port:49729
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:10.015867
                      SID:2049467
                      Source Port:49725
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:23.984682
                      SID:2049467
                      Source Port:49734
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:32.171182
                      SID:2049467
                      Source Port:49738
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:04:07.773090
                      SID:2049467
                      Source Port:49761
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:26.218000
                      SID:2049467
                      Source Port:49735
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:07.068331
                      SID:2049467
                      Source Port:49723
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:10.793000
                      SID:2049467
                      Source Port:49726
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:59.145572
                      SID:2049467
                      Source Port:49755
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:04:03.617994
                      SID:2049467
                      Source Port:49758
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:35.977088
                      SID:2049467
                      Source Port:49741
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:18.026242
                      SID:2049467
                      Source Port:49732
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:03:48.957781
                      SID:2049467
                      Source Port:49749
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 9MgoW3Y1ti.exeAvira: detected
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-4KSHT.tmpAvira: detection malicious, Label: ADWARE/AVI.ICLoader.jwrbl
                      Source: C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exeAvira: detection malicious, Label: HEUR/AGEN.1314993
                      Source: recordpadsoundrecorder32.exe.5068.4.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["aadolui.ru"]}
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-4KSHT.tmpReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\libeay32.dll (copy)ReversingLabs: Detection: 87%
                      Source: 9MgoW3Y1ti.exeReversingLabs: Detection: 21%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-4KSHT.tmpJoe Sandbox ML: detected
                      Source: C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0045B864 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,2_2_0045B864
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0045B918 ArcFourCrypt,2_2_0045B918
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0045B930 ArcFourCrypt,2_2_0045B930
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_10001000 ISCryptGetVersion,2_2_10001000
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_10001130 ArcFourCrypt,2_2_10001130
                      Source: is-39U3O.tmp.2.drBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_280956d0-c

                      Compliance

                      barindex
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeUnpacked PE file: 3.2.recordpadsoundrecorder32.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeUnpacked PE file: 4.2.recordpadsoundrecorder32.exe.400000.0.unpack
                      Source: 9MgoW3Y1ti.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                      Source: Binary string: d:\agent\_work\2\s\\binaries\amd64ret\bin\amd64\\msvcp140.amd64.pdb source: is-S4BNJ.tmp.2.dr
                      Source: Binary string: msvcp120.amd64.pdb source: is-DL0CV.tmp.2.dr
                      Source: Binary string: D:\Work\_\QtAV\QtAV-Desktop_Qt_5_15_1_MSVC2019_64bit\lib_win_x86_64\QtAVWidgets1.pdb++ source: is-U97AK.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtwinextras\lib\Qt5WinExtras.pdb.. source: is-823LG.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtwinextras\lib\Qt5WinExtras.pdb source: is-823LG.tmp.2.dr
                      Source: Binary string: msvcr120.amd64.pdb source: is-MH9PV.tmp.2.dr
                      Source: Binary string: d:\agent\_work\2\s\\binaries\amd64ret\bin\amd64\\msvcp140_1.amd64.pdb source: is-HD7FV.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Xml.pdb source: is-3D4M0.tmp.2.dr
                      Source: Binary string: C:\msys64\home\--\src\ffmpeg\libavdevice\avdevice-58.pdb source: is-TTPUD.tmp.2.dr
                      Source: Binary string: C:\msys64\home\--\src\ffmpeg\libavdevice\avdevice-58.pdb## source: is-TTPUD.tmp.2.dr
                      Source: Binary string: C:\msys64\home\--\src\openh264-2.0.0_x64\openh264.pdb source: is-1KIT8.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtsvg\lib\Qt5Svg.pdb** source: is-3VSKS.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5OpenGL.pdb source: is-J8S40.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5OpenGL.pdb33 source: is-J8S40.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtsvg\lib\Qt5Svg.pdb source: is-3VSKS.tmp.2.dr
                      Source: Binary string: D:\Work\_\QtAV\QtAV-Desktop_Qt_5_15_1_MSVC2019_64bit\lib_win_x86_64\QtAVWidgets1.pdb source: is-U97AK.tmp.2.dr
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0047A964 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,2_2_0047A964
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00470C84 FindFirstFileA,FindNextFileA,FindClose,2_2_00470C84
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00451668 FindFirstFileA,GetLastError,2_2_00451668
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00460594 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,2_2_00460594
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00492760 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,2_2_00492760
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0047884C FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,2_2_0047884C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00460A10 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,2_2_00460A10
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0045F008 FindFirstFileA,FindNextFileA,FindClose,2_2_0045F008
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\userJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49720 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49721 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49723 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49725 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49726 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49729 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49730 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49731 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49732 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49733 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49734 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49735 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49736 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49737 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49738 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49739 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49740 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49741 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49742 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49743 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49744 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49746 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49747 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49748 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49749 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49750 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49751 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49752 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49753 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49754 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49755 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49756 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49757 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49758 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49759 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49760 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49761 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49762 -> 94.156.8.14:80
                      Source: TrafficSnort IDS: 2049467 ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 192.168.2.6:49763 -> 94.156.8.14:80
                      Source: Malware configuration extractorURLs: aadolui.ru
                      Source: global trafficTCP traffic: 192.168.2.6:49722 -> 194.59.31.219:2023
                      Source: Joe Sandbox ViewIP Address: 94.156.8.14 94.156.8.14
                      Source: Joe Sandbox ViewIP Address: 194.59.31.219 194.59.31.219
                      Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608ff710c2e79c923c HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608ff710c2e79c923c HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownTCP traffic detected without corresponding DNS query: 194.59.31.219
                      Source: unknownUDP traffic detected without corresponding DNS query: 91.211.247.248
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B472A7 Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,_memset,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,_memset,_memset,_memset,_malloc,_memset,_strtok,_swscanf,_strtok,_free,Sleep,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_memset,_free,4_2_00B472A7
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608ff710c2e79c923c HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608ff710c2e79c923c HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1Host: aadolui.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                      Source: global trafficDNS traffic detected: DNS query: aadolui.ru
                      Source: recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.156.8.14/
                      Source: recordpadsoundrecorder32.exe, 00000004.00000002.3445138665.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3445876972.0000000003410000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3445676449.0000000003354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.156.8.14/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f499
                      Source: recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.156.8.14/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0
                      Source: is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                      Source: is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
                      Source: is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                      Source: is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                      Source: is-PU0LK.tmp.2.drString found in binary or memory: http://lame.sf.net
                      Source: is-PU0LK.tmp.2.drString found in binary or memory: http://lame.sf.net32bits64bits
                      Source: is-PU0LK.tmp.2.drString found in binary or memory: http://lame.sf.netB
                      Source: is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drString found in binary or memory: http://ocsp.sectigo.com0
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://ocsp.thawte.com0
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://ocsps.ssl.com0
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://ocsps.ssl.com0?
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://ocsps.ssl.com0Q
                      Source: is-3D4M0.tmp.2.drString found in binary or memory: http://qt-project.org/xml/features/report-start-end-entity
                      Source: is-3D4M0.tmp.2.drString found in binary or memory: http://qt-project.org/xml/features/report-whitespace-only-CharData
                      Source: is-U97AK.tmp.2.drString found in binary or memory: http://qtav.org2
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://t2.symcb.com0
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://tl.symcb.com/tl.crl0
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://tl.symcb.com/tl.crt0
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://tl.symcd.com0&
                      Source: is-3D4M0.tmp.2.drString found in binary or memory: http://trolltech.com/xml/features/report-start-end-entity
                      Source: is-3D4M0.tmp.2.drString found in binary or memory: http://trolltech.com/xml/features/report-whitespace-only-CharData
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                      Source: 9MgoW3Y1ti.tmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 9MgoW3Y1ti.tmp.0.dr, is-VS29P.tmp.2.drString found in binary or memory: http://www.innosetup.com/
                      Source: 9MgoW3Y1ti.exe, 00000000.00000003.2172810157.00000000020A1000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.exe, 00000000.00000002.3438960879.00000000020A1000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.exe, 00000000.00000003.2172716859.0000000002350000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000003.2175399806.0000000003100000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000003.2175492186.0000000002128000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3439045776.000000000061D000.00000004.00000020.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3439620387.0000000002128000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mpegla.com
                      Source: 9MgoW3Y1ti.exe, 00000000.00000003.2173371991.0000000002350000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.exe, 00000000.00000003.2173880239.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 9MgoW3Y1ti.tmp.0.dr, is-VS29P.tmp.2.drString found in binary or memory: http://www.remobjects.com/ps
                      Source: 9MgoW3Y1ti.exe, 00000000.00000003.2173371991.0000000002350000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.exe, 00000000.00000003.2173880239.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 9MgoW3Y1ti.tmp.0.dr, is-VS29P.tmp.2.drString found in binary or memory: http://www.remobjects.com/psU
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
                      Source: is-3D4M0.tmp.2.drString found in binary or memory: http://xml.org/sax/features/namespace-prefixes
                      Source: is-3D4M0.tmp.2.drString found in binary or memory: http://xml.org/sax/features/namespaces
                      Source: is-3D4M0.tmp.2.drString found in binary or memory: http://xml.org/sax/features/namespaceshttp://xml.org/sax/features/namespace-prefixeshttp://trolltech
                      Source: is-39U3O.tmp.2.drString found in binary or memory: https://curl.haxx.se/V
                      Source: is-39U3O.tmp.2.drString found in binary or memory: https://curl.haxx.se/docs/copyright.htmlD
                      Source: is-39U3O.tmp.2.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
                      Source: is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drString found in binary or memory: https://sectigo.com/CPS0
                      Source: is-4KSHT.tmp.2.drString found in binary or memory: https://www.ssl.com/repository0
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: https://www.thawte.com/cps0/
                      Source: is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drString found in binary or memory: https://www.thawte.com/repository0W
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0042EEF4 NtdllDefWindowProc_A,2_2_0042EEF4
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00423AF4 NtdllDefWindowProc_A,2_2_00423AF4
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00412548 NtdllDefWindowProc_A,2_2_00412548
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00455800 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,2_2_00455800
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00473F28 NtdllDefWindowProc_A,2_2_00473F28
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0042E6DC: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,2_2_0042E6DC
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_0040936C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0040936C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00453FD0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_00453FD0
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_004083300_2_00408330
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0046C5C42_2_0046C5C4
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00434CFC2_2_00434CFC
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0047B5CE2_2_0047B5CE
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00463B8C2_2_00463B8C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004822A02_2_004822A0
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004884442_2_00488444
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004444A42_2_004444A4
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0045C87C2_2_0045C87C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004308A02_2_004308A0
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00444B9C2_2_00444B9C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00444FA82_2_00444FA8
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004813C82_2_004813C8
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0043D7842_2_0043D784
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004598502_2_00459850
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00465BDC2_2_00465BDC
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0042FD302_2_0042FD30
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00443EFC2_2_00443EFC
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00433FF82_2_00433FF8
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 3_2_004010513_2_00401051
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 3_2_00401C263_2_00401C26
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 3_2_00406C873_2_00406C87
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_004010514_2_00401051
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00401C264_2_00401C26
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00406C874_2_00406C87
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B4F0284_2_00B4F028
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B5E1FD4_2_00B5E1FD
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B584B24_2_00B584B2
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B5ACAA4_2_00B5ACAA
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B654104_2_00B65410
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B5DD094_2_00B5DD09
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B64E994_2_00B64E99
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B59EF44_2_00B59EF4
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B62E244_2_00B62E24
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B5E6154_2_00B5E615
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5OpenGL.dll (copy) 7623B596CFD989413FEA2FE355607B029EF8E64067275CBF81863688128738B0
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00405964 appears 103 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00406A2C appears 38 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 0045618C appears 68 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00403400 appears 59 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00455F80 appears 95 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00451F4C appears 88 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 0040785C appears 43 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00408B74 appears 45 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00403494 appears 84 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00445808 appears 45 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00445AD8 appears 59 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00403684 appears 211 times
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: String function: 00433F10 appears 32 times
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: String function: 00B653A0 appears 138 times
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: String function: 00B58B50 appears 37 times
                      Source: 9MgoW3Y1ti.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                      Source: 9MgoW3Y1ti.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                      Source: 9MgoW3Y1ti.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
                      Source: 9MgoW3Y1ti.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                      Source: 9MgoW3Y1ti.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                      Source: 9MgoW3Y1ti.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                      Source: is-VS29P.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                      Source: is-VS29P.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
                      Source: is-VS29P.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                      Source: is-VS29P.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                      Source: is-VS29P.tmp.2.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                      Source: is-PU0LK.tmp.2.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                      Source: 9MgoW3Y1ti.exe, 00000000.00000003.2173371991.0000000002350000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs 9MgoW3Y1ti.exe
                      Source: 9MgoW3Y1ti.exe, 00000000.00000003.2173880239.00000000020A8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs 9MgoW3Y1ti.exe
                      Source: 9MgoW3Y1ti.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                      Source: recordpadsoundrecorder32.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: _RegDLL.tmp.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: is-4KSHT.tmp.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: UID Finder 6.11.66.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@8/49@1/2
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B50870 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,4_2_00B50870
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_0040936C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0040936C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00453FD0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_00453FD0
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004547F8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,2_2_004547F8
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: CreateServiceA,3_2_00402588
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: CreateServiceA,4_2_0040D117
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00409AD0 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409AD0
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 3_2_00402299 StartServiceCtrlDispatcherA,3_2_00402299
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 3_2_00402299 StartServiceCtrlDispatcherA,3_2_00402299
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00402299 StartServiceCtrlDispatcherA,4_2_00402299
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound RecorderJump to behavior
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeFile created: C:\Users\user\AppData\Local\Temp\is-O879I.tmpJump to behavior
                      Source: Yara matchFile source: 4.0.recordpadsoundrecorder32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.recordpadsoundrecorder32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000000.2196454307.0000000000401000.00000020.00000001.01000000.00000008.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.2199461093.0000000000401000.00000020.00000001.01000000.00000008.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-377H9.tmp, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe, type: DROPPED
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: 9MgoW3Y1ti.exeReversingLabs: Detection: 21%
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeFile read: C:\Users\user\Desktop\9MgoW3Y1ti.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\9MgoW3Y1ti.exe "C:\Users\user\Desktop\9MgoW3Y1ti.exe"
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeProcess created: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp "C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp" /SL5="$203EC,4916934,54272,C:\Users\user\Desktop\9MgoW3Y1ti.exe"
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe "C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe" -i
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe "C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe" -s
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeProcess created: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp "C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp" /SL5="$203EC,4916934,54272,C:\Users\user\Desktop\9MgoW3Y1ti.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe "C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe" -iJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe "C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe" -sJump to behavior
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: shfolder.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: msacm32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: winmmbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: winmmbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: explorerframe.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: sfc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpWindow found: window name: TMainFormJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: 9MgoW3Y1ti.exeStatic file information: File size 5167185 > 1048576
                      Source: Binary string: d:\agent\_work\2\s\\binaries\amd64ret\bin\amd64\\msvcp140.amd64.pdb source: is-S4BNJ.tmp.2.dr
                      Source: Binary string: msvcp120.amd64.pdb source: is-DL0CV.tmp.2.dr
                      Source: Binary string: D:\Work\_\QtAV\QtAV-Desktop_Qt_5_15_1_MSVC2019_64bit\lib_win_x86_64\QtAVWidgets1.pdb++ source: is-U97AK.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtwinextras\lib\Qt5WinExtras.pdb.. source: is-823LG.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtwinextras\lib\Qt5WinExtras.pdb source: is-823LG.tmp.2.dr
                      Source: Binary string: msvcr120.amd64.pdb source: is-MH9PV.tmp.2.dr
                      Source: Binary string: d:\agent\_work\2\s\\binaries\amd64ret\bin\amd64\\msvcp140_1.amd64.pdb source: is-HD7FV.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Xml.pdb source: is-3D4M0.tmp.2.dr
                      Source: Binary string: C:\msys64\home\--\src\ffmpeg\libavdevice\avdevice-58.pdb source: is-TTPUD.tmp.2.dr
                      Source: Binary string: C:\msys64\home\--\src\ffmpeg\libavdevice\avdevice-58.pdb## source: is-TTPUD.tmp.2.dr
                      Source: Binary string: C:\msys64\home\--\src\openh264-2.0.0_x64\openh264.pdb source: is-1KIT8.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtsvg\lib\Qt5Svg.pdb** source: is-3VSKS.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5OpenGL.pdb source: is-J8S40.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5OpenGL.pdb33 source: is-J8S40.tmp.2.dr
                      Source: Binary string: C:\Users\qt\work\qt\qtsvg\lib\Qt5Svg.pdb source: is-3VSKS.tmp.2.dr
                      Source: Binary string: D:\Work\_\QtAV\QtAV-Desktop_Qt_5_15_1_MSVC2019_64bit\lib_win_x86_64\QtAVWidgets1.pdb source: is-U97AK.tmp.2.dr

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeUnpacked PE file: 3.2.recordpadsoundrecorder32.exe.400000.0.unpack .text:ER;.bhead8:R;.data:W;.rsrc:R;.chead8:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeUnpacked PE file: 4.2.recordpadsoundrecorder32.exe.400000.0.unpack .text:ER;.bhead8:R;.data:W;.rsrc:R;.chead8:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeUnpacked PE file: 3.2.recordpadsoundrecorder32.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeUnpacked PE file: 4.2.recordpadsoundrecorder32.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00447F60 LoadLibraryExA,LoadLibraryA,GetProcAddress,2_2_00447F60
                      Source: recordpadsoundrecorder32.exe.2.drStatic PE information: section name: .bhead8
                      Source: recordpadsoundrecorder32.exe.2.drStatic PE information: section name: .chead8
                      Source: is-S4BNJ.tmp.2.drStatic PE information: section name: .didat
                      Source: is-1KIT8.tmp.2.drStatic PE information: section name: .rodata
                      Source: is-PU0LK.tmp.2.drStatic PE information: section name: _RDATA
                      Source: is-4KSHT.tmp.2.drStatic PE information: section name: .vcp1208
                      Source: UID Finder 6.11.66.exe.3.drStatic PE information: section name: .bhead8
                      Source: UID Finder 6.11.66.exe.3.drStatic PE information: section name: .chead8
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00406518 push 00406555h; ret 0_2_0040654D
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_0040C024 push cs; retn 0000h0_2_0040C02F
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00408028 push ecx; mov dword ptr [esp], eax0_2_0040802D
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00408E5C push 00408E8Fh; ret 0_2_00408E87
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004098B4 push 004098F1h; ret 2_2_004098E9
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00456228 push 00456260h; ret 2_2_00456258
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004062CC push ecx; mov dword ptr [esp], eax2_2_004062CD
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0045C574 push ecx; mov dword ptr [esp], eax2_2_0045C579
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00410640 push ecx; mov dword ptr [esp], edx2_2_00410645
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0040A6C8 push esp; retf 2_2_0040A6D1
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0047E6EC push 0047E7CAh; ret 2_2_0047E7C2
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00412898 push 004128FBh; ret 2_2_004128F3
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004308A0 push ecx; mov dword ptr [esp], eax2_2_004308A5
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00442E74 push ecx; mov dword ptr [esp], ecx2_2_00442E78
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00450F04 push 00450F37h; ret 2_2_00450F2F
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0040CF98 push ecx; mov dword ptr [esp], edx2_2_0040CF9A
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0047323C push ecx; mov dword ptr [esp], edx2_2_0047323D
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0040546D push eax; ret 2_2_004054A9
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0040F4F8 push ecx; mov dword ptr [esp], edx2_2_0040F4FA
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0040553D push 00405749h; ret 2_2_00405741
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004055BE push 00405749h; ret 2_2_00405741
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0040563B push 00405749h; ret 2_2_00405741
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004056A0 push 00405749h; ret 2_2_00405741
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00457A94 push 00457AD8h; ret 2_2_00457AD0
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00419B98 push ecx; mov dword ptr [esp], ecx2_2_00419B9D
                      Source: recordpadsoundrecorder32.exe.2.drStatic PE information: section name: .text entropy: 7.76464029877587
                      Source: is-4KSHT.tmp.2.drStatic PE information: section name: .text entropy: 7.694137885769827
                      Source: UID Finder 6.11.66.exe.3.drStatic PE information: section name: .text entropy: 7.76464029877587

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive03_2_00401A4F
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive04_2_00401A4F
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive04_2_00B4F851
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-VS29P.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-S4BNJ.tmpJump to dropped file
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeFile created: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-PU0LK.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\libeay32.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_setup64.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp120.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp140.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-3D4M0.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_RegDLL.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-4KSHT.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\unins000.exe (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-HD7FV.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-U97AK.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\libmp3lame.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-MH9PV.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5OpenGL.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp140_1.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-J8S40.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\mousehelper.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-EMQ3A.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-823LG.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_iscrypt.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5Svg.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-TTPUD.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5Xml.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeFile created: C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-39U3O.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5WinExtras.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_shfoldr.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\avdevice-58.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-3VSKS.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcr120.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-DL0CV.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\libcurl.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\openh264.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-1KIT8.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile created: C:\Users\user\AppData\Local\RecordPad Sound Recorder\QtAVWidgets1.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeFile created: C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive03_2_00401A4F
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive04_2_00401A4F
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive04_2_00B4F851
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 3_2_00402299 StartServiceCtrlDispatcherA,3_2_00402299
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00423B7C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,2_2_00423B7C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00423B7C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,2_2_00423B7C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0047E0A8 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,2_2_0047E0A8
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0042414C IsIconic,SetActiveWindow,SetFocus,2_2_0042414C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00424104 IsIconic,SetActiveWindow,2_2_00424104
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004182F4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,2_2_004182F4
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004227CC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,2_2_004227CC
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00417508 IsIconic,GetCapture,2_2_00417508
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00417C40 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,2_2_00417C40
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00417C3E IsIconic,SetWindowPos,2_2_00417C3E
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0044B08C LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_0044B08C
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_00401B4B
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,4_2_00401B4B
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,4_2_00B4F955
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeWindow / User API: threadDelayed 1330Jump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeWindow / User API: threadDelayed 8571Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-VS29P.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-S4BNJ.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-PU0LK.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\libeay32.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_setup64.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp120.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp140.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_RegDLL.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-3D4M0.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-4KSHT.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\unins000.exe (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-U97AK.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\libmp3lame.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-HD7FV.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-MH9PV.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5OpenGL.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp140_1.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-J8S40.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\mousehelper.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-EMQ3A.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-823LG.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_iscrypt.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5Svg.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5Xml.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-TTPUD.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-39U3O.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5WinExtras.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_shfoldr.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\avdevice-58.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-3VSKS.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcr120.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-DL0CV.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\libcurl.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\openh264.dll (copy)Jump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-1KIT8.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\RecordPad Sound Recorder\QtAVWidgets1.dll (copy)Jump to dropped file
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-6444
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-3205
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe TID: 4596Thread sleep count: 1330 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe TID: 4596Thread sleep time: -2660000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe TID: 4364Thread sleep count: 41 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe TID: 4364Thread sleep time: -2460000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe TID: 4596Thread sleep count: 8571 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe TID: 4596Thread sleep time: -17142000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0047A964 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,2_2_0047A964
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00470C84 FindFirstFileA,FindNextFileA,FindClose,2_2_00470C84
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00451668 FindFirstFileA,GetLastError,2_2_00451668
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00460594 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,2_2_00460594
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00492760 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,2_2_00492760
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0047884C FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,2_2_0047884C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00460A10 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,2_2_00460A10
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0045F008 FindFirstFileA,FindNextFileA,FindClose,2_2_0045F008
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00409A14 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409A14
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeThread delayed: delay time: 60000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\userJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                      Source: recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000B37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                      Source: recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000B37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeAPI call chain: ExitProcess graph end nodegraph_0-6302
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeAPI call chain: ExitProcess graph end nodegraph_3-3467
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeAPI call chain: ExitProcess graph end nodegraph_4-21885
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B6016E RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,4_2_00B6016E
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B6016E RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,4_2_00B6016E
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00447F60 LoadLibraryExA,LoadLibraryA,GetProcAddress,2_2_00447F60
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B46487 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,4_2_00B46487
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B594D8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00B594D8
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_004739C4 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,2_2_004739C4
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_0045B29C GetVersion,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,AllocateAndInitializeSid,GetLastError,LocalFree,2_2_0045B29C
                      Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exeCode function: 4_2_00B5801D cpuid 4_2_00B5801D
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: GetLocaleInfoA,0_2_0040515C
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: GetLocaleInfoA,0_2_004051A8
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: GetLocaleInfoA,2_2_004084D0
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: GetLocaleInfoA,2_2_0040851C
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00456D8C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,2_2_00456D8C
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
                      Source: C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmpCode function: 2_2_00453F88 GetUserNameA,2_2_00453F88
                      Source: C:\Users\user\Desktop\9MgoW3Y1ti.exeCode function: 0_2_00405C44 GetVersionExA,0_2_00405C44

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3438919346.00000000008B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: recordpadsoundrecorder32.exe PID: 5068, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3438919346.00000000008B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: recordpadsoundrecorder32.exe PID: 5068, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Exploitation for Privilege Escalation
                      1
                      Deobfuscate/Decode Files or Information
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      2
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts2
                      Service Execution
                      4
                      Windows Service
                      1
                      DLL Side-Loading
                      3
                      Obfuscated Files or Information
                      LSASS Memory1
                      Account Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      Bootkit
                      1
                      Access Token Manipulation
                      22
                      Software Packing
                      Security Account Manager3
                      File and Directory Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook4
                      Windows Service
                      1
                      DLL Side-Loading
                      NTDS35
                      System Information Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
                      Process Injection
                      1
                      Masquerading
                      LSA Secrets141
                      Security Software Discovery
                      SSHKeylogging112
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials21
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Access Token Manipulation
                      DCSync11
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                      Process Injection
                      Proc Filesystem3
                      System Owner/User Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Bootkit
                      /etc/passwd and /etc/shadow1
                      Remote System Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                      System Network Configuration Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      9MgoW3Y1ti.exe21%ReversingLabsWin32.Trojan.Privateloader
                      9MgoW3Y1ti.exe100%AviraHEUR/AGEN.1332570
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-4KSHT.tmp100%AviraADWARE/AVI.ICLoader.jwrbl
                      C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exe100%AviraHEUR/AGEN.1314993
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-4KSHT.tmp100%Joe Sandbox ML
                      C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5OpenGL.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5Svg.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5WinExtras.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5Xml.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\QtAVWidgets1.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\avdevice-58.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-1KIT8.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-39U3O.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-3D4M0.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-3VSKS.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-4KSHT.tmp88%ReversingLabsWin32.PUA.IcLoader
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-823LG.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-DL0CV.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-EMQ3A.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-HD7FV.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-J8S40.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-MH9PV.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-PU0LK.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-S4BNJ.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-TTPUD.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-U97AK.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-VS29P.tmp3%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\libcurl.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\libeay32.dll (copy)88%ReversingLabsWin32.PUA.IcLoader
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\libmp3lame.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\mousehelper.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp120.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp140.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcp140_1.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\msvcr120.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\openh264.dll (copy)0%ReversingLabs
                      C:\Users\user\AppData\Local\RecordPad Sound Recorder\unins000.exe (copy)3%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_iscrypt.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_setup64.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-M9SH4.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp3%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.thawte.com00%URL Reputationsafe
                      http://94.156.8.14/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d0%Avira URL Cloudsafe
                      http://lame.sf.net32bits64bits0%Avira URL Cloudsafe
                      http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt00%Avira URL Cloudsafe
                      http://www.innosetup.com/0%Avira URL Cloudsafe
                      http://ocsps.ssl.com0?0%Avira URL Cloudsafe
                      http://xml.org/sax/features/namespaceshttp://xml.org/sax/features/namespace-prefixeshttp://trolltech0%Avira URL Cloudsafe
                      http://aadolui.ru/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608ff710c2e79c923c0%Avira URL Cloudsafe
                      http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer00%Avira URL Cloudsafe
                      http://xml.org/sax/features/namespaces0%Avira URL Cloudsafe
                      http://qt-project.org/xml/features/report-whitespace-only-CharData0%Avira URL Cloudsafe
                      http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q0%Avira URL Cloudsafe
                      http://ocsps.ssl.com00%Avira URL Cloudsafe
                      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%Avira URL Cloudsafe
                      https://curl.haxx.se/docs/http-cookies.html0%Avira URL Cloudsafe
                      http://lame.sf.netB0%Avira URL Cloudsafe
                      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%Avira URL Cloudsafe
                      http://xml.org/sax/features/namespace-prefixes0%Avira URL Cloudsafe
                      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%Avira URL Cloudsafe
                      http://qtav.org20%Avira URL Cloudsafe
                      http://crls.ssl.com/ssl.com-rsa-RootCA.crl00%Avira URL Cloudsafe
                      http://www.remobjects.com/psU0%Avira URL Cloudsafe
                      http://lame.sf.net0%Avira URL Cloudsafe
                      http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl00%Avira URL Cloudsafe
                      http://94.156.8.14/0%Avira URL Cloudsafe
                      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%Avira URL Cloudsafe
                      aadolui.ru0%Avira URL Cloudsafe
                      https://www.thawte.com/cps0/0%Avira URL Cloudsafe
                      http://crl.thawte.com/ThawteTimestampingCA.crl00%Avira URL Cloudsafe
                      https://www.thawte.com/repository0W0%Avira URL Cloudsafe
                      http://qt-project.org/xml/features/report-start-end-entity0%Avira URL Cloudsafe
                      https://curl.haxx.se/docs/copyright.htmlD0%Avira URL Cloudsafe
                      https://curl.haxx.se/V0%Avira URL Cloudsafe
                      https://www.ssl.com/repository00%Avira URL Cloudsafe
                      http://aadolui.ru/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c467910%Avira URL Cloudsafe
                      http://trolltech.com/xml/features/report-start-end-entity0%Avira URL Cloudsafe
                      http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl00%Avira URL Cloudsafe
                      http://www.mpegla.com0%Avira URL Cloudsafe
                      http://www.remobjects.com/ps0%Avira URL Cloudsafe
                      http://trolltech.com/xml/features/report-whitespace-only-CharData0%Avira URL Cloudsafe
                      http://ocsps.ssl.com0Q0%Avira URL Cloudsafe
                      http://94.156.8.14/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4990%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      aadolui.ru
                      94.156.8.14
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://aadolui.ru/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608ff710c2e79c923ctrue
                        • Avira URL Cloud: safe
                        unknown
                        aadolui.rutrue
                        • Avira URL Cloud: safe
                        unknown
                        http://aadolui.ru/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.innosetup.com/9MgoW3Y1ti.tmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 9MgoW3Y1ti.tmp.0.dr, is-VS29P.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://cert.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.cer0is-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://sectigo.com/CPS0is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drfalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drfalse
                        • URL Reputation: safe
                        unknown
                        http://lame.sf.net32bits64bitsis-PU0LK.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.thawte.com0is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drfalse
                        • URL Reputation: safe
                        unknown
                        http://qt-project.org/xml/features/report-whitespace-only-CharDatais-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://xml.org/sax/features/namespacesis-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsps.ssl.com0?is-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://94.156.8.14/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14drecordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000B2D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0is-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://xml.org/sax/features/namespaceshttp://xml.org/sax/features/namespace-prefixeshttp://trolltechis-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Qis-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://lame.sf.netBis-PU0LK.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsps.ssl.com0is-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sis-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://xml.org/sax/features/namespace-prefixesis-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://qtav.org2is-U97AK.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://curl.haxx.se/docs/http-cookies.htmlis-39U3O.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tis-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crls.ssl.com/ssl.com-rsa-RootCA.crl0is-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.remobjects.com/psU9MgoW3Y1ti.exe, 00000000.00000003.2173371991.0000000002350000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.exe, 00000000.00000003.2173880239.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 9MgoW3Y1ti.tmp.0.dr, is-VS29P.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0is-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://lame.sf.netis-PU0LK.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://94.156.8.14/recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000B19000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.thawte.com/ThawteTimestampingCA.crl0is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.thawte.com/cps0/is-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#is-EMQ3A.tmp.2.dr, is-TTPUD.tmp.2.dr, is-PU0LK.tmp.2.dr, is-U97AK.tmp.2.dr, is-1KIT8.tmp.2.dr, is-39U3O.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.thawte.com/repository0Wis-J8S40.tmp.2.dr, is-3VSKS.tmp.2.dr, is-823LG.tmp.2.dr, is-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://qt-project.org/xml/features/report-start-end-entityis-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://curl.haxx.se/docs/copyright.htmlDis-39U3O.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://curl.haxx.se/Vis-39U3O.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.ssl.com/repository0is-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://trolltech.com/xml/features/report-start-end-entityis-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.mpegla.com9MgoW3Y1ti.exe, 00000000.00000003.2172810157.00000000020A1000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.exe, 00000000.00000002.3438960879.00000000020A1000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.exe, 00000000.00000003.2172716859.0000000002350000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000003.2175399806.0000000003100000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000003.2175492186.0000000002128000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3439045776.000000000061D000.00000004.00000020.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3439620387.0000000002128000.00000004.00001000.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.remobjects.com/ps9MgoW3Y1ti.exe, 00000000.00000003.2173371991.0000000002350000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.exe, 00000000.00000003.2173880239.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, 9MgoW3Y1ti.tmp, 9MgoW3Y1ti.tmp, 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 9MgoW3Y1ti.tmp.0.dr, is-VS29P.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://trolltech.com/xml/features/report-whitespace-only-CharDatais-3D4M0.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl0is-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsps.ssl.com0Qis-4KSHT.tmp.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://94.156.8.14/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f499recordpadsoundrecorder32.exe, 00000004.00000002.3445138665.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3445876972.0000000003410000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3439366230.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, recordpadsoundrecorder32.exe, 00000004.00000002.3445676449.0000000003354000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        94.156.8.14
                        aadolui.ruBulgaria
                        43561NET1-ASBGtrue
                        194.59.31.219
                        unknownGermany
                        30823COMBAHTONcombahtonGmbHDEfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1455413
                        Start date and time:2024-06-11 20:01:08 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 7m 2s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:11
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:9MgoW3Y1ti.exe
                        renamed because original name is a hash value
                        Original Sample Name:b5782418b0d93145d5e7d5ff762c50e3.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@8/49@1/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 93%
                        • Number of executed functions: 193
                        • Number of non-executed functions: 257
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: 9MgoW3Y1ti.exe
                        TimeTypeDescription
                        14:02:40API Interceptor515960x Sleep call for process: recordpadsoundrecorder32.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        94.156.8.14awb__document__invoice__2024__04__02__000000000000004320000000000000.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                        • 94.156.8.14/tJWrHmlMQNR240.bin
                        awb_shipping_documents_bl_01_04_2024_0000000000.vbsGet hashmaliciousFormBook, GuLoader, RemcosBrowse
                        • 94.156.8.14/gKMOUQth43.bin
                        194.59.31.219tOniaJ21lj.exeGet hashmaliciousSocks5SystemzBrowse
                          asaTr3exz5.exeGet hashmaliciousSocks5SystemzBrowse
                            SvctlJEZsa.exeGet hashmaliciousSocks5SystemzBrowse
                              zcpLQDujv9.exeGet hashmaliciousSocks5SystemzBrowse
                                DMRSGfYa44.exeGet hashmaliciousSocks5SystemzBrowse
                                  J459EO4HX3.exeGet hashmaliciousSocks5SystemzBrowse
                                    6Xsre97JxM.exeGet hashmaliciousSocks5SystemzBrowse
                                      7grn4ITCaM.exeGet hashmaliciousSocks5SystemzBrowse
                                        UmMgwOUPt5.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                          V90FqClRNT.exeGet hashmaliciousSocks5SystemzBrowse
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            COMBAHTONcombahtonGmbHDEtOniaJ21lj.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 194.59.31.219
                                            asaTr3exz5.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 194.59.31.219
                                            SvctlJEZsa.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 194.59.31.219
                                            zcpLQDujv9.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 194.59.31.219
                                            DMRSGfYa44.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 194.59.31.219
                                            J459EO4HX3.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 194.59.31.219
                                            6Xsre97JxM.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 194.59.31.219
                                            7grn4ITCaM.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 194.59.31.219
                                            nerbianrat.binGet hashmaliciousUnknownBrowse
                                            • 45.153.240.73
                                            SKGHM_PE_757583588358839538539599593BeoersKnucklehead.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 194.59.31.187
                                            NET1-ASBGtOniaJ21lj.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            asaTr3exz5.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            SvctlJEZsa.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            zcpLQDujv9.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            DMRSGfYa44.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            J459EO4HX3.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            Xwt4p7gzy1.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            6Xsre97JxM.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            UL09QPJEEX.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            91fJRSNjz3.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 94.156.8.14
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5OpenGL.dll (copy)tOniaJ21lj.exeGet hashmaliciousSocks5SystemzBrowse
                                              asaTr3exz5.exeGet hashmaliciousSocks5SystemzBrowse
                                                SvctlJEZsa.exeGet hashmaliciousSocks5SystemzBrowse
                                                  zcpLQDujv9.exeGet hashmaliciousSocks5SystemzBrowse
                                                    DMRSGfYa44.exeGet hashmaliciousSocks5SystemzBrowse
                                                      J459EO4HX3.exeGet hashmaliciousSocks5SystemzBrowse
                                                        Xwt4p7gzy1.exeGet hashmaliciousSocks5SystemzBrowse
                                                          6Xsre97JxM.exeGet hashmaliciousSocks5SystemzBrowse
                                                            UL09QPJEEX.exeGet hashmaliciousSocks5SystemzBrowse
                                                              91fJRSNjz3.exeGet hashmaliciousSocks5SystemzBrowse
                                                                C:\Users\user\AppData\Local\RecordPad Sound Recorder\Qt5Svg.dll (copy)tOniaJ21lj.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  asaTr3exz5.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    SvctlJEZsa.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      zcpLQDujv9.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        DMRSGfYa44.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          J459EO4HX3.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            Xwt4p7gzy1.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              6Xsre97JxM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                UL09QPJEEX.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  91fJRSNjz3.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                    Process:C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):3149260
                                                                                    Entropy (8bit):6.90789109689728
                                                                                    Encrypted:false
                                                                                    SSDEEP:98304:ltFvpn2HjjeLN33Ltcq0L409R8dsZ0q1X:lt9pnAjyLN3JQR8dsp
                                                                                    MD5:05231A29BF2470E3D5FEA74C5FD84462
                                                                                    SHA1:18D4BF866691E6DEE2819367993761522E462933
                                                                                    SHA-256:B6856AE9351FB50266F4803C7630ED195BCE9A0AF8C0D00CCEAC22B7250E1DDC
                                                                                    SHA-512:DEDB877FB6A44D0E6E9485B2A00A555F0B3E9C12040C55744194BB4E270B25195B9517DA5F82E5A53B06A51F8ABB51D5D3874E70724D1A5BE8711833F9DF65D3
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\UID Finder 6.11.66\UID Finder 6.11.66.exe, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    Reputation:low
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......^..........&...............................@..........................00.........................................................@............................................................................................................text............................... ..`.bhead8.n*.......0..................@..@.data...xT...0...@...0..............@....rsrc................p..............@..@.chead8............................a.f.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):8
                                                                                    Entropy (8bit):2.0
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:tn:t
                                                                                    MD5:9F01D1BC20E8ACE51C7EC451D295E172
                                                                                    SHA1:697B17C833729699A4747F819A4C6560B2097445
                                                                                    SHA-256:1441F4A70397F6734F6F9E6691B4010B9E4374343D5B755FB9D022EFCC861AB3
                                                                                    SHA-512:BB7E4B1EFF66620CD73EF3688A20C8D4BB4B02C785BABFD793D63AA0E7DCC299074B59B804C13D02F9E55B3D497FB98B03ABF892BB2CAC4A00F9F4BD54F7AD26
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:[.hf....
                                                                                    Process:C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):4
                                                                                    Entropy (8bit):0.8112781244591328
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:y:y
                                                                                    MD5:D83A262FC46BD9C9D48FF14208EF17BC
                                                                                    SHA1:D742C6B01FE4B5D54EE43A031637753232284E8B
                                                                                    SHA-256:40D95A7C7F1655A0070DDF3CE81EB83C0E88AB92766B85E6A0BB98503896E036
                                                                                    SHA-512:21C38C9D3047923AAF00A89E5824D8B3FD8C378710856293FC3C26B88D4B73F00D9EB4C857F66B12A5943CAE59EC7644DCD6B42D0FD4A240EC20425002EADF6C
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:3...
                                                                                    Process:C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):128
                                                                                    Entropy (8bit):2.9545817380615236
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                                    MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                                    SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                                    SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                                    SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                                    Process:C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):128
                                                                                    Entropy (8bit):1.2701231977328944
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:WAmJuXDz8/:HHzc
                                                                                    MD5:0D6174E4525CFDED5DD1C9440B9DC1E7
                                                                                    SHA1:173EF30A035CE666278904625EADCFAE09233A47
                                                                                    SHA-256:458677CDF0E1A4E87D32AB67D6A5EEA9E67CB3545D79A21A0624E6BB5E1087E7
                                                                                    SHA-512:86DA96385985A1BA3D67A8676A041CA563838F474DF33D82B6ECD90C101703B30747121A6B7281E025A3C11CE28ACCEDFC94DB4E8D38E391199458056C2CD27A
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:ccddf9e705966c2f471db9..........................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):320120
                                                                                    Entropy (8bit):6.398399631689542
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:bSU6+JAfisltPzYzrIybvaEezwMckNI+STEDv4nk3ad04ZqhKTrg+COv:brAltbYzsOvaWJ
                                                                                    MD5:DB19F6E0A1BB5DB1C8D87C3FE0891136
                                                                                    SHA1:3B2DAB478A8268000EF5E4474D52CB71F9EB615E
                                                                                    SHA-256:7623B596CFD989413FEA2FE355607B029EF8E64067275CBF81863688128738B0
                                                                                    SHA-512:B328DC6D1ADE3061894BC5C50F437B732190DE3CEA6D2CDC147A9A8193EE73221937FBA24209B66226D5E4B05DFFF5A79DB8B134373D1218605BCBA6EE82A6B3
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: tOniaJ21lj.exe, Detection: malicious, Browse
                                                                                    • Filename: asaTr3exz5.exe, Detection: malicious, Browse
                                                                                    • Filename: SvctlJEZsa.exe, Detection: malicious, Browse
                                                                                    • Filename: zcpLQDujv9.exe, Detection: malicious, Browse
                                                                                    • Filename: DMRSGfYa44.exe, Detection: malicious, Browse
                                                                                    • Filename: J459EO4HX3.exe, Detection: malicious, Browse
                                                                                    • Filename: Xwt4p7gzy1.exe, Detection: malicious, Browse
                                                                                    • Filename: 6Xsre97JxM.exe, Detection: malicious, Browse
                                                                                    • Filename: UL09QPJEEX.exe, Detection: malicious, Browse
                                                                                    • Filename: 91fJRSNjz3.exe, Detection: malicious, Browse
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~@hB:!..:!..:!..3Y..2!...L..8!..aI..8!...L..,!...L..2!...L..9!...O..=!..:!..."...O../!...O..;!...O..;!..:!..;!...O..;!..Rich:!..........................PE..d....lP_.........." .....\...v......$_...................................................`..........................................5...........................,......x.......|...P...T.......................(....................p..p............................text....[.......\.................. ..`.rdata..."...p...$...`..............@..@.data...8...........................@....pdata...,..........................@..@.rsrc...............................@..@.reloc..|...........................@..B........................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):331384
                                                                                    Entropy (8bit):6.387255143196498
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:cOjmvCPMfXfCsXL0hq+SNcFxkqSj1ZBtp:fcC05tp
                                                                                    MD5:C3424F2D3D26632C341EF2F542AEA36B
                                                                                    SHA1:30640EBFF046085DBA3BD0877DE8A90886BED945
                                                                                    SHA-256:FB0BD60A7D0178C62CFD14D53B40AD47E8F68DB68B95C625723CADC1CD3A1A3E
                                                                                    SHA-512:72D9A32433DA38CFB752A67C5F903F3480871FCBD16DC5999FB970313079652CF7AEB481DA6097879B641A0E76271118C6E82406DD14C9C90C7460BA6A71BDC7
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: tOniaJ21lj.exe, Detection: malicious, Browse
                                                                                    • Filename: asaTr3exz5.exe, Detection: malicious, Browse
                                                                                    • Filename: SvctlJEZsa.exe, Detection: malicious, Browse
                                                                                    • Filename: zcpLQDujv9.exe, Detection: malicious, Browse
                                                                                    • Filename: DMRSGfYa44.exe, Detection: malicious, Browse
                                                                                    • Filename: J459EO4HX3.exe, Detection: malicious, Browse
                                                                                    • Filename: Xwt4p7gzy1.exe, Detection: malicious, Browse
                                                                                    • Filename: 6Xsre97JxM.exe, Detection: malicious, Browse
                                                                                    • Filename: UL09QPJEEX.exe, Detection: malicious, Browse
                                                                                    • Filename: 91fJRSNjz3.exe, Detection: malicious, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........O...........8...................................W............W.....W.....W.T.....<....W.....Rich...........................PE..d...z.P_.........." .........................................................@....../.....`..................................................*....... ...........1......x....0..8....N..T...................XP..(...PO...............................................text............................... ..`.rdata.............................@..@.data...............................@....pdata...1.......2..................@..@.rsrc........ ......................@..@.reloc..8....0......................@..B........................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):469624
                                                                                    Entropy (8bit):6.027128925039679
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:g814pr+wMrppkALmug7u7ozC/B4OvCH9UYHeAeBC:u9+wAkAS2j/B4BryC
                                                                                    MD5:820FFF478DC5F2C2D5F03A5DB9187FBC
                                                                                    SHA1:BD58AA8596345C837E1743617452EC7D73013F3A
                                                                                    SHA-256:3DC976E86D64881E0F37A54B5A04E903235E94D858889B1261527F0048CFBC03
                                                                                    SHA-512:1476919C5C133ACA519B9E9BE2684A85C7E669FA43942204ACDD9EC4A40577F966AD17D30A7EBD3A97A871E71178F0058966410A934822B96F0B2D7120AA43CB
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m>W.)_9.)_9.)_9. '../_9..28.+_9..2<.?_9..2=.!_9..2:.*_9.r7=.(_9.r78.%_9..18.,_9.)_8.._9..1<.&_9..19.(_9..1.(_9.)_..(_9..1;.(_9.Rich)_9.........PE..d...G.P_.........." .................................................................[....`.........................................0d...:...................p...K......x.......h....B..T...................8D..(...0C...............0...............................text...t........................... ..`.rdata.......0....... ..............@..@.data..............................@....pdata...K...p...L..................@..@.rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):213112
                                                                                    Entropy (8bit):6.331143352918189
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:V7rtKxzN2HVkkNUq3uUw8SWrBEcsGhLec956+48G+ikgyOzk1kLrTzhvt3GyY:Vr2N253eUw81rBXVevrH+mk12rTlS
                                                                                    MD5:63D91B407A350DA5CE19B5D79924B1F4
                                                                                    SHA1:45886A4018B60A5EAB7D4B743F4DF2A9A4318EDC
                                                                                    SHA-256:22B626313A535C85CE6A097571C53A6E6678A9D4BC5D0DB9F81660ADC7ED366E
                                                                                    SHA-512:FA06AB2B1AE116BC7AE93EA64D4C258A7149A23C0171C077F0919956101A22A59DD8E3F975C64073319842F01D6183253F637A0EDB514F0C02C9D88B0E65E6CF
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u..j...j...j.......j.......j.. ....j.. ....j.. ....j.. ....j..i....j...j...j..i....j..i....j..i...j...j...j..i....j..Rich.j..................PE..d....kP_.........." .........,...............................................`............`..........................................t..._...........@..........t"...*..x....P.......;..T...........................`;...............................................text............................... ..`.rdata..............................@..@.data...............................@....pdata..t".......$..................@..@.rsrc........@....... ..............@..@.reloc.......P.......&..............@..B................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):248680
                                                                                    Entropy (8bit):4.820760286569876
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:k6bBPHJr5r5C9Fg8Imnw5bR3Kklo7rbQox:kz
                                                                                    MD5:60BAB1D197D91828ED25099968F7D8C5
                                                                                    SHA1:FC8E1B3C2C98727D2D81A8E85420FA80EE655F19
                                                                                    SHA-256:F682B5AA0AF3CEE93F890EC6717F94C1AC9B75EBFF512955C6531E7CEE05D196
                                                                                    SHA-512:5B9CBB11E3FCB00FD76F595520DA4610FA37B0F1227D016D77350909846BA33AF9A32B650BB1CE9A73549DB5BF190C2205E28223D1745191B2424F6DC7327B38
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........e..6..6..6..`6..6...7..6...7..6...7..6...7..62..7..6J..7..62..7..6l..7..6..6...6l..7..6l..7..6l..6..6.d6..6l..7..6Rich..6........................PE..d...3N2c.........." ................................................................U....`..........................................&...0..(W..,.... ..................h!..............T...........................`...8............................................text...+........................... ..`.rdata..v'.......(..................@..@.data...x%....... ..................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..............................@..B........................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):135016
                                                                                    Entropy (8bit):5.674566205873397
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:GZU6fX6Kj693r/67BhRpsGmQhRJRVW8/mpI4Sx8K5aqEkmgcs8MYQJaqEkmgcs8o:GZU6qz3ERpNzhRvVoVDe1r0+
                                                                                    MD5:61CF5C843D8A31162B59C074AE74A76E
                                                                                    SHA1:123E0EACE3DD60FEF94DC96215468D22434C50FB
                                                                                    SHA-256:F51BB73407C96E4A2E3016A96A870FA4B422A8B1851477048D122CCC2D523687
                                                                                    SHA-512:AA1C3175D9A0E11341B8A2F1C5372E99E1164169C8FC71727A0FE6655878782E921FA046D6A83CA2E2C67DAE0609704442EBCFDBE985281F02DDB7E288DC718D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................2.&......<......>..................qY/....qY1....qY*.....8<............8......8=.....8?....Rich............................PE..d...F..].........." ......................................................... ......S.....`.............................................d...............................h!......\...`...8...............................p............................................text............................... ..`.rdata..t...........................@..@.data...a...........................@....pdata..............................@..@.idata..8(.......*..................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):869224
                                                                                    Entropy (8bit):6.632387605957213
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:DJf34ppw4hjg401r+iTy2mmzuF3SJciti0ZIj8UoJwCR:Dl3ypw4yN/RiF3SJdO8xJv
                                                                                    MD5:DAA904CE63B0A290111AED5E843B9368
                                                                                    SHA1:6642AD5C2622D756EB3500E7C0420E9DA7A16BB1
                                                                                    SHA-256:471BBC3FA0A98869F6791E0D1A55B38F5E360842A7CC219A6FF26030E62DBB1B
                                                                                    SHA-512:CBFD06523F1855AAF4BE2D33EB3A3A324C8D7AF4871B314AC2C165FD17F8DA6CD2F465E9405412282AAC1ED247B811A4A73D91069A324A5AEC531253AE3A4D0B
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.9d0.W70.W70.W7...73.W70.V7m.W7.M.71.W7v..7..W7v..7..W7v..7$.W7.s.7e.W70.W7'.W7.s.71.W7=..71.W7.s.71.W7Rich0.W7........PE..d......].........." .....8...........\...............................................$....`.................................................|...(....`..........x]..."..h!...p.......R..8...............................p............P..H............................text...7+.......,.................. ..`.rodata......@.......0.............. ..`.rdata..FP...P...R...<..............@..@.data... K.......&..................@....pdata..x].......^..................@..@.rsrc........`......................@..@.reloc.......p......................@..B................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):3149260
                                                                                    Entropy (8bit):6.907890912986219
                                                                                    Encrypted:false
                                                                                    SSDEEP:98304:OtFvpn2HjjeLN33Ltcq0L409R8dsZ0q1X:Ot9pnAjyLN3JQR8dsp
                                                                                    MD5:B8C44D1B376313ADD6A5EA0C87988C4A
                                                                                    SHA1:65A4348DF2B3911B43F3AC97EC90A19CB18B1120
                                                                                    SHA-256:93190F63155E68FC8BB929DE1FCDA76A799FC66EB803A20399C5D2CEE792FA54
                                                                                    SHA-512:C2F47432062377AE0D6C7D7E04B985C13EEB3511744D2F05B8C1B870FF85F3A8B3AFBC8D6D49073FC008C71C9AC1D19F1B1B5E708B3B7CBD9AAB7238161273D4
                                                                                    Malicious:false
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\is-377H9.tmp, Author: Joe Security
                                                                                    Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......^..........&...............................@..........................00.........................................................@............................................................................................................text............................... ..`.bhead8.n*.......0..................@..@.data...xT...0...@...0..............@....rsrc................p..............@..@.chead8............................a.f.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):363880
                                                                                    Entropy (8bit):6.3947346615222305
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:lieS4N0DdxBa72yNQuqped6c7Bv5ebr+U2pyQqsa3a8g+QTW:UeSyCVaiyNQAd6cV5K+Jp37W
                                                                                    MD5:460B0576549FFD1F55D717BA6E265A05
                                                                                    SHA1:65AB7E2109658102678C122D7DE603E64DCE7CC5
                                                                                    SHA-256:AAB56C21B6CEC7065882A750BECB4526B4CB5815A4AC002C2594F84FB0F5955F
                                                                                    SHA-512:666B16FF72CB847B8D141B0110BBB45AAE67D9BB01E2D6B48C7BDA61C5DC3126CCBC72627C1B93EC23B87E9427C39DC890F1E0A72E5077DC0071E5FEA1B1E3A3
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................7!.....;.....9...............>.;...Vh-.......>.......>.:....=...>.8...Rich....................PE..d.....%Y.........." .........d.......................................................L....`.........................................@........................P...7...l..h!......8.......................................p............ ...............................text...K........................... ..`.rdata....... ......................@..@.data...@....@.......(..............@....pdata...7...P...8...*..............@..@.rsrc................b..............@..@.reloc..8............h..............@..B........................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):213112
                                                                                    Entropy (8bit):6.331143352918189
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:V7rtKxzN2HVkkNUq3uUw8SWrBEcsGhLec956+48G+ikgyOzk1kLrTzhvt3GyY:Vr2N253eUw81rBXVevrH+mk12rTlS
                                                                                    MD5:63D91B407A350DA5CE19B5D79924B1F4
                                                                                    SHA1:45886A4018B60A5EAB7D4B743F4DF2A9A4318EDC
                                                                                    SHA-256:22B626313A535C85CE6A097571C53A6E6678A9D4BC5D0DB9F81660ADC7ED366E
                                                                                    SHA-512:FA06AB2B1AE116BC7AE93EA64D4C258A7149A23C0171C077F0919956101A22A59DD8E3F975C64073319842F01D6183253F637A0EDB514F0C02C9D88B0E65E6CF
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u..j...j...j.......j.......j.. ....j.. ....j.. ....j.. ....j..i....j...j...j..i....j..i....j..i...j...j...j..i....j..Rich.j..................PE..d....kP_.........." .........,...............................................`............`..........................................t..._...........@..........t"...*..x....P.......;..T...........................`;...............................................text............................... ..`.rdata..............................@..@.data...............................@....pdata..t".......$..................@..@.rsrc........@....... ..............@..@.reloc.......P.......&..............@..B................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):331384
                                                                                    Entropy (8bit):6.387255143196498
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:cOjmvCPMfXfCsXL0hq+SNcFxkqSj1ZBtp:fcC05tp
                                                                                    MD5:C3424F2D3D26632C341EF2F542AEA36B
                                                                                    SHA1:30640EBFF046085DBA3BD0877DE8A90886BED945
                                                                                    SHA-256:FB0BD60A7D0178C62CFD14D53B40AD47E8F68DB68B95C625723CADC1CD3A1A3E
                                                                                    SHA-512:72D9A32433DA38CFB752A67C5F903F3480871FCBD16DC5999FB970313079652CF7AEB481DA6097879B641A0E76271118C6E82406DD14C9C90C7460BA6A71BDC7
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........O...........8...................................W............W.....W.....W.T.....<....W.....Rich...........................PE..d...z.P_.........." .........................................................@....../.....`..................................................*....... ...........1......x....0..8....N..T...................XP..(...PO...............................................text............................... ..`.rdata.............................@..@.data...............................@....pdata...1.......2..................@..@.rsrc........ ......................@..@.reloc..8....0......................@..B........................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):2042352
                                                                                    Entropy (8bit):7.085275197144553
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:OFZD9URlmDrgBrhEci8XhP3YLd44RS6+FNbqUzUxVvqKGTZnIzudBDFPjQAr10Fu:+ZeLrXFcL0YF7pvtHkfH
                                                                                    MD5:876A839023B8F962A72D295DA7495734
                                                                                    SHA1:62A7728679BC18784B1FBF1D013F7CECE18CBEC9
                                                                                    SHA-256:A757D773DA406411FB977761F6E56F016D48D224AEDAF3D875ED4D4A9EDE6158
                                                                                    SHA-512:E1B23A2F5EC0100FF874CA075BBD0F90E9065A90FEC66861F99DF603D7AAA9DB8E8EC326710FDC11AD41D01BEFE4EA3077136127ACF613614D0D12FF23BEC6C1
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....^............................4.............@..........................@.......................................................p...3..............X............................................................................................text............................... ..`.rdata..x%.......0..................@..@.data....S.......0..................@....rsrc....@...p...@...@..............@..@.vcp1208............................a.G.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):469624
                                                                                    Entropy (8bit):6.027128925039679
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:g814pr+wMrppkALmug7u7ozC/B4OvCH9UYHeAeBC:u9+wAkAS2j/B4BryC
                                                                                    MD5:820FFF478DC5F2C2D5F03A5DB9187FBC
                                                                                    SHA1:BD58AA8596345C837E1743617452EC7D73013F3A
                                                                                    SHA-256:3DC976E86D64881E0F37A54B5A04E903235E94D858889B1261527F0048CFBC03
                                                                                    SHA-512:1476919C5C133ACA519B9E9BE2684A85C7E669FA43942204ACDD9EC4A40577F966AD17D30A7EBD3A97A871E71178F0058966410A934822B96F0B2D7120AA43CB
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m>W.)_9.)_9.)_9. '../_9..28.+_9..2<.?_9..2=.!_9..2:.*_9.r7=.(_9.r78.%_9..18.,_9.)_8.._9..1<.&_9..19.(_9..1.(_9.)_..(_9..1;.(_9.Rich)_9.........PE..d...G.P_.........." .................................................................[....`.........................................0d...:...................p...K......x.......h....B..T...................8D..(...0C...............0...............................text...t........................... ..`.rdata.......0....... ..............@..@.data..............................@....pdata...K...p...L..................@..@.rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):660128
                                                                                    Entropy (8bit):6.339798513733826
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:N2fus43uu43Ry4GHlT4xH2K+M+/i+WSpY+7YOzCaK9A3gS2EKZm+GWodEEwnyh:muJzCaK9AB2EKZm+GWodEEwnyh
                                                                                    MD5:46060C35F697281BC5E7337AEE3722B1
                                                                                    SHA1:D0164C041707F297A73ABB9EA854111953E99CF1
                                                                                    SHA-256:2ABF0AAB5A3C5AE9424B64E9D19D9D6D4AEBC67814D7E92E4927B9798FEF2848
                                                                                    SHA-512:2CF2ED4D45C79A6E6CEBFA3D332710A97F5CF0251DC194EEC8C54EA0CB85762FD19822610021CCD6A6904E80AFAE1590A83AF1FA45152F28CA56D862A3473F0A
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;..h..h..h..[h..h..h..h..Mh..hIAWh..h..Oh..h..qh..h..ph..h..uh..h..Lh..h..Kh..h..Nh..hRich..h................PE..d.....OR.........." .....@...................................................`......a.....`.........................................pU.. ....2..<....@...........G.......>...P.......X..................................p............P...............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data........P...8...B..............@....pdata...G.......H...z..............@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):20840
                                                                                    Entropy (8bit):6.3244920295043645
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:rk3cFbdBtZHvagGFsGfZyGmGovy8ZpHEi+:rk0vHy9oyiRM
                                                                                    MD5:D2BC90D6AF120A0643AD5DC5F3CE8D43
                                                                                    SHA1:419C3246B08125754CCBB4323DD823F8DA0548CB
                                                                                    SHA-256:BDED78571A2E60B3324AB9B4D3DDB6DE12FC08CB4BBE6A582A2C2292AA17CCE6
                                                                                    SHA-512:F34C90E44F473A8CD62B75B6D531FDD47AD132A3F1BCE7AD5C0DDF30C61A2454BA214AA2B6CD50C2A1B6CD3AC85F2D9989775376A400D34EBBD2EFAB0FBECC7A
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ovA{+./(+./(+./("o.(/./(yb.))./(yb*)%./(yb+)#./(yb,)(./(?|.)../(+..(../(.b*)*./(.b/)*./(.b.(*./(.b-)*./(Rich+./(........................PE..d....z{c.........." ......... .......................................................7....`..........................................8..t...T;..x....p.......`.......0..h!......<....1...............................2..8............0..(............................text............................... ..`.rdata.......0......................@..@.data........P.......(..............@....pdata.......`.......*..............@..@.rsrc........p.......,..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):51
                                                                                    Entropy (8bit):3.48286657951254
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:cUoytoUD6MBomFUT:cUoQoUD6Qoyy
                                                                                    MD5:034D89CD2C41EDFCEADA9F96A3C0A56A
                                                                                    SHA1:92AB4E6FF98CA987D56EA3C1BA36D1C61EF23ACB
                                                                                    SHA-256:44BBE94D481B106F00223DD406D015AEFD00CFA2DBA9428BEFC2B8F6A3FEB971
                                                                                    SHA-512:6C3E701D2D0FD24FDB46C0E1B0EF5245F36E4A34A9D2340665A31F6331C2D6F08680399600FB02C3D51694F9BAFFB3E41A367CB4FE945D4836B669DA63EB6358
                                                                                    Malicious:false
                                                                                    Preview:1 1..4 3..3 2..16 9..6 5..468 60..728 90..2592 1936
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):31528
                                                                                    Entropy (8bit):6.472533190412445
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:R77JqjlI8icUYWhN5tWcS5gWZoMUekWi9pBj0HRN7RA5aWixHRN7osDhzlGs6N+E:R5D8icUlX5YYMLAWRAlypmPB
                                                                                    MD5:7EE2B93A97485E6222C393BFA653926B
                                                                                    SHA1:F4779CBFF235D21C386DA7276021F136CA233320
                                                                                    SHA-256:BD57D8EEF0BC3A757C5CE5F486A547C79E12482AC8E694C47A6AB794AA745F1F
                                                                                    SHA-512:4A4A3F56674B54683C88BD696AB5D02750E9A61F3089274FAA25E16A858805958E8BE1C391A257E73D889B1EEA30C173D0296509221D68A492A488D725C2B101
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..\4~.\4~.\4~...^4~.UL..X4~.Dz.[4~.D}.^4~.\4..v4~.D..Y4~.D{.O4~.D~.]4~.D..]4~.D|.]4~.Rich\4~.........PE..d...W8.^.........." .........$............................................................`A.........................................>..L....?..x....p.......`..4....:..(A......p...@3..T............................3..0............0..0............................text...(........................... ..`.rdata.......0......................@..@.data........P.......,..............@....pdata..4....`.......0..............@..@.rsrc........p.......4..............@..@.reloc..p............8..............@..B................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):1297
                                                                                    Entropy (8bit):5.115489615345492
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:CbUneZXof9+bOOrXqFT09+JYrXqFTzl796432s4EOkUs8QROJ32s3yxsITf+3t1e:Cn3OOrXqJ07rXqJzr6432sv832s3EsI/
                                                                                    MD5:AAF4009F5963B1B270D8C3E697EBE442
                                                                                    SHA1:F5A44235094DA0B8B5992C6112CB8C356EF22B93
                                                                                    SHA-256:3988CDCCB878675B4AB8C11F21EF7F6301451F59E2E2BF3F07E963D36C8E9767
                                                                                    SHA-512:BC30F4C5F17E4F0CDE2CDD5C36A6EC28271569E18808E736186D42409564E3E6FFA8AD23842912C90F39CE6264A698714A434092778C74CBDE6C330DD3969109
                                                                                    Malicious:false
                                                                                    Preview:Copyright (c) 2013, Cisco Systems.All rights reserved...Redistribution and use in source and binary forms, with or without modification,.are permitted provided that the following conditions are met:..* Redistributions of source code must retain the above copyright notice, this. list of conditions and the following disclaimer...* Redistributions in binary form must reproduce the above copyright notice, this. list of conditions and the following disclaimer in the documentation and/or. other materials provided with the distribution...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND.ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED.WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE.DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR.ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERV
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):320120
                                                                                    Entropy (8bit):6.398399631689542
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:bSU6+JAfisltPzYzrIybvaEezwMckNI+STEDv4nk3ad04ZqhKTrg+COv:brAltbYzsOvaWJ
                                                                                    MD5:DB19F6E0A1BB5DB1C8D87C3FE0891136
                                                                                    SHA1:3B2DAB478A8268000EF5E4474D52CB71F9EB615E
                                                                                    SHA-256:7623B596CFD989413FEA2FE355607B029EF8E64067275CBF81863688128738B0
                                                                                    SHA-512:B328DC6D1ADE3061894BC5C50F437B732190DE3CEA6D2CDC147A9A8193EE73221937FBA24209B66226D5E4B05DFFF5A79DB8B134373D1218605BCBA6EE82A6B3
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~@hB:!..:!..:!..3Y..2!...L..8!..aI..8!...L..,!...L..2!...L..9!...O..=!..:!..."...O../!...O..;!...O..;!..:!..;!...O..;!..Rich:!..........................PE..d....lP_.........." .....\...v......$_...................................................`..........................................5...........................,......x.......|...P...T.......................(....................p..p............................text....[.......\.................. ..`.rdata..."...p...$...`..............@..@.data...8...........................@....pdata...,..........................@..@.rsrc...............................@..@.reloc..|...........................@..B........................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):963232
                                                                                    Entropy (8bit):6.634408584960502
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:FkZ+EUPoH5KTcAxt/qvRQdxQxO61kCS9mmWymzVPD:FkMAlM8ixQI5C6wl
                                                                                    MD5:9C861C079DD81762B6C54E37597B7712
                                                                                    SHA1:62CB65A1D79E2C5ADA0C7BFC04C18693567C90D0
                                                                                    SHA-256:AD32240BB1DE55C3F5FCAC8789F583A17057F9D14914C538C2A7A5AD346B341C
                                                                                    SHA-512:3AA770D6FBA8590FDCF5D263CB2B3D2FAE859E29D31AD482FBFBD700BCD602A013AC2568475999EF9FB06AE666D203D97F42181EC7344CBA023A8534FB13ACB7
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ck.."..".."..D...".."..-"...s..$ ...s.."...s.."...s.. "...s.."...s.."...s.."..Rich."..........................PE..d.....OR.........." .....h...:.......)..............................................].....`.................................................@...(............@...s...t...>......8...p................................2..p............................................text....g.......h.................. ..`.rdata...8.......:...l..............@..@.data...hu.......D..................@....pdata...s...@...t..................@..@.rsrc................^..............@..@.reloc..8............b..............@..B........................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):397672
                                                                                    Entropy (8bit):6.4894894939696846
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:W8c9NNNNNNBgjcQFg7jaV95D3+wxech2KJ:tc9NNNNNN+jcQg7jMnD/xech2o
                                                                                    MD5:B9F3C911728B17FE49BB217D799FCC1A
                                                                                    SHA1:26F4A963E2F43F46323D8610FEC5E8CC8C4A8A16
                                                                                    SHA-256:9CEB41F04B48CF7B419C95D03E227F593836D74A04625C0AD5AD2877D7229B65
                                                                                    SHA-512:0A50270432E6E476D5B4DAF7D9D45053F821BEF02F1872EF598A9E66B2E6B75AE4A89AB97AE175C5143CE3C993D7A354F6389EB5A8BDDBFDE59522103535C403
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........v.{.%.{.%.{.%.*=%.{.%.*?%.{.%.*.%.{.%.*.%.{.%...%.{.%`.+%.{.%.{.%.{.%..<%.{.%.);%.{.%.{w%.{.%..>%.{.%Rich.{.%........................PE..d......].........." .....8..........................................................g,....`.........................................@...87..x...<.... ...........%......h!...........................................k..p............P...............................text...;6.......8.................. ..`.rdata.......P.......<..............@..@.data...............................@....pdata...%.......&..................@..@_RDATA..P/.......0..................@..@.rsrc........ ......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):590632
                                                                                    Entropy (8bit):6.463330275333709
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:Mt8MRN4gE4x4iTqwTQa6IUqXF7XyxpypsdUDqNSfbQEKZm+jWodEEV3Ho/:MCMm9pyp35bQEKZm+jWodEExg
                                                                                    MD5:E74CAF5D94AA08D046A44ED6ED84A3C5
                                                                                    SHA1:ED9F696FA0902A7C16B257DA9B22FB605B72B12E
                                                                                    SHA-256:3DEDEF76C87DB736C005D06A8E0D084204B836AF361A6BD2EE4651D9C45675E8
                                                                                    SHA-512:D3128587BC8D62E4D53F8B5F95EB687BC117A6D5678C08DC6B59B72EA9178A7FD6AE8FAA9094D21977C406739D6C38A440134C1C1F6F9A44809E80D162723254
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n...*...*...*.....w.(...#...<...*......./.....".................+.....g.+.....+...Rich*...................PE..d...R8.^.........." .....>..........p"....................................................`A........................................ m..h....G..,...............(;......(A......4.......T...............................0............P......Ti..@....................text....=.......>.................. ..`.rdata.......P.......B..............@..@.data....:...`..."...P..............@....pdata..(;.......<...r..............@..@.didat..h...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):135016
                                                                                    Entropy (8bit):5.674566205873397
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:GZU6fX6Kj693r/67BhRpsGmQhRJRVW8/mpI4Sx8K5aqEkmgcs8MYQJaqEkmgcs8o:GZU6qz3ERpNzhRvVoVDe1r0+
                                                                                    MD5:61CF5C843D8A31162B59C074AE74A76E
                                                                                    SHA1:123E0EACE3DD60FEF94DC96215468D22434C50FB
                                                                                    SHA-256:F51BB73407C96E4A2E3016A96A870FA4B422A8B1851477048D122CCC2D523687
                                                                                    SHA-512:AA1C3175D9A0E11341B8A2F1C5372E99E1164169C8FC71727A0FE6655878782E921FA046D6A83CA2E2C67DAE0609704442EBCFDBE985281F02DDB7E288DC718D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................2.&......<......>..................qY/....qY1....qY*.....8<............8......8=.....8?....Rich............................PE..d...F..].........." ......................................................... ......S.....`.............................................d...............................h!......\...`...8...............................p............................................text............................... ..`.rdata..t...........................@..@.data...a...........................@....pdata..............................@..@.idata..8(.......*..................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):248680
                                                                                    Entropy (8bit):4.820760286569876
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:k6bBPHJr5r5C9Fg8Imnw5bR3Kklo7rbQox:kz
                                                                                    MD5:60BAB1D197D91828ED25099968F7D8C5
                                                                                    SHA1:FC8E1B3C2C98727D2D81A8E85420FA80EE655F19
                                                                                    SHA-256:F682B5AA0AF3CEE93F890EC6717F94C1AC9B75EBFF512955C6531E7CEE05D196
                                                                                    SHA-512:5B9CBB11E3FCB00FD76F595520DA4610FA37B0F1227D016D77350909846BA33AF9A32B650BB1CE9A73549DB5BF190C2205E28223D1745191B2424F6DC7327B38
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........e..6..6..6..`6..6...7..6...7..6...7..6...7..62..7..6J..7..62..7..6l..7..6..6...6l..7..6l..7..6l..6..6.d6..6l..7..6Rich..6........................PE..d...3N2c.........." ................................................................U....`..........................................&...0..(W..,.... ..................h!..............T...........................`...8............................................text...+........................... ..`.rdata..v'.......(..................@..@.data...x%....... ..................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..............................@..B........................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):707354
                                                                                    Entropy (8bit):6.470926417661749
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:D0QfKb7nH5lrPo37AzHTA63I0ihE4UEQrrNtIECORGv95ELAfXExy8z:nfKbT5lrPo37AzHTA63/cfU9IEU953fo
                                                                                    MD5:F2E1861AB7EFD6358283CF101045A727
                                                                                    SHA1:15F34DC254FE02A84F2F8AD4D5495D7E799F2F9B
                                                                                    SHA-256:35A50C7721675C5422D5F7979912FB1B2BE5811CBBAFBA60FEA36D2DBBC87190
                                                                                    SHA-512:C92F41CEFDEC7305C526F5903509760512F9DC152AFC2969F40B40ACABDAD41CF40273BAC8CEECBA47C4BC0DACDA14D0DA74B8312AFFF37CFADBD8EF8933C685
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........1.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....$.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..............................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):363880
                                                                                    Entropy (8bit):6.3947346615222305
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:lieS4N0DdxBa72yNQuqped6c7Bv5ebr+U2pyQqsa3a8g+QTW:UeSyCVaiyNQAd6cV5K+Jp37W
                                                                                    MD5:460B0576549FFD1F55D717BA6E265A05
                                                                                    SHA1:65AB7E2109658102678C122D7DE603E64DCE7CC5
                                                                                    SHA-256:AAB56C21B6CEC7065882A750BECB4526B4CB5815A4AC002C2594F84FB0F5955F
                                                                                    SHA-512:666B16FF72CB847B8D141B0110BBB45AAE67D9BB01E2D6B48C7BDA61C5DC3126CCBC72627C1B93EC23B87E9427C39DC890F1E0A72E5077DC0071E5FEA1B1E3A3
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................7!.....;.....9...............>.;...Vh-.......>.......>.:....=...>.8...Rich....................PE..d.....%Y.........." .........d.......................................................L....`.........................................@........................P...7...l..h!......8.......................................p............ ...............................text...K........................... ..`.rdata....... ......................@..@.data...@....@.......(..............@....pdata...7...P...8...*..............@..@.rsrc................b..............@..@.reloc..8............h..............@..B........................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):2042352
                                                                                    Entropy (8bit):7.085275197144553
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:OFZD9URlmDrgBrhEci8XhP3YLd44RS6+FNbqUzUxVvqKGTZnIzudBDFPjQAr10Fu:+ZeLrXFcL0YF7pvtHkfH
                                                                                    MD5:876A839023B8F962A72D295DA7495734
                                                                                    SHA1:62A7728679BC18784B1FBF1D013F7CECE18CBEC9
                                                                                    SHA-256:A757D773DA406411FB977761F6E56F016D48D224AEDAF3D875ED4D4A9EDE6158
                                                                                    SHA-512:E1B23A2F5EC0100FF874CA075BBD0F90E9065A90FEC66861F99DF603D7AAA9DB8E8EC326710FDC11AD41D01BEFE4EA3077136127ACF613614D0D12FF23BEC6C1
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....^............................4.............@..........................@.......................................................p...3..............X............................................................................................text............................... ..`.rdata..x%.......0..................@..@.data....S.......0..................@....rsrc....@...p...@...@..............@..@.vcp1208............................a.G.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):397672
                                                                                    Entropy (8bit):6.4894894939696846
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:W8c9NNNNNNBgjcQFg7jaV95D3+wxech2KJ:tc9NNNNNN+jcQg7jMnD/xech2o
                                                                                    MD5:B9F3C911728B17FE49BB217D799FCC1A
                                                                                    SHA1:26F4A963E2F43F46323D8610FEC5E8CC8C4A8A16
                                                                                    SHA-256:9CEB41F04B48CF7B419C95D03E227F593836D74A04625C0AD5AD2877D7229B65
                                                                                    SHA-512:0A50270432E6E476D5B4DAF7D9D45053F821BEF02F1872EF598A9E66B2E6B75AE4A89AB97AE175C5143CE3C993D7A354F6389EB5A8BDDBFDE59522103535C403
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........v.{.%.{.%.{.%.*=%.{.%.*?%.{.%.*.%.{.%.*.%.{.%...%.{.%`.+%.{.%.{.%.{.%..<%.{.%.);%.{.%.{w%.{.%..>%.{.%Rich.{.%........................PE..d......].........." .....8..........................................................g,....`.........................................@...87..x...<.... ...........%......h!...........................................k..p............P...............................text...;6.......8.................. ..`.rdata.......P.......<..............@..@.data...............................@....pdata...%.......&..................@..@_RDATA..P/.......0..................@..@.rsrc........ ......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):20840
                                                                                    Entropy (8bit):6.3244920295043645
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:rk3cFbdBtZHvagGFsGfZyGmGovy8ZpHEi+:rk0vHy9oyiRM
                                                                                    MD5:D2BC90D6AF120A0643AD5DC5F3CE8D43
                                                                                    SHA1:419C3246B08125754CCBB4323DD823F8DA0548CB
                                                                                    SHA-256:BDED78571A2E60B3324AB9B4D3DDB6DE12FC08CB4BBE6A582A2C2292AA17CCE6
                                                                                    SHA-512:F34C90E44F473A8CD62B75B6D531FDD47AD132A3F1BCE7AD5C0DDF30C61A2454BA214AA2B6CD50C2A1B6CD3AC85F2D9989775376A400D34EBBD2EFAB0FBECC7A
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ovA{+./(+./(+./("o.(/./(yb.))./(yb*)%./(yb+)#./(yb,)(./(?|.)../(+..(../(.b*)*./(.b/)*./(.b.(*./(.b-)*./(Rich+./(........................PE..d....z{c.........." ......... .......................................................7....`..........................................8..t...T;..x....p.......`.......0..h!......<....1...............................2..8............0..(............................text............................... ..`.rdata.......0......................@..@.data........P.......(..............@....pdata.......`.......*..............@..@.rsrc........p.......,..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):660128
                                                                                    Entropy (8bit):6.339798513733826
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:N2fus43uu43Ry4GHlT4xH2K+M+/i+WSpY+7YOzCaK9A3gS2EKZm+GWodEEwnyh:muJzCaK9AB2EKZm+GWodEEwnyh
                                                                                    MD5:46060C35F697281BC5E7337AEE3722B1
                                                                                    SHA1:D0164C041707F297A73ABB9EA854111953E99CF1
                                                                                    SHA-256:2ABF0AAB5A3C5AE9424B64E9D19D9D6D4AEBC67814D7E92E4927B9798FEF2848
                                                                                    SHA-512:2CF2ED4D45C79A6E6CEBFA3D332710A97F5CF0251DC194EEC8C54EA0CB85762FD19822610021CCD6A6904E80AFAE1590A83AF1FA45152F28CA56D862A3473F0A
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;..h..h..h..[h..h..h..h..Mh..hIAWh..h..Oh..h..qh..h..ph..h..uh..h..Lh..h..Kh..h..Nh..hRich..h................PE..d.....OR.........." .....@...................................................`......a.....`.........................................pU.. ....2..<....@...........G.......>...P.......X..................................p............P...............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data........P...8...B..............@....pdata...G.......H...z..............@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):590632
                                                                                    Entropy (8bit):6.463330275333709
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:Mt8MRN4gE4x4iTqwTQa6IUqXF7XyxpypsdUDqNSfbQEKZm+jWodEEV3Ho/:MCMm9pyp35bQEKZm+jWodEExg
                                                                                    MD5:E74CAF5D94AA08D046A44ED6ED84A3C5
                                                                                    SHA1:ED9F696FA0902A7C16B257DA9B22FB605B72B12E
                                                                                    SHA-256:3DEDEF76C87DB736C005D06A8E0D084204B836AF361A6BD2EE4651D9C45675E8
                                                                                    SHA-512:D3128587BC8D62E4D53F8B5F95EB687BC117A6D5678C08DC6B59B72EA9178A7FD6AE8FAA9094D21977C406739D6C38A440134C1C1F6F9A44809E80D162723254
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n...*...*...*.....w.(...#...<...*......./.....".................+.....g.+.....+...Rich*...................PE..d...R8.^.........." .....>..........p"....................................................`A........................................ m..h....G..,...............(;......(A......4.......T...............................0............P......Ti..@....................text....=.......>.................. ..`.rdata.......P.......B..............@..@.data....:...`..."...P..............@....pdata..(;.......<...r..............@..@.didat..h...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):31528
                                                                                    Entropy (8bit):6.472533190412445
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:R77JqjlI8icUYWhN5tWcS5gWZoMUekWi9pBj0HRN7RA5aWixHRN7osDhzlGs6N+E:R5D8icUlX5YYMLAWRAlypmPB
                                                                                    MD5:7EE2B93A97485E6222C393BFA653926B
                                                                                    SHA1:F4779CBFF235D21C386DA7276021F136CA233320
                                                                                    SHA-256:BD57D8EEF0BC3A757C5CE5F486A547C79E12482AC8E694C47A6AB794AA745F1F
                                                                                    SHA-512:4A4A3F56674B54683C88BD696AB5D02750E9A61F3089274FAA25E16A858805958E8BE1C391A257E73D889B1EEA30C173D0296509221D68A492A488D725C2B101
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..\4~.\4~.\4~...^4~.UL..X4~.Dz.[4~.D}.^4~.\4..v4~.D..Y4~.D{.O4~.D~.]4~.D..]4~.D|.]4~.Rich\4~.........PE..d...W8.^.........." .........$............................................................`A.........................................>..L....?..x....p.......`..4....:..(A......p...@3..T............................3..0............0..0............................text...(........................... ..`.rdata.......0......................@..@.data........P.......,..............@....pdata..4....`.......0..............@..@.rsrc........p.......4..............@..@.reloc..p............8..............@..B................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):963232
                                                                                    Entropy (8bit):6.634408584960502
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:FkZ+EUPoH5KTcAxt/qvRQdxQxO61kCS9mmWymzVPD:FkMAlM8ixQI5C6wl
                                                                                    MD5:9C861C079DD81762B6C54E37597B7712
                                                                                    SHA1:62CB65A1D79E2C5ADA0C7BFC04C18693567C90D0
                                                                                    SHA-256:AD32240BB1DE55C3F5FCAC8789F583A17057F9D14914C538C2A7A5AD346B341C
                                                                                    SHA-512:3AA770D6FBA8590FDCF5D263CB2B3D2FAE859E29D31AD482FBFBD700BCD602A013AC2568475999EF9FB06AE666D203D97F42181EC7344CBA023A8534FB13ACB7
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ck.."..".."..D...".."..-"...s..$ ...s.."...s.."...s.. "...s.."...s.."...s.."..Rich."..........................PE..d.....OR.........." .....h...:.......)..............................................].....`.................................................@...(............@...s...t...>......8...p................................2..p............................................text....g.......h.................. ..`.rdata...8.......:...l..............@..@.data...hu.......D..................@....pdata...s...@...t..................@..@.rsrc................^..............@..@.reloc..8............b..............@..B........................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):869224
                                                                                    Entropy (8bit):6.632387605957213
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:DJf34ppw4hjg401r+iTy2mmzuF3SJciti0ZIj8UoJwCR:Dl3ypw4yN/RiF3SJdO8xJv
                                                                                    MD5:DAA904CE63B0A290111AED5E843B9368
                                                                                    SHA1:6642AD5C2622D756EB3500E7C0420E9DA7A16BB1
                                                                                    SHA-256:471BBC3FA0A98869F6791E0D1A55B38F5E360842A7CC219A6FF26030E62DBB1B
                                                                                    SHA-512:CBFD06523F1855AAF4BE2D33EB3A3A324C8D7AF4871B314AC2C165FD17F8DA6CD2F465E9405412282AAC1ED247B811A4A73D91069A324A5AEC531253AE3A4D0B
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.9d0.W70.W70.W7...73.W70.V7m.W7.M.71.W7v..7..W7v..7..W7v..7$.W7.s.7e.W70.W7'.W7.s.71.W7=..71.W7.s.71.W7Rich0.W7........PE..d......].........." .....8...........\...............................................$....`.................................................|...(....`..........x]..."..h!...p.......R..8...............................p............P..H............................text...7+.......,.................. ..`.rodata......@.......0.............. ..`.rdata..FP...P...R...<..............@..@.data... K.......&..................@....pdata..x].......^..................@..@.rsrc........`......................@..@.reloc.......p......................@..B................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):1297
                                                                                    Entropy (8bit):5.115489615345492
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:CbUneZXof9+bOOrXqFT09+JYrXqFTzl796432s4EOkUs8QROJ32s3yxsITf+3t1e:Cn3OOrXqJ07rXqJzr6432sv832s3EsI/
                                                                                    MD5:AAF4009F5963B1B270D8C3E697EBE442
                                                                                    SHA1:F5A44235094DA0B8B5992C6112CB8C356EF22B93
                                                                                    SHA-256:3988CDCCB878675B4AB8C11F21EF7F6301451F59E2E2BF3F07E963D36C8E9767
                                                                                    SHA-512:BC30F4C5F17E4F0CDE2CDD5C36A6EC28271569E18808E736186D42409564E3E6FFA8AD23842912C90F39CE6264A698714A434092778C74CBDE6C330DD3969109
                                                                                    Malicious:false
                                                                                    Preview:Copyright (c) 2013, Cisco Systems.All rights reserved...Redistribution and use in source and binary forms, with or without modification,.are permitted provided that the following conditions are met:..* Redistributions of source code must retain the above copyright notice, this. list of conditions and the following disclaimer...* Redistributions in binary form must reproduce the above copyright notice, this. list of conditions and the following disclaimer in the documentation and/or. other materials provided with the distribution...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND.ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED.WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE.DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR.ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERV
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):51
                                                                                    Entropy (8bit):3.48286657951254
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:cUoytoUD6MBomFUT:cUoQoUD6Qoyy
                                                                                    MD5:034D89CD2C41EDFCEADA9F96A3C0A56A
                                                                                    SHA1:92AB4E6FF98CA987D56EA3C1BA36D1C61EF23ACB
                                                                                    SHA-256:44BBE94D481B106F00223DD406D015AEFD00CFA2DBA9428BEFC2B8F6A3FEB971
                                                                                    SHA-512:6C3E701D2D0FD24FDB46C0E1B0EF5245F36E4A34A9D2340665A31F6331C2D6F08680399600FB02C3D51694F9BAFFB3E41A367CB4FE945D4836B669DA63EB6358
                                                                                    Malicious:false
                                                                                    Preview:1 1..4 3..3 2..16 9..6 5..468 60..728 90..2592 1936
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:modified
                                                                                    Size (bytes):3149260
                                                                                    Entropy (8bit):6.90789109689728
                                                                                    Encrypted:false
                                                                                    SSDEEP:98304:ltFvpn2HjjeLN33Ltcq0L409R8dsZ0q1X:lt9pnAjyLN3JQR8dsp
                                                                                    MD5:05231A29BF2470E3D5FEA74C5FD84462
                                                                                    SHA1:18D4BF866691E6DEE2819367993761522E462933
                                                                                    SHA-256:B6856AE9351FB50266F4803C7630ED195BCE9A0AF8C0D00CCEAC22B7250E1DDC
                                                                                    SHA-512:DEDB877FB6A44D0E6E9485B2A00A555F0B3E9C12040C55744194BB4E270B25195B9517DA5F82E5A53B06A51F8ABB51D5D3874E70724D1A5BE8711833F9DF65D3
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe, Author: Joe Security
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......^..........&...............................@..........................00.........................................................@............................................................................................................text............................... ..`.bhead8.n*.......0..................@..@.data...xT...0...@...0..............@....rsrc................p..............@..@.chead8............................a.f.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:InnoSetup Log RecordPad Sound Recorder, version 0x30, 5497 bytes, 648351\user, "C:\Users\user\AppData\Local\RecordPad Sound Recorder"
                                                                                    Category:dropped
                                                                                    Size (bytes):5497
                                                                                    Entropy (8bit):4.793236525860416
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:aH2H89dWL4888pgUm95+eOIhFhlEo4cVSQs0LoXEMVyd9vHzctJotZo2DJcKCwF5:aH2H89dWL48XpgYHIhFjEdcVSQ1oXEMq
                                                                                    MD5:DA05920EBD63F7ECC7B421F12A7B9B3F
                                                                                    SHA1:666F57783C0A3961E24F9F9E8722464F0C2B774E
                                                                                    SHA-256:DD0FC5F8F11EA73A29EA8675CE2B8D1287659B19FF745F2C8A106FA462CC4890
                                                                                    SHA-512:E806636E49DA2D9BBDAC300383DAAC02A22A1A4F73E6BB4D8101A71C6E0F6416C3060A6E744B75B5B2742926F3E7D342C336AB001426800ECCE7BB127A4DE324
                                                                                    Malicious:false
                                                                                    Preview:Inno Setup Uninstall Log (b)....................................RecordPad Sound Recorder........................................................................................................RecordPad Sound Recorder........................................................................................................0.......y...%...............................................................................................................-...........}4.......[....648351.user8C:\Users\user\AppData\Local\RecordPad Sound Recorder.................. .....S......IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%..
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):707354
                                                                                    Entropy (8bit):6.470926417661749
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:D0QfKb7nH5lrPo37AzHTA63I0ihE4UEQrrNtIECORGv95ELAfXExy8z:nfKbT5lrPo37AzHTA63/cfU9IEU953fo
                                                                                    MD5:F2E1861AB7EFD6358283CF101045A727
                                                                                    SHA1:15F34DC254FE02A84F2F8AD4D5495D7E799F2F9B
                                                                                    SHA-256:35A50C7721675C5422D5F7979912FB1B2BE5811CBBAFBA60FEA36D2DBBC87190
                                                                                    SHA-512:C92F41CEFDEC7305C526F5903509760512F9DC152AFC2969F40B40ACABDAD41CF40273BAC8CEECBA47C4BC0DACDA14D0DA74B8312AFFF37CFADBD8EF8933C685
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........1.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....$.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..............................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):4096
                                                                                    Entropy (8bit):4.026670007889822
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                                                    MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                                                    SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                                                    SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                                                    SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):2560
                                                                                    Entropy (8bit):2.8818118453929262
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                    MD5:A69559718AB506675E907FE49DEB71E9
                                                                                    SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                    SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                    SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):6144
                                                                                    Entropy (8bit):4.215994423157539
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                                    MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                                    SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                                    SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                                    SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):23312
                                                                                    Entropy (8bit):4.596242908851566
                                                                                    Encrypted:false
                                                                                    SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                    MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                    SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                    SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                    SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\9MgoW3Y1ti.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):696832
                                                                                    Entropy (8bit):6.462782329218102
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:L0QfKb7nH5lrPo37AzHTA63I0ihE4UEQrrNtIECORGv95ELAfXExy8:ffKbT5lrPo37AzHTA63/cfU9IEU953f0
                                                                                    MD5:8EF7001015E126E74BC41268504CA1E2
                                                                                    SHA1:B30C0FA54ECB63C735407144A3297E0B9D881E27
                                                                                    SHA-256:E06E234073AE4A9DF232AA1D535F02429A371748E164606C1B1A4C74BD98C56C
                                                                                    SHA-512:122DF0A13F2D0C3103F0F686863CFAB46114A417C5D6A4382410C2CCF0AA3E9859D8E760B5C1860C776B1064F5BCCBF1E8AA50108F948F9240A5DD80D31CF17B
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................&...........1.......@....@..............................................@...............................%...`...>..........................................................................................................CODE.....$.......&.................. ..`DATA....<....@.......*..............@...BSS..........`.......<...................idata...%.......&...<..............@....tls.................b...................rdata...............b..............@..P.reloc..............................@..P.rsrc....>...`...>...d..............@..P.....................*..............@..P........................................................................................................................................
                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Entropy (8bit):7.998877824602786
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                                    • Inno Setup installer (109748/4) 1.08%
                                                                                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                    File name:9MgoW3Y1ti.exe
                                                                                    File size:5'167'185 bytes
                                                                                    MD5:b5782418b0d93145d5e7d5ff762c50e3
                                                                                    SHA1:8ad9d47fcd5cc8668c316f2ed8b9ce0f44b9adfb
                                                                                    SHA256:2364f287be72dd7aa1f3cf19ff86314a02b62f4b19792e1e06abad3567d1900c
                                                                                    SHA512:0bad50e78ba51de7721dbe2a68918f0f36bb9ccab267e23db9e1287228ef907d5c498876e1fb27955979867853d32a868e7385a9f6ae5714c472dee889621906
                                                                                    SSDEEP:98304:m+FTWMmIv6waA32fkYBYSIQIBgEs0UmB12pCZMzCVThs0+sourcZuxKwYYvq:BXmI532fkYKSIQIBWmBkqICVThsWour+
                                                                                    TLSH:8C363343E1E495B0C50656FCCEE194895839AAA0FAFE5C08376CE80C3DB35DB986F359
                                                                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                    Icon Hash:2d2e3797b32b2b99
                                                                                    Entrypoint:0x409b24
                                                                                    Entrypoint Section:CODE
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:1
                                                                                    OS Version Minor:0
                                                                                    File Version Major:1
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:1
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                    Instruction
                                                                                    push ebp
                                                                                    mov ebp, esp
                                                                                    add esp, FFFFFFC4h
                                                                                    push ebx
                                                                                    push esi
                                                                                    push edi
                                                                                    xor eax, eax
                                                                                    mov dword ptr [ebp-10h], eax
                                                                                    mov dword ptr [ebp-24h], eax
                                                                                    call 00007F2308CD7857h
                                                                                    call 00007F2308CD8A5Eh
                                                                                    call 00007F2308CDAC89h
                                                                                    call 00007F2308CDACD0h
                                                                                    call 00007F2308CDD5C3h
                                                                                    call 00007F2308CDD72Ah
                                                                                    xor eax, eax
                                                                                    push ebp
                                                                                    push 0040A1DBh
                                                                                    push dword ptr fs:[eax]
                                                                                    mov dword ptr fs:[eax], esp
                                                                                    xor edx, edx
                                                                                    push ebp
                                                                                    push 0040A1A4h
                                                                                    push dword ptr fs:[edx]
                                                                                    mov dword ptr fs:[edx], esp
                                                                                    mov eax, dword ptr [0040C014h]
                                                                                    call 00007F2308CDE150h
                                                                                    call 00007F2308CDDCB7h
                                                                                    lea edx, dword ptr [ebp-10h]
                                                                                    xor eax, eax
                                                                                    call 00007F2308CDB2B9h
                                                                                    mov edx, dword ptr [ebp-10h]
                                                                                    mov eax, 0040CDE4h
                                                                                    call 00007F2308CD7908h
                                                                                    push 00000002h
                                                                                    push 00000000h
                                                                                    push 00000001h
                                                                                    mov ecx, dword ptr [0040CDE4h]
                                                                                    mov dl, 01h
                                                                                    mov eax, 004072ECh
                                                                                    call 00007F2308CDBB48h
                                                                                    mov dword ptr [0040CDE8h], eax
                                                                                    xor edx, edx
                                                                                    push ebp
                                                                                    push 0040A15Ch
                                                                                    push dword ptr fs:[edx]
                                                                                    mov dword ptr fs:[edx], esp
                                                                                    call 00007F2308CDE1C0h
                                                                                    mov dword ptr [0040CDF0h], eax
                                                                                    mov eax, dword ptr [0040CDF0h]
                                                                                    cmp dword ptr [eax+0Ch], 01h
                                                                                    jne 00007F2308CDE2FAh
                                                                                    mov eax, dword ptr [0040CDF0h]
                                                                                    mov edx, 00000028h
                                                                                    call 00007F2308CDBF49h
                                                                                    mov edx, dword ptr [0040CDF0h]
                                                                                    cmp eax, dword ptr [edx+00h]
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    CODE0x10000x92440x940000d95da090f9b045cc52199c7b36d118False0.6099820523648649data6.529731839731562IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    DATA0xb0000x24c0x40005e73e67429288e06500812b62979d5fFalse0.3076171875data2.734223999371757IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    BSS0xc0000xe480x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0x110000x2c000x2c00e3fe84aa938d47d18defad03819903c4False0.3229758522727273data4.464866638398271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                    RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                    RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                    RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                    RT_STRING0x125740x2f2data0.35543766578249336
                                                                                    RT_STRING0x128680x30cdata0.3871794871794872
                                                                                    RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                    RT_STRING0x12e440x68data0.75
                                                                                    RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                    RT_STRING0x12f600xaedata0.5344827586206896
                                                                                    RT_RCDATA0x130100x2cdata1.1818181818181819
                                                                                    RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                    RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.2781456953642384
                                                                                    RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                                    DLLImport
                                                                                    kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                    user32.dllMessageBoxA
                                                                                    oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                    kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                    user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                    comctl32.dllInitCommonControls
                                                                                    advapi32.dllAdjustTokenPrivileges
                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                    DutchNetherlands
                                                                                    EnglishUnited States
                                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                    06/11/24-20:04:05.022218TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975980192.168.2.694.156.8.14
                                                                                    06/11/24-20:04:00.660933TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975680192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:20.999590TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973380192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:50.457825TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975080192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:33.060284TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973980192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:45.145687TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974780192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:42.718124TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974480192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:15.218492TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973080192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:55.568367TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975380192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:06.281713TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14972180192.168.2.694.156.8.14
                                                                                    06/11/24-20:04:09.182356TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14976280192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:53.390046TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975180192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:58.405789TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975480192.168.2.694.156.8.14
                                                                                    06/11/24-20:04:02.172905TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975780192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:48.061954TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974880192.168.2.694.156.8.14
                                                                                    06/11/24-20:04:06.419496TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14976080192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:37.431894TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974280192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:28.375163TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973680192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:34.520546TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974080192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:38.944323TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974380192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:43.506708TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974680192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:29.131237TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973780192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:00.558791TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14972080192.168.2.694.156.8.14
                                                                                    06/11/24-20:04:10.647905TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14976380192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:17.343055TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973180192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:54.130080TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975280192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:12.287039TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14972980192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:10.015867TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14972580192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:23.984682TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973480192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:32.171182TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973880192.168.2.694.156.8.14
                                                                                    06/11/24-20:04:07.773090TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14976180192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:26.218000TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973580192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:07.068331TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14972380192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:10.793000TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14972680192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:59.145572TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975580192.168.2.694.156.8.14
                                                                                    06/11/24-20:04:03.617994TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14975880192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:35.977088TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974180192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:18.026242TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14973280192.168.2.694.156.8.14
                                                                                    06/11/24-20:03:48.957781TCP2049467ET TROJAN [ANY.RUN] Socks5Systemz HTTP C2 Connection M14974980192.168.2.694.156.8.14
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jun 11, 2024 20:03:00.552073002 CEST4972080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:00.557869911 CEST804972094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:00.557956934 CEST4972080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:00.558790922 CEST4972080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:00.564320087 CEST804972094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:01.954236031 CEST804972094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:01.954392910 CEST4972080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:02.077717066 CEST4972080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:02.078216076 CEST4972180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:02.083112955 CEST804972094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:02.083170891 CEST804972194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:02.083205938 CEST4972080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:02.083259106 CEST4972180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:02.083472967 CEST4972180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:02.088304996 CEST804972194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:03.446904898 CEST804972194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:03.447148085 CEST4972180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:03.448534966 CEST497222023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:03.453507900 CEST202349722194.59.31.219192.168.2.6
                                                                                    Jun 11, 2024 20:03:03.453645945 CEST497222023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:03.453721046 CEST497222023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:03.458834887 CEST202349722194.59.31.219192.168.2.6
                                                                                    Jun 11, 2024 20:03:03.459033966 CEST497222023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:03.464202881 CEST202349722194.59.31.219192.168.2.6
                                                                                    Jun 11, 2024 20:03:04.272751093 CEST202349722194.59.31.219192.168.2.6
                                                                                    Jun 11, 2024 20:03:04.325320005 CEST497222023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:06.281713009 CEST4972180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:06.286988974 CEST804972194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:06.944936991 CEST804972194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:06.945261955 CEST4972180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:07.062683105 CEST4972180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:07.062964916 CEST4972380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:07.068028927 CEST804972394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:07.068149090 CEST4972380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:07.068331003 CEST4972380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:07.068439007 CEST804972194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:07.068506956 CEST4972180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:07.073206902 CEST804972394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:08.408154011 CEST804972394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:08.408242941 CEST4972380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:08.409513950 CEST497242023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:08.414345980 CEST202349724194.59.31.219192.168.2.6
                                                                                    Jun 11, 2024 20:03:08.414619923 CEST497242023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:08.414710045 CEST497242023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:08.414813042 CEST497242023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:08.419605970 CEST202349724194.59.31.219192.168.2.6
                                                                                    Jun 11, 2024 20:03:08.467492104 CEST202349724194.59.31.219192.168.2.6
                                                                                    Jun 11, 2024 20:03:08.531480074 CEST4972380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:08.531793118 CEST4972580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:08.537024021 CEST804972594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:08.537142992 CEST4972580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:08.537349939 CEST4972580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:08.540684938 CEST804972394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:08.540776968 CEST4972380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:08.542501926 CEST804972594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:09.005702019 CEST202349724194.59.31.219192.168.2.6
                                                                                    Jun 11, 2024 20:03:09.005829096 CEST497242023192.168.2.6194.59.31.219
                                                                                    Jun 11, 2024 20:03:09.904525995 CEST804972594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:09.904882908 CEST4972580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:10.015866995 CEST4972580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:10.021575928 CEST804972594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:10.662127972 CEST804972594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:10.662266016 CEST4972580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:10.787486076 CEST4972580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:10.787800074 CEST4972680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:10.792593002 CEST804972594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:10.792669058 CEST804972694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:10.792692900 CEST4972580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:10.792790890 CEST4972680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:10.792999983 CEST4972680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:10.797800064 CEST804972694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:12.164022923 CEST804972694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:12.164159060 CEST4972680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:12.281514883 CEST4972680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:12.281910896 CEST4972980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:12.286753893 CEST804972994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:12.286767960 CEST804972694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:12.286834955 CEST4972980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:12.286868095 CEST4972680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:12.287039042 CEST4972980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:12.291812897 CEST804972994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:13.642710924 CEST804972994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:13.642781973 CEST4972980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:13.765727043 CEST4972980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:13.766223907 CEST4973080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:13.771025896 CEST804972994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:13.771092892 CEST4972980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:13.771176100 CEST804973094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:13.771262884 CEST4973080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:13.771404982 CEST4973080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:13.776810884 CEST804973094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:15.109380960 CEST804973094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:15.109556913 CEST4973080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:15.218492031 CEST4973080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:15.223495960 CEST804973094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:15.846194983 CEST804973094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:15.848818064 CEST4973080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:15.975450039 CEST4973080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:15.975888014 CEST4973180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:15.980953932 CEST804973094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:15.981039047 CEST804973194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:15.981154919 CEST4973080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:15.981204033 CEST4973180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:15.981359959 CEST4973180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:15.986162901 CEST804973194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:17.235989094 CEST804973194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:17.236133099 CEST4973180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:17.343055010 CEST4973180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:17.348066092 CEST804973194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:17.896166086 CEST804973194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:17.896265984 CEST4973180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:18.015284061 CEST4973180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:18.015574932 CEST4973280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:18.020522118 CEST804973294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:18.020634890 CEST4973280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:18.021038055 CEST804973194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:18.021110058 CEST4973180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:18.026242018 CEST4973280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:18.031064034 CEST804973294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:19.383019924 CEST804973294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:19.383323908 CEST4973280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:19.500879049 CEST4973280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:19.501627922 CEST4973380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:19.506556988 CEST804973294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:19.506752014 CEST804973394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:19.506762028 CEST4973280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:19.506836891 CEST4973380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:19.507042885 CEST4973380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:19.512383938 CEST804973394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:20.887610912 CEST804973394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:20.887968063 CEST4973380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:20.999589920 CEST4973380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:21.005023956 CEST804973394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:21.650306940 CEST804973394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:21.650588036 CEST4973380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:21.765944004 CEST4973380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:21.766277075 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:21.771629095 CEST804973394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:21.771675110 CEST804973494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:21.771739960 CEST4973380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:21.771809101 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:21.772011995 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:21.776779890 CEST804973494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:23.126228094 CEST804973494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:23.126626015 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:23.234594107 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:23.239825010 CEST804973494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:23.874078989 CEST804973494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:23.874289036 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:23.984682083 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:23.989655018 CEST804973494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:24.616264105 CEST804973494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:24.616575956 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:24.735186100 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:24.735497952 CEST4973580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:24.740474939 CEST804973594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:24.740504980 CEST804973494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:24.740897894 CEST4973580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:24.741000891 CEST4973480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:24.741077900 CEST4973580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:24.745913982 CEST804973594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:26.104337931 CEST804973594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:26.106930017 CEST4973580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:26.217999935 CEST4973580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:26.222946882 CEST804973594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:26.839590073 CEST804973594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:26.840321064 CEST4973580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:26.952142000 CEST4973580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:26.952553034 CEST4973680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:26.957607031 CEST804973694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:26.957724094 CEST4973680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:26.957935095 CEST4973680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:26.958214998 CEST804973594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:26.958282948 CEST4973580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:26.962738037 CEST804973694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:28.262629032 CEST804973694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:28.262691021 CEST4973680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:28.375163078 CEST4973680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:28.380278111 CEST804973694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:29.005793095 CEST804973694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:29.005933046 CEST4973680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:29.125207901 CEST4973680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:29.125648022 CEST4973780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:29.130836964 CEST804973694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:29.130878925 CEST804973794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:29.130944967 CEST4973680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:29.131031990 CEST4973780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:29.131237030 CEST4973780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:29.136015892 CEST804973794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:30.504712105 CEST804973794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:30.504839897 CEST4973780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:30.671422005 CEST4973780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:30.671988964 CEST4973880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:30.676918983 CEST804973794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:30.676939964 CEST804973894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:30.676980019 CEST4973780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:30.677020073 CEST4973880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:30.677237988 CEST4973880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:30.681957960 CEST804973894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:32.062359095 CEST804973894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:32.062479019 CEST4973880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:32.171181917 CEST4973880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:32.176632881 CEST804973894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:32.819355965 CEST804973894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:32.819535017 CEST4973880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:33.051060915 CEST4973880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:33.054855108 CEST4973980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:33.056875944 CEST804973894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:33.057090998 CEST4973880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:33.059971094 CEST804973994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:33.060033083 CEST4973980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:33.060283899 CEST4973980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:33.065289021 CEST804973994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:34.400517941 CEST804973994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:34.400661945 CEST4973980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:34.515139103 CEST4973980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:34.515558004 CEST4974080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:34.520241022 CEST804973994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:34.520304918 CEST4973980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:34.520354033 CEST804974094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:34.520420074 CEST4974080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:34.520545959 CEST4974080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:34.525533915 CEST804974094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:35.848656893 CEST804974094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:35.848746061 CEST4974080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:35.968816042 CEST4974080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:35.969173908 CEST4974180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:35.975831032 CEST804974094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:35.975915909 CEST4974080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:35.976859093 CEST804974194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:35.977016926 CEST4974180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:35.977087975 CEST4974180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:35.983360052 CEST804974194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:37.306004047 CEST804974194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:37.306103945 CEST4974180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:37.424871922 CEST4974180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:37.425610065 CEST4974280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:37.431432962 CEST804974294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:37.431539059 CEST4974280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:37.431687117 CEST804974194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:37.431756020 CEST4974180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:37.431894064 CEST4974280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:37.437804937 CEST804974294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:38.817058086 CEST804974294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:38.818922043 CEST4974280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:38.936888933 CEST4974280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:38.937283993 CEST4974380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:38.944091082 CEST804974394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:38.944222927 CEST4974380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:38.944323063 CEST4974380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:38.944387913 CEST804974294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:38.944430113 CEST4974280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:38.952910900 CEST804974394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:40.339371920 CEST804974394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:40.339565039 CEST4974380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:40.452744961 CEST4974380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:40.453228951 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:40.458070993 CEST804974394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:40.458102942 CEST804974494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:40.458149910 CEST4974380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:40.458218098 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:40.458370924 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:40.463172913 CEST804974494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:41.842921972 CEST804974494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:41.843024969 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:41.953237057 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:41.958138943 CEST804974494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:42.610620975 CEST804974494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:42.610713959 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:42.718123913 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:42.723126888 CEST804974494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:43.382011890 CEST804974494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:43.382157087 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:43.499787092 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:43.500343084 CEST4974680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:43.505944967 CEST804974494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:43.506057024 CEST4974480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:43.506445885 CEST804974694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:43.506531954 CEST4974680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:43.506707907 CEST4974680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:43.511499882 CEST804974694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:45.020930052 CEST804974694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:45.021047115 CEST4974680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:45.140285969 CEST4974680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:45.140670061 CEST4974780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:45.145411968 CEST804974694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:45.145445108 CEST804974794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:45.145487070 CEST4974680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:45.145545006 CEST4974780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:45.145687103 CEST4974780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:45.150420904 CEST804974794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:46.507627964 CEST804974794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:46.507739067 CEST4974780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:46.624378920 CEST4974780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:46.624744892 CEST4974880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:46.629513025 CEST804974894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:46.629528999 CEST804974794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:46.629606009 CEST4974780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:46.629621029 CEST4974880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:46.629803896 CEST4974880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:46.634515047 CEST804974894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:47.950431108 CEST804974894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:47.950493097 CEST4974880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:48.061954021 CEST4974880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:48.066831112 CEST804974894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:48.839855909 CEST804974894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:48.840054035 CEST4974880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:48.952352047 CEST4974880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:48.952677965 CEST4974980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:48.957593918 CEST804974994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:48.957688093 CEST4974980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:48.957781076 CEST4974980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:48.957798958 CEST804974894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:48.957856894 CEST4974880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:48.962635994 CEST804974994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:50.333686113 CEST804974994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:50.333759069 CEST4974980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:50.452334881 CEST4974980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:50.452676058 CEST4975080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:50.457576990 CEST804975094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:50.457699060 CEST4975080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:50.457824945 CEST4975080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:50.457885981 CEST804974994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:50.457942963 CEST4974980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:50.462615967 CEST804975094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:51.840065002 CEST804975094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:51.840192080 CEST4975080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:51.952506065 CEST4975080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:51.952841997 CEST4975180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:51.957809925 CEST804975194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:51.957891941 CEST4975180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:51.958070993 CEST4975180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:51.959284067 CEST804975094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:51.959337950 CEST4975080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:51.963536024 CEST804975194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:53.279793024 CEST804975194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:53.279871941 CEST4975180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:53.390045881 CEST4975180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:53.394942045 CEST804975194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:54.003155947 CEST804975194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:54.003242016 CEST4975180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:54.124646902 CEST4975180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:54.124982119 CEST4975280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:54.129817009 CEST804975294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:54.129906893 CEST4975280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:54.130079985 CEST4975280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:54.137296915 CEST804975194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:54.137351990 CEST4975180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:54.137429953 CEST804975294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:55.447046995 CEST804975294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:55.447146893 CEST4975280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:55.561741114 CEST4975280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:55.562104940 CEST4975380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:55.568099976 CEST804975294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:55.568115950 CEST804975394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:55.568170071 CEST4975280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:55.568206072 CEST4975380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:55.568367004 CEST4975380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:55.574716091 CEST804975394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:56.880307913 CEST804975394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:56.880367041 CEST4975380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:56.999926090 CEST4975380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:57.000238895 CEST4975480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:57.005100012 CEST804975494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:57.005114079 CEST804975394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:57.005196095 CEST4975380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:57.005227089 CEST4975480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:57.005323887 CEST4975480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:57.010157108 CEST804975494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:58.296247959 CEST804975494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:58.296452045 CEST4975480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:58.405788898 CEST4975480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:58.410687923 CEST804975494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:59.020684004 CEST804975494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:59.020881891 CEST4975480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:59.140242100 CEST4975480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:59.140580893 CEST4975580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:59.145395994 CEST804975594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:59.145486116 CEST4975580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:59.145571947 CEST4975580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:59.145817041 CEST804975494.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:03:59.145898104 CEST4975480192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:03:59.154050112 CEST804975594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:00.526153088 CEST804975594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:00.526228905 CEST4975580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:00.655651093 CEST4975580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:00.655874014 CEST4975680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:00.660727978 CEST804975694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:00.660842896 CEST4975680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:00.660933018 CEST4975680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:00.660948038 CEST804975594.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:00.661006927 CEST4975580192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:00.665661097 CEST804975694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:02.043059111 CEST804975694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:02.043143988 CEST4975680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:02.161530972 CEST4975680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:02.165234089 CEST4975780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:02.166796923 CEST804975694.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:02.166871071 CEST4975680192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:02.170049906 CEST804975794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:02.170126915 CEST4975780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:02.172904968 CEST4975780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:02.177624941 CEST804975794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:03.500586033 CEST804975794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:03.500703096 CEST4975780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:03.610784054 CEST4975780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:03.611068964 CEST4975880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:03.617706060 CEST804975794.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:03.617774010 CEST4975780192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:03.617801905 CEST804975894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:03.617862940 CEST4975880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:03.617994070 CEST4975880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:03.623231888 CEST804975894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:04.907944918 CEST804975894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:04.908004999 CEST4975880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:05.016891956 CEST4975880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:05.017242908 CEST4975980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:05.021995068 CEST804975994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:05.022054911 CEST804975894.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:05.022067070 CEST4975980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:05.022126913 CEST4975880192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:05.022217989 CEST4975980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:05.026938915 CEST804975994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:06.283169031 CEST804975994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:06.283240080 CEST4975980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:06.413537979 CEST4975980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:06.413984060 CEST4976080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:06.418724060 CEST804975994.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:06.418786049 CEST4975980192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:06.418858051 CEST804976094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:06.418914080 CEST4976080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:06.419496059 CEST4976080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:06.424240112 CEST804976094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:07.647169113 CEST804976094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:07.648874044 CEST4976080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:07.767342091 CEST4976180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:07.767344952 CEST4976080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:07.772234917 CEST804976194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:07.772901058 CEST804976094.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:07.772964954 CEST4976180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:07.773089886 CEST4976180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:07.773221016 CEST4976080192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:07.777834892 CEST804976194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:09.038383007 CEST804976194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:09.040910006 CEST4976180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:09.175491095 CEST4976180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:09.175491095 CEST4976280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:09.180825949 CEST804976294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:09.181540012 CEST804976194.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:09.182154894 CEST4976180192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:09.182154894 CEST4976280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:09.182356119 CEST4976280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:09.187129974 CEST804976294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:10.528445005 CEST804976294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:10.528512001 CEST4976280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:10.642657042 CEST4976280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:10.642915010 CEST4976380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:10.647705078 CEST804976394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:10.647763968 CEST4976380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:10.647789955 CEST804976294.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:10.647830009 CEST4976280192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:10.647905111 CEST4976380192.168.2.694.156.8.14
                                                                                    Jun 11, 2024 20:04:10.652648926 CEST804976394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:12.029968977 CEST804976394.156.8.14192.168.2.6
                                                                                    Jun 11, 2024 20:04:12.030086994 CEST4976380192.168.2.694.156.8.14
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jun 11, 2024 20:02:59.666649103 CEST5223453192.168.2.691.211.247.248
                                                                                    Jun 11, 2024 20:02:59.704720020 CEST535223491.211.247.248192.168.2.6
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Jun 11, 2024 20:02:59.666649103 CEST192.168.2.691.211.247.2480x8959Standard query (0)aadolui.ruA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Jun 11, 2024 20:02:59.704720020 CEST91.211.247.248192.168.2.60x8959No error (0)aadolui.ru94.156.8.14A (IP address)IN (0x0001)false
                                                                                    • aadolui.ru
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.64972094.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:00.558790922 CEST317OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608ff710c2e79c923c HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:01.954236031 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:01 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.64972194.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:02.083472967 CEST317OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608ff710c2e79c923c HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:03.446904898 CEST1230INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:03 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 33 66 65 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 35 38 31 64 65 34 36 66 62 38 37 64 32 65 38 31 65 30 31 65 39 61 32 35 64 66 63 35 32 39 31 62 64 64 33 38 32 64 37 63 30 31 34 63 34 31 34 64 65 65 35 63 38 36 35 37 32 65 33 31 34 39 31 38 64 38 34 31 34 32 37 65 31 36 39 35 63 61 62 36 62 66 35 36 34 62 37 33 32 35 30 63 61 66 64 64 33 30 38 63 62 34 37 63 38 36 33 62 31 31 35 66 61 32 64 38 38 32 32 65 64 30 65 61 37 36 37 63 31 35 39 62 38 65 33 34 65 65 64 35 31 37 65 34 62 65 39 33 61 36 36 39 37 33 63 37 39 38 63 66 39 30 66 63 35 65 39 39 66 39 39 33 62 63 64 36 34 39 37 31 35 64 64 34 65 38 65 32 32 62 37 34 37 62 32 65 64 35 66 33 66 65 66 37 66 64 34 66 37 37 38 62 39 38 66 65 66 64 65 34 62 65 66 33 61 64 37 31 37 33 34 35 64 34 34 32 35 65 31 33 62 37 35 30 30 36 63 62 38 65 63 38 64 66 35 38 37 32 34 35 34 66 38 35 65 36 35 32 37 66 39 33 34 35 66 66 34 66 61 65 64 38 66 66 61 33 65 37 30 61 35 65 39 34 36 38 63 38 35 66 38 37 63 33 39 31 [TRUNCATED]
                                                                                    Data Ascii: 3fe67b68a8a3203a77b0418f55f677581de46fb87d2e81e01e9a25dfc5291bdd382d7c014c414dee5c86572e314918d841427e1695cab6bf564b73250cafdd308cb47c863b115fa2d8822ed0ea767c159b8e34eed517e4be93a66973c798cf90fc5e99f993bcd649715dd4e8e22b747b2ed5f3fef7fd4f778b98fefde4bef3ad717345d4425e13b75006cb8ec8df5872454f85e6527f9345ff4faed8ffa3e70a5e9468c85f87c391bb476ee9bcdb866d16b0e293961b255cbdeb33a2ca4c80abe0ab8a232b3ccce2e762b08cd31eb0defd6be0d4ad23f18c55ddeed659d33b6955dbce3d9a8ca3a26be78b6ec029ebebd735cbe8ef63faffc808c1eed14e251884472c7b5dffcdc4d79a09feb30ad74890f37a02ad626dc9e07d55fb0341a1d59c0d66e5c3b596482fa902b2c7e4e11cedcb0121af7d7b8e9dd3f7773f93785dc040f4583a3c0094f44d47d7e5b3448fdd0d2d2f1cb52823d6e47f479348223b7c796618c57de8d281515609bff94e8180fa62489d90c7102d929cdf19616773478973702ed5c4d766f9844daa6a2e234bdd6c812528d2dc8495785b7c967d35825b56ae23327b5678a561dcfa4a4a567afde049250d7dbcb55ac10b549f7adb0659ba52faa262b0d35c79d7914efbfcd4978ea2e382a140e8e6bee1fca43cd1684fec5851abc05d1eff091684ddf3b75f8df0d9a5c050744d [TRUNCATED]
                                                                                    Jun 11, 2024 20:03:06.281713009 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:06.944936991 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:06 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    2192.168.2.64972394.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:07.068331003 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:08.408154011 CEST1088INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:08 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 33 37 30 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 39 38 36 64 32 65 66 31 39 30 31 65 38 61 30 34 61 65 62 30 36 64 65 66 61 38 62 65 64 39 66 38 33 34 38 39 65 34 64 64 36 65 30 63 30 33 36 33 33 61 65 35 32 66 66 64 35 63 30 31 33 32 33 65 39 37 37 35 38 61 36 37 34 66 65 36 32 62 37 33 32 35 37 63 37 65 30 64 31 30 65 64 65 34 36 63 62 37 37 62 33 31 30 66 66 33 38 38 62 32 35 65 31 30 65 61 37 36 65 63 34 34 64 62 61 65 37 34 65 66 33 35 38 37 62 34 35 65 36 32 35 36 37 39 35 33 62 36 63 38 66 66 36 31 35 64 65 65 65 39 34 39 61 32 35 63 38 36 64 38 38 31 31 64 30 35 61 38 65 32 61 62 36 35 32 62 32 65 30 35 61 33 66 65 66 36 35 64 34 66 61 36 37 62 62 38 63 65 39 64 66 34 39 65 36 33 65 63 32 31 37 33 31 35 63 34 34 32 31 65 30 32 33 36 63 30 30 36 66 61 37 65 64 38 65 66 38 38 63 32 65 35 31 65 36 35 37 37 61 32 39 66 62 33 34 35 66 66 32 66 66 66 39 38 66 66 38 32 30 37 61 61 30 65 62 34 64 39 33 38 34 66 62 37 31 32 65 31 [TRUNCATED]
                                                                                    Data Ascii: 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


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    3192.168.2.64972594.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:08.537349939 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:09.904525995 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:09 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:10.015866995 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:10.662127972 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:10 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    4192.168.2.64972694.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:10.792999983 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:12.164022923 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:11 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    5192.168.2.64972994.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:12.287039042 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:13.642710924 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:13 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    6192.168.2.64973094.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:13.771404982 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:15.109380960 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:14 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:15.218492031 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:15.846194983 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:15 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    7192.168.2.64973194.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:15.981359959 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:17.235989094 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:17 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:17.343055010 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:17.896166086 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:17 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    8192.168.2.64973294.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:18.026242018 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:19.383019924 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:19 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    9192.168.2.64973394.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:19.507042885 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:20.887610912 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:20 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:20.999589920 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:21.650306940 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:21 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    10192.168.2.64973494.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:21.772011995 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:23.126228094 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:22 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:23.234594107 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:23.874078989 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:23 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:23.984682083 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:24.616264105 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:24 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    11192.168.2.64973594.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:24.741077900 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:26.104337931 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:25 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:26.217999935 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:26.839590073 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:26 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    12192.168.2.64973694.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:26.957935095 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:28.262629032 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:28 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:28.375163078 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:29.005793095 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:28 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    13192.168.2.64973794.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:29.131237030 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:30.504712105 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:30 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    14192.168.2.64973894.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:30.677237988 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:32.062359095 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:31 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:32.171181917 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:32.819355965 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:32 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    15192.168.2.64973994.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:33.060283899 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:34.400517941 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:34 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    16192.168.2.64974094.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:34.520545959 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:35.848656893 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:35 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    17192.168.2.64974194.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:35.977087975 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:37.306004047 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:37 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    18192.168.2.64974294.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:37.431894064 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:38.817058086 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:38 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    19192.168.2.64974394.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:38.944323063 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:40.339371920 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:40 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    20192.168.2.64974494.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:40.458370924 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:41.842921972 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:41 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:41.953237057 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:42.610620975 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:42 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:42.718123913 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:43.382011890 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:43 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    21192.168.2.64974694.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:43.506707907 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:45.020930052 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:44 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    22192.168.2.64974794.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:45.145687103 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:46.507627964 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:46 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    23192.168.2.64974894.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:46.629803896 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:47.950431108 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:47 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:48.061954021 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:48.839855909 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:48 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    24192.168.2.64974994.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:48.957781076 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:50.333686113 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:50 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    25192.168.2.64975094.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:50.457824945 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:51.840065002 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:51 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    26192.168.2.64975194.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:51.958070993 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:53.279793024 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:53 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:53.390045881 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:54.003155947 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:53 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    27192.168.2.64975294.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:54.130079985 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:55.447046995 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:55 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    28192.168.2.64975394.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:55.568367004 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:56.880307913 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:56 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    29192.168.2.64975494.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:57.005323887 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:58.296247959 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:58 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20
                                                                                    Jun 11, 2024 20:03:58.405788898 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:03:59.020684004 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:03:58 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    30192.168.2.64975594.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:03:59.145571947 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:00.526153088 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:00 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    31192.168.2.64975694.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:04:00.660933018 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:02.043059111 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:01 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    32192.168.2.64975794.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:04:02.172904968 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:03.500586033 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:03 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    33192.168.2.64975894.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:04:03.617994070 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:04.907944918 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:04 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    34192.168.2.64975994.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:04:05.022217989 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:06.283169031 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:06 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    35192.168.2.64976094.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:04:06.419496059 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:07.647169113 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:07 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    36192.168.2.64976194.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:04:07.773089886 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:09.038383007 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:08 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    37192.168.2.64976294.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:04:09.182356119 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:10.528445005 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:10 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    38192.168.2.64976394.156.8.14805068C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jun 11, 2024 20:04:10.647905111 CEST323OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86e4908f4996148ab2865b77f80ebad9c40f7cb63037ed2ab423a43b4383ba915d911ec07bb606a0708727e40ea678c45abbe74bfb0e2807e12571c17f3e83fe16c1e7949833c46791 HTTP/1.1
                                                                                    Host: aadolui.ru
                                                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                    Jun 11, 2024 20:04:12.029968977 CEST220INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.20.1
                                                                                    Date: Tue, 11 Jun 2024 18:04:11 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: keep-alive
                                                                                    X-Powered-By: PHP/7.4.33
                                                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: e67b680813008c20


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:14:02:03
                                                                                    Start date:11/06/2024
                                                                                    Path:C:\Users\user\Desktop\9MgoW3Y1ti.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\9MgoW3Y1ti.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:5'167'185 bytes
                                                                                    MD5 hash:B5782418B0D93145D5E7D5FF762C50E3
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:false

                                                                                    Target ID:2
                                                                                    Start time:14:02:04
                                                                                    Start date:11/06/2024
                                                                                    Path:C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\is-O879I.tmp\9MgoW3Y1ti.tmp" /SL5="$203EC,4916934,54272,C:\Users\user\Desktop\9MgoW3Y1ti.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:696'832 bytes
                                                                                    MD5 hash:8EF7001015E126E74BC41268504CA1E2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Antivirus matches:
                                                                                    • Detection: 3%, ReversingLabs
                                                                                    Reputation:low
                                                                                    Has exited:false

                                                                                    Target ID:3
                                                                                    Start time:14:02:06
                                                                                    Start date:11/06/2024
                                                                                    Path:C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe" -i
                                                                                    Imagebase:0x400000
                                                                                    File size:3'149'260 bytes
                                                                                    MD5 hash:05231A29BF2470E3D5FEA74C5FD84462
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000003.00000000.2196454307.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:4
                                                                                    Start time:14:02:06
                                                                                    Start date:11/06/2024
                                                                                    Path:C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\AppData\Local\RecordPad Sound Recorder\recordpadsoundrecorder32.exe" -s
                                                                                    Imagebase:0x400000
                                                                                    File size:3'149'260 bytes
                                                                                    MD5 hash:05231A29BF2470E3D5FEA74C5FD84462
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000004.00000000.2199461093.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000004.00000002.3438919346.00000000008B9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:false

                                                                                    Target ID:7
                                                                                    Start time:14:02:49
                                                                                    Start date:11/06/2024
                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                    Imagebase:0x7ff7403e0000
                                                                                    File size:55'320 bytes
                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:false

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:21.1%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:2.3%
                                                                                      Total number of Nodes:1514
                                                                                      Total number of Limit Nodes:21
                                                                                      execution_graph 5097 409d41 5134 409984 5097->5134 5099 409d46 5141 402f24 5099->5141 5101 409d4b 5102 4096e8 15 API calls 5101->5102 5105 409d50 5102->5105 5103 409da3 5104 4026c4 GetSystemTime 5103->5104 5106 409da8 5104->5106 5105->5103 5108 408cfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5105->5108 5107 409254 32 API calls 5106->5107 5109 409db0 5107->5109 5111 409d7f 5108->5111 5110 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5109->5110 5112 409dbd 5110->5112 5114 409d87 MessageBoxA 5111->5114 5113 406888 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 5112->5113 5115 409dca 5113->5115 5114->5103 5116 409d94 5114->5116 5117 406620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 5115->5117 5118 4057b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5116->5118 5119 409dda 5117->5119 5118->5103 5120 406598 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 5119->5120 5121 409deb 5120->5121 5122 403340 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5121->5122 5123 409df9 5122->5123 5124 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5123->5124 5125 409e09 5124->5125 5126 407440 23 API calls 5125->5126 5127 409e48 5126->5127 5128 402594 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5127->5128 5129 409e68 5128->5129 5130 40794c LocalAlloc TlsSetValue TlsGetValue TlsGetValue InterlockedExchange 5129->5130 5131 409eaa 5130->5131 5132 407bdc 23 API calls 5131->5132 5133 409ed1 5132->5133 5135 4099a5 5134->5135 5136 40998d 5134->5136 5138 4057e0 4 API calls 5135->5138 5146 4057e0 5136->5146 5140 4099b6 5138->5140 5139 40999f 5139->5099 5140->5099 5142 403154 4 API calls 5141->5142 5143 402f29 5142->5143 5182 402bcc 5143->5182 5145 402f51 5145->5145 5147 4057e7 5146->5147 5150 4031e8 5147->5150 5151 4031ec 5150->5151 5152 4031fc 5150->5152 5151->5152 5156 403254 5151->5156 5153 403228 5152->5153 5161 4025ac 5152->5161 5153->5139 5157 403274 5156->5157 5158 403258 5156->5158 5157->5152 5165 402594 5158->5165 5160 403261 5160->5152 5162 4025b0 5161->5162 5163 4025ba 5161->5163 5162->5163 5164 403154 4 API calls 5162->5164 5163->5153 5163->5163 5164->5163 5166 402598 5165->5166 5167 4025a2 5165->5167 5166->5167 5169 403154 5166->5169 5167->5160 5167->5167 5170 403164 5169->5170 5171 40318c TlsGetValue 5169->5171 5170->5167 5172 403196 5171->5172 5173 40316f 5171->5173 5172->5167 5177 40310c 5173->5177 5175 403174 TlsGetValue 5176 403184 5175->5176 5176->5167 5178 403120 LocalAlloc 5177->5178 5179 403116 5177->5179 5180 40313e TlsSetValue 5178->5180 5181 403132 5178->5181 5179->5178 5180->5181 5181->5175 5183 402bd5 RaiseException 5182->5183 5184 402be6 5182->5184 5183->5184 5184->5145 6183 408f42 6184 408f34 6183->6184 6185 408ed0 Wow64RevertWow64FsRedirection 6184->6185 6186 408f3c 6185->6186 6187 408f44 SetLastError 6188 408f4d 6187->6188 6189 402b48 RaiseException 6196 40294a 6197 402952 6196->6197 6198 402967 6197->6198 6199 403554 4 API calls 6197->6199 6199->6197 6200 403f4a 6201 403f53 6200->6201 6202 403f5c 6200->6202 6204 403f07 6201->6204 6205 403f09 6204->6205 6209 403e9c 6205->6209 6210 403154 4 API calls 6205->6210 6213 403f3d 6205->6213 6227 403e9c 6205->6227 6206 403f3c 6206->6202 6208 403ef2 6211 402674 4 API calls 6208->6211 6209->6206 6209->6208 6215 403ea9 6209->6215 6218 403e8e 6209->6218 6210->6205 6214 403ecf 6211->6214 6213->6202 6214->6202 6215->6214 6217 402674 4 API calls 6215->6217 6217->6214 6219 403e4c 6218->6219 6220 403e67 6219->6220 6221 403e62 6219->6221 6222 403e7b 6219->6222 6225 403e78 6220->6225 6226 402674 4 API calls 6220->6226 6224 403cc8 4 API calls 6221->6224 6223 402674 4 API calls 6222->6223 6223->6225 6224->6220 6225->6208 6225->6215 6226->6225 6228 403ed7 6227->6228 6233 403ea9 6227->6233 6229 403ef2 6228->6229 6232 403e8e 4 API calls 6228->6232 6230 402674 4 API calls 6229->6230 6231 403ecf 6230->6231 6231->6205 6234 403ee6 6232->6234 6233->6231 6235 402674 4 API calls 6233->6235 6234->6229 6234->6233 6235->6231 5885 403a52 5886 403a74 5885->5886 5887 403a5a WriteFile 5885->5887 5887->5886 5888 403a78 GetLastError 5887->5888 5888->5886 5889 402654 5890 403154 4 API calls 5889->5890 5891 402614 5890->5891 5892 402632 5891->5892 5893 403154 4 API calls 5891->5893 5893->5892 5894 408e54 5897 408d20 5894->5897 5898 408d29 5897->5898 5899 403198 4 API calls 5898->5899 5900 408d37 5898->5900 5899->5898 6240 40755a GetFileSize 6241 407586 6240->6241 6242 407576 GetLastError 6240->6242 6242->6241 6243 40757f 6242->6243 6244 4073ec 21 API calls 6243->6244 6244->6241 6245 406f5b 6246 406f68 SetErrorMode 6245->6246 6251 40a161 6252 40a0d3 6251->6252 6253 40a0ff 6252->6253 6255 4093fc 9 API calls 6252->6255 6254 40a118 6253->6254 6258 40a112 RemoveDirectoryA 6253->6258 6256 40a121 73EA5CF0 6254->6256 6257 40a12c 6254->6257 6255->6253 6256->6257 6259 40a154 6257->6259 6260 40357c 4 API calls 6257->6260 6258->6254 6261 40a14a 6260->6261 6262 4025ac 4 API calls 6261->6262 6262->6259 5905 402e64 5906 402e69 5905->5906 5907 402e7a RtlUnwind 5906->5907 5908 402e5e 5906->5908 5909 402e9d 5907->5909 6267 40a168 6268 40a16f 6267->6268 6270 40a19a 6267->6270 6277 40936c 6268->6277 6272 403198 4 API calls 6270->6272 6271 40a174 6271->6270 6274 40a192 MessageBoxA 6271->6274 6273 40a1d2 6272->6273 6275 403198 4 API calls 6273->6275 6274->6270 6276 40a1da 6275->6276 6278 4093d3 ExitWindowsEx 6277->6278 6279 409378 GetCurrentProcess OpenProcessToken 6277->6279 6281 40938a 6278->6281 6280 40938e LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6279->6280 6279->6281 6280->6278 6280->6281 6281->6271 5677 406f77 5678 406f68 SetErrorMode 5677->5678 6294 403f7d 6295 403fa2 6294->6295 6298 403f84 6294->6298 6297 403e8e 4 API calls 6295->6297 6295->6298 6296 403f8c 6297->6298 6298->6296 6299 402674 4 API calls 6298->6299 6300 403fca 6299->6300 6301 403d02 6307 403d12 6301->6307 6302 403ddf ExitProcess 6303 403db8 6305 403cc8 4 API calls 6303->6305 6304 403dea 6306 403dc2 6305->6306 6308 403cc8 4 API calls 6306->6308 6307->6302 6307->6303 6307->6304 6311 403da4 6307->6311 6312 403d8f MessageBoxA 6307->6312 6309 403dcc 6308->6309 6321 4019dc 6309->6321 6317 403fe4 6311->6317 6312->6303 6313 403dd1 6313->6302 6313->6304 6318 403fe8 6317->6318 6319 403f07 4 API calls 6318->6319 6320 404006 6319->6320 6322 401abb 6321->6322 6323 4019ed 6321->6323 6322->6313 6324 401a04 RtlEnterCriticalSection 6323->6324 6325 401a0e LocalFree 6323->6325 6324->6325 6326 401a41 6325->6326 6327 401a2f VirtualFree 6326->6327 6328 401a49 6326->6328 6327->6326 6329 401a70 LocalFree 6328->6329 6330 401a87 6328->6330 6329->6329 6329->6330 6331 401aa9 RtlDeleteCriticalSection 6330->6331 6332 401a9f RtlLeaveCriticalSection 6330->6332 6331->6313 6332->6331 5918 404206 5919 4041cc 5918->5919 5920 40420a 5918->5920 5921 404282 5920->5921 5922 403154 4 API calls 5920->5922 5923 404323 5922->5923 5924 402c08 5925 402c82 5924->5925 5928 402c19 5924->5928 5926 402c56 RtlUnwind 5927 403154 4 API calls 5926->5927 5927->5925 5928->5925 5928->5926 5931 402b28 5928->5931 5932 402b31 RaiseException 5931->5932 5933 402b47 5931->5933 5932->5933 5933->5926 6343 409f0b 6344 409984 4 API calls 6343->6344 6345 409f10 6344->6345 6346 409f15 6345->6346 6347 402f24 5 API calls 6345->6347 6348 407878 InterlockedExchange 6346->6348 6347->6346 6349 409f3f 6348->6349 6350 409f4f 6349->6350 6351 409984 4 API calls 6349->6351 6352 40760c 22 API calls 6350->6352 6351->6350 6353 409f6b 6352->6353 6354 4025ac 4 API calls 6353->6354 6355 409fa2 6354->6355 5865 40760c SetEndOfFile 5866 407623 5865->5866 5867 40761c 5865->5867 5868 4073ec 21 API calls 5867->5868 5868->5866 5934 403018 5935 403025 5934->5935 5939 403070 5934->5939 5936 40302a RtlUnwind 5935->5936 5937 40304e 5936->5937 5940 402f78 5937->5940 5941 402be8 5937->5941 5942 402bf1 RaiseException 5941->5942 5943 402c04 5941->5943 5942->5943 5943->5939 5948 407c23 5951 407c29 5948->5951 5949 40322c 4 API calls 5950 407cc1 5949->5950 5952 4032fc 4 API calls 5950->5952 5951->5949 5953 407ccb 5952->5953 5954 4057e0 4 API calls 5953->5954 5955 407cda 5954->5955 5956 403198 4 API calls 5955->5956 5957 407cf4 5956->5957 5185 407524 SetFilePointer 5186 407557 5185->5186 5187 407547 GetLastError 5185->5187 5187->5186 5188 407550 5187->5188 5190 4073ec GetLastError 5188->5190 5193 40734c 5190->5193 5202 4071e4 FormatMessageA 5193->5202 5196 407394 5198 4057e0 4 API calls 5196->5198 5199 4073a3 5198->5199 5209 403198 5199->5209 5203 40720a 5202->5203 5213 403278 5203->5213 5206 4050e4 5218 4050f8 5206->5218 5210 4031b7 5209->5210 5211 40319e 5209->5211 5210->5186 5211->5210 5212 4025ac 4 API calls 5211->5212 5212->5210 5214 403254 4 API calls 5213->5214 5215 403288 5214->5215 5216 403198 4 API calls 5215->5216 5217 4032a0 5216->5217 5217->5196 5217->5206 5219 405115 5218->5219 5226 404da8 5219->5226 5221 405141 5224 403278 4 API calls 5221->5224 5225 4050f3 5224->5225 5225->5196 5229 404dc3 5226->5229 5227 404dd5 5227->5221 5231 404b34 5227->5231 5229->5227 5234 404eca 5229->5234 5241 404d9c 5229->5241 5332 405890 5231->5332 5233 404b45 5233->5221 5235 404edb 5234->5235 5237 404f29 5234->5237 5235->5237 5238 404faf 5235->5238 5240 404f47 5237->5240 5244 404d44 5237->5244 5238->5240 5248 404d88 5238->5248 5240->5229 5242 403198 4 API calls 5241->5242 5243 404da6 5242->5243 5243->5229 5245 404d52 5244->5245 5251 404b4c 5245->5251 5247 404d80 5247->5237 5271 4039a4 5248->5271 5254 405900 5251->5254 5253 404b65 5253->5247 5255 40590e 5254->5255 5264 404c2c LoadStringA 5255->5264 5258 4050e4 19 API calls 5259 405946 5258->5259 5260 4031e8 4 API calls 5259->5260 5261 405951 5260->5261 5267 4031b8 5261->5267 5265 403278 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5264->5265 5266 404c59 5265->5266 5266->5258 5269 4031be 5267->5269 5268 4031e3 5268->5253 5269->5268 5270 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5269->5270 5270->5269 5272 4039ab 5271->5272 5277 4038b4 5272->5277 5274 4039cb 5275 403198 4 API calls 5274->5275 5276 4039d2 5275->5276 5276->5240 5278 4038d5 5277->5278 5279 4038c8 5277->5279 5281 403934 5278->5281 5282 4038db 5278->5282 5305 403780 5279->5305 5285 403993 5281->5285 5286 40393b 5281->5286 5283 4038e1 5282->5283 5284 4038ee 5282->5284 5312 403894 5283->5312 5289 403894 6 API calls 5284->5289 5290 4037f4 3 API calls 5285->5290 5291 403941 5286->5291 5292 40394b 5286->5292 5287 4038d0 5287->5274 5294 4038fc 5289->5294 5290->5287 5327 403864 5291->5327 5293 4037f4 3 API calls 5292->5293 5296 40395d 5293->5296 5317 4037f4 5294->5317 5298 403864 9 API calls 5296->5298 5300 403976 5298->5300 5299 403917 5323 40374c 5299->5323 5302 40374c VariantClear 5300->5302 5304 40398b 5302->5304 5303 40392c 5303->5274 5304->5274 5306 4037f0 5305->5306 5307 403744 5305->5307 5306->5287 5307->5305 5308 403793 VariantClear 5307->5308 5309 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5307->5309 5310 4037dc VariantCopyInd 5307->5310 5311 4037ab 5307->5311 5308->5307 5309->5307 5310->5306 5310->5307 5311->5287 5313 4036b8 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5312->5313 5314 4038a0 5313->5314 5315 40374c VariantClear 5314->5315 5316 4038a9 5315->5316 5316->5287 5318 403845 VariantChangeTypeEx 5317->5318 5319 40380a VariantChangeTypeEx 5317->5319 5322 403832 5318->5322 5320 403826 5319->5320 5321 40374c VariantClear 5320->5321 5321->5322 5322->5299 5324 403766 5323->5324 5325 403759 5323->5325 5324->5303 5325->5324 5326 403779 VariantClear 5325->5326 5326->5303 5328 40369c 8 API calls 5327->5328 5329 40387b 5328->5329 5330 40374c VariantClear 5329->5330 5331 403882 5330->5331 5331->5287 5333 40589c 5332->5333 5334 404c2c 5 API calls 5333->5334 5335 4058c2 5334->5335 5336 4031e8 4 API calls 5335->5336 5337 4058cd 5336->5337 5338 403198 4 API calls 5337->5338 5339 4058e2 5338->5339 5339->5233 5340 409b24 5379 4030dc 5340->5379 5342 409b3a 5382 4042e8 5342->5382 5344 409b3f 5385 406518 5344->5385 5348 409b49 5395 408fc8 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5348->5395 5357 4031e8 4 API calls 5358 409b95 5357->5358 5431 407440 5358->5431 5363 409984 4 API calls 5365 409c22 5363->5365 5451 407400 5365->5451 5367 409be4 5367->5363 5367->5365 5368 409c63 5455 40794c 5368->5455 5369 409c48 5369->5368 5370 409984 4 API calls 5369->5370 5370->5368 5372 409c88 5465 408a2c 5372->5465 5376 408a2c 23 API calls 5378 409cce 5376->5378 5377 409d07 5378->5376 5378->5377 5487 403094 5379->5487 5381 4030e1 GetModuleHandleA GetCommandLineA 5381->5342 5383 403154 4 API calls 5382->5383 5384 404323 5382->5384 5383->5384 5384->5344 5488 405bf8 5385->5488 5394 406564 6F9E1CD0 5394->5348 5396 40901b 5395->5396 5578 406f00 SetErrorMode 5396->5578 5399 4071e4 5 API calls 5400 40904b 5399->5400 5401 403198 4 API calls 5400->5401 5402 409060 5401->5402 5403 409a14 GetSystemInfo VirtualQuery 5402->5403 5404 409ac8 5403->5404 5407 409a3e 5403->5407 5409 409580 5404->5409 5405 409aa9 VirtualQuery 5405->5404 5405->5407 5406 409a68 VirtualProtect 5406->5407 5407->5404 5407->5405 5407->5406 5408 409a97 VirtualProtect 5407->5408 5408->5405 5584 406b30 GetCommandLineA 5409->5584 5411 40963d 5413 4031b8 4 API calls 5411->5413 5412 406b8c 6 API calls 5416 40959d 5412->5416 5414 409657 5413->5414 5417 406b8c 5414->5417 5415 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5415->5416 5416->5411 5416->5412 5416->5415 5418 406bb3 GetModuleFileNameA 5417->5418 5419 406bd7 GetCommandLineA 5417->5419 5420 403278 4 API calls 5418->5420 5421 406bdc 5419->5421 5423 406bd5 5420->5423 5422 406be1 5421->5422 5425 406a50 4 API calls 5421->5425 5427 406be9 5421->5427 5424 403198 4 API calls 5422->5424 5426 406c04 5423->5426 5424->5427 5425->5421 5428 403198 4 API calls 5426->5428 5429 40322c 4 API calls 5427->5429 5430 406c19 5428->5430 5429->5426 5430->5357 5432 40744a 5431->5432 5605 4074d6 5432->5605 5608 4074d8 5432->5608 5433 407476 5434 40748a 5433->5434 5435 4073ec 21 API calls 5433->5435 5438 409ad0 FindResourceA 5434->5438 5435->5434 5439 409ae5 5438->5439 5440 409aea SizeofResource 5438->5440 5441 409984 4 API calls 5439->5441 5442 409af7 5440->5442 5443 409afc LoadResource 5440->5443 5441->5440 5444 409984 4 API calls 5442->5444 5445 409b0a 5443->5445 5446 409b0f LockResource 5443->5446 5444->5443 5447 409984 4 API calls 5445->5447 5448 409b20 5446->5448 5449 409b1b 5446->5449 5447->5446 5448->5367 5481 407878 5448->5481 5450 409984 4 API calls 5449->5450 5450->5448 5452 407414 5451->5452 5453 407424 5452->5453 5454 40734c 20 API calls 5452->5454 5453->5369 5454->5453 5456 407959 5455->5456 5457 4057e0 4 API calls 5456->5457 5458 4079ad 5456->5458 5457->5458 5459 407878 InterlockedExchange 5458->5459 5460 4079bf 5459->5460 5461 4057e0 4 API calls 5460->5461 5462 4079d5 5460->5462 5461->5462 5463 407a18 5462->5463 5464 4057e0 4 API calls 5462->5464 5463->5372 5464->5463 5469 408a5d 5465->5469 5479 408aa6 5465->5479 5466 408af1 5620 407bdc 5466->5620 5467 407bdc 23 API calls 5467->5469 5469->5467 5474 4031e8 4 API calls 5469->5474 5476 403420 4 API calls 5469->5476 5469->5479 5611 4034f0 5469->5611 5470 408b08 5473 4031b8 4 API calls 5470->5473 5472 4034f0 4 API calls 5472->5479 5475 408b22 5473->5475 5474->5469 5484 404b70 5475->5484 5476->5469 5477 403420 4 API calls 5477->5479 5478 4031e8 4 API calls 5478->5479 5479->5466 5479->5472 5479->5477 5479->5478 5480 407bdc 23 API calls 5479->5480 5480->5479 5673 407824 5481->5673 5485 402594 4 API calls 5484->5485 5486 404b7b 5485->5486 5486->5378 5487->5381 5489 405890 5 API calls 5488->5489 5490 405c09 5489->5490 5491 4051d0 GetSystemDefaultLCID 5490->5491 5494 405206 5491->5494 5492 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5492->5494 5493 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5493->5494 5494->5492 5494->5493 5495 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5494->5495 5499 405268 5494->5499 5495->5494 5496 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5496->5499 5497 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5497->5499 5498 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5498->5499 5499->5496 5499->5497 5499->5498 5500 4052eb 5499->5500 5501 4031b8 4 API calls 5500->5501 5502 405305 5501->5502 5503 405314 GetSystemDefaultLCID 5502->5503 5560 40515c GetLocaleInfoA 5503->5560 5506 4031e8 4 API calls 5507 405354 5506->5507 5508 40515c 5 API calls 5507->5508 5509 405369 5508->5509 5510 40515c 5 API calls 5509->5510 5511 40538d 5510->5511 5566 4051a8 GetLocaleInfoA 5511->5566 5514 4051a8 GetLocaleInfoA 5515 4053bd 5514->5515 5516 40515c 5 API calls 5515->5516 5517 4053d7 5516->5517 5518 4051a8 GetLocaleInfoA 5517->5518 5519 4053f4 5518->5519 5520 40515c 5 API calls 5519->5520 5521 40540e 5520->5521 5522 4031e8 4 API calls 5521->5522 5523 40541b 5522->5523 5524 40515c 5 API calls 5523->5524 5525 405430 5524->5525 5526 4031e8 4 API calls 5525->5526 5527 40543d 5526->5527 5528 4051a8 GetLocaleInfoA 5527->5528 5529 40544b 5528->5529 5530 40515c 5 API calls 5529->5530 5531 405465 5530->5531 5532 4031e8 4 API calls 5531->5532 5533 405472 5532->5533 5534 40515c 5 API calls 5533->5534 5535 405487 5534->5535 5536 4031e8 4 API calls 5535->5536 5537 405494 5536->5537 5538 40515c 5 API calls 5537->5538 5539 4054a9 5538->5539 5540 4054c6 5539->5540 5541 4054b7 5539->5541 5543 40322c 4 API calls 5540->5543 5574 40322c 5541->5574 5544 4054c4 5543->5544 5545 40515c 5 API calls 5544->5545 5546 4054e8 5545->5546 5547 405505 5546->5547 5548 4054f6 5546->5548 5549 403198 4 API calls 5547->5549 5550 40322c 4 API calls 5548->5550 5551 405503 5549->5551 5550->5551 5568 4033b4 5551->5568 5553 405527 5554 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5553->5554 5555 405541 5554->5555 5556 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5555->5556 5557 40555b 5556->5557 5558 405c44 GetVersionExA 5557->5558 5559 405c5b 5558->5559 5559->5394 5561 405183 5560->5561 5562 405195 5560->5562 5563 403278 4 API calls 5561->5563 5564 40322c 4 API calls 5562->5564 5565 405193 5563->5565 5564->5565 5565->5506 5567 4051c4 5566->5567 5567->5514 5569 4033bc 5568->5569 5570 403254 4 API calls 5569->5570 5571 4033cf 5570->5571 5572 4031e8 4 API calls 5571->5572 5573 4033f7 5572->5573 5576 403230 5574->5576 5575 403252 5575->5544 5576->5575 5577 4025ac 4 API calls 5576->5577 5577->5575 5582 403414 5578->5582 5581 406f4e 5581->5399 5583 403418 LoadLibraryA 5582->5583 5583->5581 5591 406a50 5584->5591 5586 406b53 5587 406b65 5586->5587 5588 406a50 4 API calls 5586->5588 5589 403198 4 API calls 5587->5589 5588->5586 5590 406b7a 5589->5590 5590->5416 5592 406a7c 5591->5592 5593 403278 4 API calls 5592->5593 5594 406a89 5593->5594 5601 403420 5594->5601 5596 406a91 5597 4031e8 4 API calls 5596->5597 5598 406aa9 5597->5598 5599 403198 4 API calls 5598->5599 5600 406acb 5599->5600 5600->5586 5602 403426 5601->5602 5604 403437 5601->5604 5603 403254 4 API calls 5602->5603 5602->5604 5603->5604 5604->5596 5606 4074d8 5605->5606 5607 407517 CreateFileA 5606->5607 5607->5433 5609 403414 5608->5609 5610 407517 CreateFileA 5609->5610 5610->5433 5612 4034fd 5611->5612 5619 40352d 5611->5619 5614 403526 5612->5614 5616 403509 5612->5616 5613 403198 4 API calls 5615 403517 5613->5615 5617 403254 4 API calls 5614->5617 5615->5469 5628 4025c4 5616->5628 5617->5619 5619->5613 5621 407bf7 5620->5621 5622 407bec 5620->5622 5643 407b80 5621->5643 5632 407dfc 5622->5632 5624 407bf5 5624->5470 5626 4057e0 4 API calls 5626->5624 5629 4025ca 5628->5629 5630 403154 4 API calls 5629->5630 5631 4025dc 5629->5631 5630->5631 5631->5615 5633 407e11 5632->5633 5635 407e20 5633->5635 5650 407d14 5633->5650 5636 407e5a 5635->5636 5637 407d14 19 API calls 5635->5637 5638 407e6e 5636->5638 5639 407d14 19 API calls 5636->5639 5637->5636 5642 407e9a 5638->5642 5647 407da4 5638->5647 5639->5638 5642->5624 5644 407bd3 5643->5644 5645 407b94 5643->5645 5644->5624 5644->5626 5645->5644 5661 407ad0 5645->5661 5648 407db3 VirtualFree 5647->5648 5649 407dc5 VirtualAlloc 5647->5649 5648->5649 5649->5642 5653 405814 5650->5653 5652 407d36 5652->5635 5654 405820 5653->5654 5655 4050e4 19 API calls 5654->5655 5656 40584d 5655->5656 5657 4031e8 4 API calls 5656->5657 5658 405858 5657->5658 5659 403198 4 API calls 5658->5659 5660 40586d 5659->5660 5660->5652 5662 407aec 5661->5662 5663 407adb 5661->5663 5665 407400 20 API calls 5662->5665 5664 4057e0 4 API calls 5663->5664 5664->5662 5666 407b00 5665->5666 5667 407400 20 API calls 5666->5667 5668 407b21 5667->5668 5669 407878 InterlockedExchange 5668->5669 5670 407b36 5669->5670 5671 407b4c 5670->5671 5672 4057e0 4 API calls 5670->5672 5671->5645 5672->5671 5674 407836 5673->5674 5675 407847 5673->5675 5676 40783b InterlockedExchange 5674->5676 5675->5367 5676->5675 5958 405a24 5959 405a34 5958->5959 5960 405a2c 5958->5960 5961 405a32 5960->5961 5962 405a3b 5960->5962 5965 40599c 5961->5965 5963 405890 5 API calls 5962->5963 5963->5959 5966 4059a4 5965->5966 5967 4059be 5966->5967 5970 403154 4 API calls 5966->5970 5968 4059c3 5967->5968 5969 4059da 5967->5969 5971 405890 5 API calls 5968->5971 5972 403154 4 API calls 5969->5972 5970->5966 5974 4059d6 5971->5974 5973 4059df 5972->5973 5975 405900 19 API calls 5973->5975 5976 403154 4 API calls 5974->5976 5975->5974 5977 405a08 5976->5977 5978 403154 4 API calls 5977->5978 5979 405a16 5978->5979 5979->5959 6364 409d26 6365 409d4b 6364->6365 6416 4096e8 6365->6416 6367 409da3 6444 4026c4 GetSystemTime 6367->6444 6369 409d50 6369->6367 6437 408cfc 6369->6437 6370 409da8 6398 409254 6370->6398 6374 409d7f 6378 409d87 MessageBoxA 6374->6378 6375 4031e8 4 API calls 6376 409dbd 6375->6376 6445 406888 6376->6445 6378->6367 6380 409d94 6378->6380 6440 4057b4 6380->6440 6385 409deb 6472 403340 6385->6472 6387 409df9 6388 4031e8 4 API calls 6387->6388 6389 409e09 6388->6389 6390 407440 23 API calls 6389->6390 6391 409e48 6390->6391 6392 402594 4 API calls 6391->6392 6393 409e68 6392->6393 6394 40794c 5 API calls 6393->6394 6395 409eaa 6394->6395 6396 407bdc 23 API calls 6395->6396 6397 409ed1 6396->6397 6407 409274 6398->6407 6401 409299 CreateDirectoryA 6402 409311 6401->6402 6403 4092a3 GetLastError 6401->6403 6404 40322c 4 API calls 6402->6404 6403->6407 6405 40931b 6404->6405 6408 4031b8 4 API calls 6405->6408 6406 408cfc 4 API calls 6406->6407 6407->6401 6407->6406 6409 404be4 19 API calls 6407->6409 6412 4071e4 5 API calls 6407->6412 6414 408ccc 4 API calls 6407->6414 6415 4057e0 4 API calls 6407->6415 6487 406c54 6407->6487 6510 409148 6407->6510 6410 409335 6408->6410 6409->6407 6411 4031b8 4 API calls 6410->6411 6413 409342 6411->6413 6412->6407 6413->6375 6414->6407 6415->6407 6417 409731 6416->6417 6422 4096f5 6416->6422 6418 40973a 6417->6418 6419 40973e 6417->6419 6420 409747 GetUserDefaultLangID 6418->6420 6429 40973c 6418->6429 6616 406f84 GetModuleHandleA GetProcAddress 6419->6616 6420->6429 6422->6417 6425 409721 6422->6425 6424 4097ef 6426 40969c 5 API calls 6424->6426 6427 40969c 5 API calls 6425->6427 6428 409728 6426->6428 6427->6428 6428->6369 6429->6424 6430 409791 6429->6430 6431 409787 GetACP 6429->6431 6432 40979e 6429->6432 6433 40969c 5 API calls 6430->6433 6431->6429 6431->6430 6432->6424 6434 4097e2 6432->6434 6435 4097d8 GetACP 6432->6435 6433->6428 6436 40969c 5 API calls 6434->6436 6435->6432 6435->6434 6436->6428 6438 408ccc 4 API calls 6437->6438 6439 408d18 6438->6439 6439->6374 6441 4057b9 6440->6441 6442 405890 5 API calls 6441->6442 6443 4057cb 6442->6443 6443->6443 6444->6370 6660 406780 6445->6660 6448 403454 4 API calls 6449 4068aa 6448->6449 6450 406620 6449->6450 6665 406844 6450->6665 6453 406650 6456 403340 4 API calls 6453->6456 6454 40665e 6455 403454 4 API calls 6454->6455 6457 406671 6455->6457 6458 40665c 6456->6458 6459 403340 4 API calls 6457->6459 6460 403198 4 API calls 6458->6460 6459->6458 6461 406693 6460->6461 6462 406598 6461->6462 6463 4065a2 6462->6463 6464 4065c5 6462->6464 6671 4068b0 6463->6671 6465 40322c 4 API calls 6464->6465 6468 4065ce 6465->6468 6467 4065a9 6467->6464 6469 4065b4 6467->6469 6468->6385 6470 403340 4 API calls 6469->6470 6471 4065c2 6470->6471 6471->6385 6473 403344 6472->6473 6474 4033a5 6472->6474 6475 4031e8 6473->6475 6476 40334c 6473->6476 6477 4031fc 6475->6477 6481 403254 4 API calls 6475->6481 6476->6474 6478 40335b 6476->6478 6480 4031e8 4 API calls 6476->6480 6479 403228 6477->6479 6483 4025ac 4 API calls 6477->6483 6482 403254 4 API calls 6478->6482 6479->6387 6480->6478 6481->6477 6484 403375 6482->6484 6483->6479 6485 4031e8 4 API calls 6484->6485 6486 4033a1 6485->6486 6486->6387 6529 4069b8 6487->6529 6490 406c86 6492 4069b8 5 API calls 6490->6492 6494 406cd2 6490->6494 6493 406c96 6492->6493 6495 406ca2 6493->6495 6497 406994 7 API calls 6493->6497 6537 4067e8 6494->6537 6495->6494 6498 406cc7 6495->6498 6501 4069b8 5 API calls 6495->6501 6497->6495 6498->6494 6549 406c28 GetWindowsDirectoryA 6498->6549 6503 406cbb 6501->6503 6502 406598 5 API calls 6504 406ce7 6502->6504 6503->6498 6505 406994 7 API calls 6503->6505 6506 40322c 4 API calls 6504->6506 6505->6498 6507 406cf1 6506->6507 6508 4031b8 4 API calls 6507->6508 6509 406d0b 6508->6509 6509->6407 6511 409168 6510->6511 6512 406598 5 API calls 6511->6512 6513 409181 6512->6513 6514 40322c 4 API calls 6513->6514 6515 40918c 6514->6515 6516 4068d8 6 API calls 6515->6516 6518 408cfc 4 API calls 6515->6518 6519 4033b4 4 API calls 6515->6519 6521 4057e0 4 API calls 6515->6521 6522 409208 6515->6522 6589 4090d4 6515->6589 6597 408f58 6515->6597 6516->6515 6518->6515 6519->6515 6521->6515 6523 40322c 4 API calls 6522->6523 6524 409213 6523->6524 6525 4031b8 4 API calls 6524->6525 6526 40922d 6525->6526 6527 403198 4 API calls 6526->6527 6528 409235 6527->6528 6528->6407 6530 4034f0 4 API calls 6529->6530 6531 4069cb 6530->6531 6532 4069e2 GetEnvironmentVariableA 6531->6532 6536 4069f5 6531->6536 6551 406d4c 6531->6551 6532->6531 6533 4069ee 6532->6533 6534 403198 4 API calls 6533->6534 6534->6536 6536->6490 6546 406994 6536->6546 6538 403414 6537->6538 6539 40680b GetFullPathNameA 6538->6539 6540 406817 6539->6540 6541 40682e 6539->6541 6540->6541 6542 40681f 6540->6542 6543 40322c 4 API calls 6541->6543 6544 403278 4 API calls 6542->6544 6545 40682c 6543->6545 6544->6545 6545->6502 6555 40693c 6546->6555 6550 406c49 6549->6550 6550->6494 6552 406d5a 6551->6552 6553 4034f0 4 API calls 6552->6553 6554 406d68 6553->6554 6554->6531 6562 4068d8 6555->6562 6557 40695e 6558 406966 GetFileAttributesA 6557->6558 6559 40697b 6558->6559 6560 403198 4 API calls 6559->6560 6561 406983 6560->6561 6561->6490 6572 4066a4 6562->6572 6564 4068e9 6565 406910 6564->6565 6579 4068d0 CharPrevA 6564->6579 6567 406926 6565->6567 6568 40691b 6565->6568 6580 403454 6567->6580 6569 40322c 4 API calls 6568->6569 6571 406924 6569->6571 6571->6557 6575 4066b5 6572->6575 6573 406719 6574 4065e0 IsDBCSLeadByte 6573->6574 6576 406714 6573->6576 6574->6576 6575->6573 6578 4066d3 6575->6578 6576->6564 6578->6576 6587 4065e0 IsDBCSLeadByte 6578->6587 6579->6564 6581 403486 6580->6581 6582 403459 6580->6582 6583 403198 4 API calls 6581->6583 6582->6581 6585 40346d 6582->6585 6584 40347c 6583->6584 6584->6571 6586 403278 4 API calls 6585->6586 6586->6584 6588 4065f4 6587->6588 6588->6578 6590 403198 4 API calls 6589->6590 6592 4090f5 6590->6592 6594 409122 6592->6594 6606 4032a8 6592->6606 6609 403494 6592->6609 6595 403198 4 API calls 6594->6595 6596 409137 6595->6596 6596->6515 6598 408e94 2 API calls 6597->6598 6599 408f6e 6598->6599 6600 408f72 6599->6600 6613 4069a8 6599->6613 6600->6515 6603 408fa5 6604 408ed0 Wow64RevertWow64FsRedirection 6603->6604 6605 408fad 6604->6605 6605->6515 6607 403278 4 API calls 6606->6607 6608 4032b5 6607->6608 6608->6592 6610 403498 6609->6610 6612 4034c3 6609->6612 6611 4034f0 4 API calls 6610->6611 6611->6612 6612->6592 6614 40693c 7 API calls 6613->6614 6615 4069b2 GetLastError 6614->6615 6615->6603 6617 406fc7 6616->6617 6635 406fbe 6616->6635 6618 406fd0 6617->6618 6619 407008 6617->6619 6637 406ec8 6618->6637 6621 406ec8 RegOpenKeyExA 6619->6621 6623 407021 6621->6623 6622 406fe9 6624 40703e 6622->6624 6640 406ebc 6622->6640 6623->6624 6626 406ebc 6 API calls 6623->6626 6627 40322c 4 API calls 6624->6627 6631 407035 RegCloseKey 6626->6631 6632 40704b 6627->6632 6628 403198 4 API calls 6629 407080 6628->6629 6633 403198 4 API calls 6629->6633 6631->6624 6634 4032fc 4 API calls 6632->6634 6636 407088 6633->6636 6634->6635 6635->6628 6636->6429 6638 406ed3 6637->6638 6639 406ed9 RegOpenKeyExA 6637->6639 6638->6639 6639->6622 6643 406d70 6640->6643 6644 406d96 RegQueryValueExA 6643->6644 6645 406db9 6644->6645 6650 406ddb 6644->6650 6646 406dd3 6645->6646 6645->6650 6651 403278 4 API calls 6645->6651 6652 403420 4 API calls 6645->6652 6648 403198 4 API calls 6646->6648 6647 403198 4 API calls 6649 406ea7 RegCloseKey 6647->6649 6648->6650 6649->6624 6650->6647 6651->6645 6653 406e10 RegQueryValueExA 6652->6653 6653->6644 6654 406e2c 6653->6654 6654->6650 6655 4034f0 4 API calls 6654->6655 6656 406e6e 6655->6656 6657 406e80 6656->6657 6659 403420 4 API calls 6656->6659 6658 4031e8 4 API calls 6657->6658 6658->6650 6659->6657 6661 4066a4 IsDBCSLeadByte 6660->6661 6663 406795 6661->6663 6662 4067df 6662->6448 6663->6662 6664 4065e0 IsDBCSLeadByte 6663->6664 6664->6663 6666 406853 6665->6666 6667 406780 IsDBCSLeadByte 6666->6667 6670 40685e 6667->6670 6668 40664a 6668->6453 6668->6454 6669 4065e0 IsDBCSLeadByte 6669->6670 6670->6668 6670->6669 6672 4068b7 6671->6672 6673 4068bb 6671->6673 6672->6467 6676 4068d0 CharPrevA 6673->6676 6675 4068cc 6675->6467 6676->6675 5679 407628 WriteFile 5680 407648 5679->5680 5683 40764f 5679->5683 5681 4073ec 21 API calls 5680->5681 5681->5683 5682 407660 5683->5682 5684 40734c 20 API calls 5683->5684 5684->5682 5980 403a28 ReadFile 5981 403a46 5980->5981 5982 403a49 GetLastError 5980->5982 6681 403932 6682 403924 6681->6682 6683 40374c VariantClear 6682->6683 6684 40392c 6683->6684 6685 408b34 6686 408b3b 6685->6686 6687 403198 4 API calls 6686->6687 6693 408bd5 6687->6693 6688 408c00 6689 4031b8 4 API calls 6688->6689 6691 408c8d 6689->6691 6690 408bec 6694 4032fc 4 API calls 6690->6694 6692 403278 4 API calls 6692->6693 6693->6688 6693->6690 6693->6692 6695 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6693->6695 6694->6688 6695->6693 5989 407ec0 5990 407ee8 5989->5990 5992 407eef 5989->5992 5991 407dfc 21 API calls 5990->5991 5991->5992 5993 407f18 5992->5993 5995 407f22 5992->5995 5996 407f16 5992->5996 5997 407d14 19 API calls 5993->5997 5994 407f57 6000 403198 4 API calls 5994->6000 5995->5994 5998 407d14 19 API calls 5995->5998 5999 4050e4 19 API calls 5996->5999 5997->5995 5998->5994 6001 407f3e 5999->6001 6002 407f6c 6000->6002 6004 407c9c 6001->6004 6005 407c9f 6004->6005 6006 40322c 4 API calls 6005->6006 6007 407cc1 6006->6007 6008 4032fc 4 API calls 6007->6008 6009 407ccb 6008->6009 6010 4057e0 4 API calls 6009->6010 6011 407cda 6010->6011 6012 403198 4 API calls 6011->6012 6013 407cf4 6012->6013 6013->5995 5869 4075cc SetFilePointer 5870 407603 5869->5870 5871 4075f3 GetLastError 5869->5871 5871->5870 5872 4075fc 5871->5872 5873 4073ec 21 API calls 5872->5873 5873->5870 6018 402ccc 6021 402cdd 6018->6021 6022 402cfe 6018->6022 6019 402d88 RtlUnwind 6020 403154 4 API calls 6019->6020 6020->6022 6021->6019 6021->6022 6023 402b28 RaiseException 6021->6023 6024 402d7f 6023->6024 6024->6019 6704 403fcd 6705 403f07 4 API calls 6704->6705 6706 403fd6 6705->6706 6707 403e9c 4 API calls 6706->6707 6708 403fe2 6707->6708 4915 4024d0 4916 4024e4 4915->4916 4917 4024f7 4915->4917 4954 401918 RtlInitializeCriticalSection 4916->4954 4919 402518 4917->4919 4920 40250e RtlEnterCriticalSection 4917->4920 4931 402300 4919->4931 4920->4919 4923 4024ed 4925 402525 4927 402581 4925->4927 4928 402577 RtlLeaveCriticalSection 4925->4928 4928->4927 4929 402531 4929->4925 4961 40215c 4929->4961 4932 402314 4931->4932 4935 402335 4932->4935 4936 4023b8 4932->4936 4933 402344 4933->4925 4941 401fd4 4933->4941 4935->4933 4975 401b74 4935->4975 4936->4933 4939 402455 4936->4939 4978 401d80 4936->4978 4986 401e84 4936->4986 4939->4933 4982 401d00 4939->4982 4942 401fe8 4941->4942 4943 401ffb 4941->4943 4944 401918 4 API calls 4942->4944 4945 402012 RtlEnterCriticalSection 4943->4945 4948 40201c 4943->4948 4946 401fed 4944->4946 4945->4948 4946->4943 4947 401ff1 4946->4947 4951 402052 4947->4951 4948->4951 5068 401ee0 4948->5068 4951->4929 4952 402147 4952->4929 4953 40213d RtlLeaveCriticalSection 4953->4952 4955 40193c RtlEnterCriticalSection 4954->4955 4956 401946 4954->4956 4955->4956 4957 401964 LocalAlloc 4956->4957 4958 40197e 4957->4958 4958->4958 4959 4019c3 RtlLeaveCriticalSection 4958->4959 4960 4019cd 4958->4960 4959->4960 4960->4917 4960->4923 4962 40217a 4961->4962 4963 402175 4961->4963 4965 4021b5 4962->4965 4966 4021ab RtlEnterCriticalSection 4962->4966 4967 40217e 4962->4967 4964 401918 4 API calls 4963->4964 4964->4962 4968 402244 4965->4968 4971 4021c1 4965->4971 4972 402270 4965->4972 4966->4965 4967->4925 4968->4967 4973 401d80 7 API calls 4968->4973 4969 4022e3 RtlLeaveCriticalSection 4970 4022ed 4969->4970 4970->4925 4971->4969 4971->4970 4972->4971 4974 401d00 7 API calls 4972->4974 4973->4967 4974->4971 4976 40215c 9 API calls 4975->4976 4977 401b95 4976->4977 4977->4933 4979 401d89 4978->4979 4981 401d92 4978->4981 4980 401b74 9 API calls 4979->4980 4979->4981 4980->4981 4981->4936 4983 401d4e 4982->4983 4984 401d1e 4982->4984 4983->4984 4991 401c68 4983->4991 4984->4933 5046 401768 4986->5046 4988 401e99 4990 401ea6 4988->4990 5057 401dcc 4988->5057 4990->4936 4992 401c7a 4991->4992 4993 401c9d 4992->4993 4994 401caf 4992->4994 5004 40188c 4993->5004 4996 40188c 3 API calls 4994->4996 4997 401cad 4996->4997 4998 401cc5 4997->4998 5014 401b44 4997->5014 4998->4984 5000 401cd4 5001 401cee 5000->5001 5019 401b98 5000->5019 5024 4013a0 5001->5024 5005 4018b2 5004->5005 5006 40190b 5004->5006 5028 401658 5005->5028 5006->4997 5011 4018e6 5011->5006 5013 4013a0 LocalAlloc 5011->5013 5013->5006 5015 401b61 5014->5015 5016 401b52 5014->5016 5015->5000 5017 401d00 9 API calls 5016->5017 5018 401b5f 5017->5018 5018->5000 5020 401bab 5019->5020 5021 401b9d 5019->5021 5020->5001 5022 401b74 9 API calls 5021->5022 5023 401baa 5022->5023 5023->5001 5025 4013ab 5024->5025 5026 4012e4 LocalAlloc 5025->5026 5027 4013c6 5025->5027 5026->5027 5027->4998 5031 40168f 5028->5031 5029 4016cf 5032 40132c 5029->5032 5030 4016a9 VirtualFree 5030->5031 5031->5029 5031->5030 5033 401348 5032->5033 5040 4012e4 5033->5040 5036 40150c 5038 40153b 5036->5038 5037 401594 5037->5011 5038->5037 5039 401568 VirtualFree 5038->5039 5039->5038 5043 40128c 5040->5043 5044 401298 LocalAlloc 5043->5044 5045 4012aa 5043->5045 5044->5045 5045->5011 5045->5036 5047 401787 5046->5047 5048 40183b 5047->5048 5049 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5047->5049 5050 40132c LocalAlloc 5047->5050 5052 401821 5047->5052 5054 4017d6 5047->5054 5055 4017e7 5048->5055 5064 4015c4 5048->5064 5049->5047 5050->5047 5053 40150c VirtualFree 5052->5053 5053->5055 5056 40150c VirtualFree 5054->5056 5055->4988 5056->5055 5058 401d80 9 API calls 5057->5058 5059 401de0 5058->5059 5060 40132c LocalAlloc 5059->5060 5061 401df0 5060->5061 5062 401df8 5061->5062 5063 401b44 9 API calls 5061->5063 5062->4990 5063->5062 5065 40160a 5064->5065 5066 401626 VirtualAlloc 5065->5066 5067 40163a 5065->5067 5066->5065 5066->5067 5067->5055 5071 401ef0 5068->5071 5069 401f1c 5070 401d00 9 API calls 5069->5070 5073 401f40 5069->5073 5070->5073 5071->5069 5071->5073 5074 401e58 5071->5074 5073->4952 5073->4953 5079 4016d8 5074->5079 5077 401e75 5077->5071 5078 401dcc 9 API calls 5078->5077 5083 4016f4 5079->5083 5080 4016fe 5082 4015c4 VirtualAlloc 5080->5082 5085 40170a 5082->5085 5083->5080 5084 40132c LocalAlloc 5083->5084 5086 40174f 5083->5086 5088 40175b 5083->5088 5089 401430 5083->5089 5084->5083 5085->5088 5087 40150c VirtualFree 5086->5087 5087->5088 5088->5077 5088->5078 5090 40143f VirtualAlloc 5089->5090 5092 40146c 5090->5092 5093 40148f 5090->5093 5094 4012e4 LocalAlloc 5092->5094 5093->5083 5095 401478 5094->5095 5095->5093 5096 40147c VirtualFree 5095->5096 5096->5093 6029 4028d2 6033 4028da 6029->6033 6030 4028ef 6032 4025ac 4 API calls 6030->6032 6031 403554 4 API calls 6031->6033 6034 4028f4 6032->6034 6033->6030 6033->6031 6709 4019d3 6710 4019ba 6709->6710 6711 4019c3 RtlLeaveCriticalSection 6710->6711 6712 4019cd 6710->6712 6711->6712 5688 409fd8 5719 409460 GetLastError 5688->5719 5691 402f24 5 API calls 5692 409fe4 5691->5692 5693 409fee CreateWindowExA SetWindowLongA 5692->5693 5694 4050e4 19 API calls 5693->5694 5695 40a071 5694->5695 5732 4032fc 5695->5732 5697 40a07f 5698 4032fc 4 API calls 5697->5698 5699 40a08c 5698->5699 5746 406adc GetCommandLineA 5699->5746 5702 4032fc 4 API calls 5703 40a0a1 5702->5703 5751 409888 5703->5751 5707 40a0c6 5708 40a0e6 5707->5708 5709 40a0ff 5707->5709 5773 4093fc 5708->5773 5710 40a118 5709->5710 5714 40a112 RemoveDirectoryA 5709->5714 5712 40a121 73EA5CF0 5710->5712 5713 40a12c 5710->5713 5712->5713 5715 40a154 5713->5715 5781 40357c 5713->5781 5714->5710 5717 40a14a 5718 4025ac 4 API calls 5717->5718 5718->5715 5794 404be4 5719->5794 5722 4071e4 5 API calls 5723 4094b7 5722->5723 5797 408ccc 5723->5797 5726 4057e0 4 API calls 5727 4094db 5726->5727 5728 4031b8 4 API calls 5727->5728 5729 4094fa 5728->5729 5730 403198 4 API calls 5729->5730 5731 409502 5730->5731 5731->5691 5733 403300 5732->5733 5734 40333f 5732->5734 5735 4031e8 5733->5735 5736 40330a 5733->5736 5734->5697 5739 4031fc 5735->5739 5743 403254 4 API calls 5735->5743 5737 403334 5736->5737 5738 40331d 5736->5738 5742 4034f0 4 API calls 5737->5742 5740 4034f0 4 API calls 5738->5740 5741 403228 5739->5741 5744 4025ac 4 API calls 5739->5744 5745 403322 5740->5745 5741->5697 5742->5745 5743->5739 5744->5741 5745->5697 5747 406a50 4 API calls 5746->5747 5748 406b01 5747->5748 5749 403198 4 API calls 5748->5749 5750 406b1f 5749->5750 5750->5702 5752 4033b4 4 API calls 5751->5752 5753 4098c3 5752->5753 5754 4098f5 CreateProcessA 5753->5754 5755 409901 5754->5755 5756 409908 CloseHandle 5754->5756 5757 409460 21 API calls 5755->5757 5758 409911 5756->5758 5757->5756 5811 40985c 5758->5811 5761 40992d 5762 40985c 3 API calls 5761->5762 5763 409932 GetExitCodeProcess CloseHandle 5762->5763 5764 409952 5763->5764 5765 403198 4 API calls 5764->5765 5766 40995a 5765->5766 5766->5707 5767 40969c 5766->5767 5768 4096a4 5767->5768 5772 4096de 5767->5772 5769 403420 4 API calls 5768->5769 5768->5772 5770 4096d8 5769->5770 5815 408da4 5770->5815 5772->5707 5774 409456 5773->5774 5776 40940f 5773->5776 5774->5709 5775 409417 Sleep 5775->5776 5776->5774 5776->5775 5777 409427 Sleep 5776->5777 5779 40943e GetLastError 5776->5779 5831 408ee0 5776->5831 5777->5776 5779->5774 5780 409448 GetLastError 5779->5780 5780->5774 5780->5776 5782 403591 5781->5782 5783 4035a0 5781->5783 5786 4035b6 5782->5786 5789 40359b 5782->5789 5792 4035d0 5782->5792 5784 4035b1 5783->5784 5785 4035b8 5783->5785 5787 403198 4 API calls 5784->5787 5788 4031b8 4 API calls 5785->5788 5786->5717 5787->5786 5788->5786 5789->5783 5793 4035ec 5789->5793 5790 40357c 4 API calls 5790->5792 5792->5786 5792->5790 5793->5786 5848 403554 5793->5848 5795 4050f8 19 API calls 5794->5795 5796 404c02 5795->5796 5796->5722 5798 408cec 5797->5798 5801 408ba4 5798->5801 5802 403198 4 API calls 5801->5802 5810 408bd5 5801->5810 5802->5810 5803 408c00 5804 4031b8 4 API calls 5803->5804 5806 408c8d 5804->5806 5805 408bec 5808 4032fc 4 API calls 5805->5808 5806->5726 5807 403278 4 API calls 5807->5810 5808->5803 5809 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5809->5810 5810->5803 5810->5805 5810->5807 5810->5809 5812 409870 PeekMessageA 5811->5812 5813 409882 MsgWaitForMultipleObjects 5812->5813 5814 409864 TranslateMessage DispatchMessageA 5812->5814 5813->5758 5813->5761 5814->5812 5816 408db2 5815->5816 5818 408dca 5816->5818 5828 408d3c 5816->5828 5819 408d3c 4 API calls 5818->5819 5820 408dee 5818->5820 5819->5820 5821 407878 InterlockedExchange 5820->5821 5822 408e09 5821->5822 5823 408d3c 4 API calls 5822->5823 5825 408e1c 5822->5825 5823->5825 5824 408d3c 4 API calls 5824->5825 5825->5824 5826 403278 4 API calls 5825->5826 5827 408e4b 5825->5827 5826->5825 5827->5772 5829 4057e0 4 API calls 5828->5829 5830 408d4d 5829->5830 5830->5818 5839 408e94 5831->5839 5833 408ef6 5834 408efa 5833->5834 5835 408f16 DeleteFileA GetLastError 5833->5835 5834->5776 5836 408f34 5835->5836 5845 408ed0 5836->5845 5840 408ea2 5839->5840 5841 408e9e 5839->5841 5842 408ec4 SetLastError 5840->5842 5843 408eab Wow64DisableWow64FsRedirection 5840->5843 5841->5833 5844 408ebf 5842->5844 5843->5844 5844->5833 5846 408ed5 Wow64RevertWow64FsRedirection 5845->5846 5847 408edf 5845->5847 5846->5847 5847->5776 5849 403566 5848->5849 5851 403578 5849->5851 5852 403604 5849->5852 5851->5793 5853 40357c 5852->5853 5854 4035a0 5853->5854 5859 4035d0 5853->5859 5860 40359b 5853->5860 5861 4035b6 5853->5861 5855 4035b1 5854->5855 5856 4035b8 5854->5856 5857 403198 4 API calls 5855->5857 5858 4031b8 4 API calls 5856->5858 5857->5861 5858->5861 5859->5861 5863 40357c 4 API calls 5859->5863 5860->5854 5862 4035ec 5860->5862 5861->5849 5862->5861 5864 403554 4 API calls 5862->5864 5863->5859 5864->5862 6716 4065dc IsDBCSLeadByte 6717 4065f4 6716->6717 6728 402be9 RaiseException 6729 402c04 6728->6729 6039 409ef0 6040 409f15 6039->6040 6041 407878 InterlockedExchange 6040->6041 6042 409f3f 6041->6042 6043 409f4f 6042->6043 6044 409984 4 API calls 6042->6044 6049 40760c SetEndOfFile 6043->6049 6044->6043 6046 409f6b 6047 4025ac 4 API calls 6046->6047 6048 409fa2 6047->6048 6050 407623 6049->6050 6051 40761c 6049->6051 6050->6046 6052 4073ec 21 API calls 6051->6052 6052->6050 6053 402af2 6054 402afe 6053->6054 6057 402ed0 6054->6057 6058 403154 4 API calls 6057->6058 6060 402ee0 6058->6060 6059 402b03 6060->6059 6062 402b0c 6060->6062 6063 402b25 6062->6063 6064 402b15 RaiseException 6062->6064 6063->6059 6064->6063 6065 405af2 6067 405af4 6065->6067 6066 405b30 6070 405890 5 API calls 6066->6070 6067->6066 6068 405b47 6067->6068 6069 405b2a 6067->6069 6074 404c2c 5 API calls 6068->6074 6069->6066 6072 405b9c 6069->6072 6071 405b43 6070->6071 6075 403198 4 API calls 6071->6075 6073 405900 19 API calls 6072->6073 6073->6071 6076 405b70 6074->6076 6077 405bd6 6075->6077 6078 405900 19 API calls 6076->6078 6078->6071 6730 402dfa 6731 402e26 6730->6731 6732 402e0d 6730->6732 6734 402ba4 6732->6734 6735 402bc9 6734->6735 6736 402bad 6734->6736 6735->6731 6737 402bb5 RaiseException 6736->6737 6737->6735 6738 4097fc 6739 40980b 6738->6739 6741 409815 6738->6741 6740 40983a CallWindowProcA 6739->6740 6739->6741 6740->6741 6101 403a80 CloseHandle 6102 403a90 6101->6102 6103 403a91 GetLastError 6101->6103 6104 404283 6105 4042c3 6104->6105 6106 403154 4 API calls 6105->6106 6107 404323 6106->6107 6746 404185 6747 4041ff 6746->6747 6748 4041cc 6747->6748 6749 403154 4 API calls 6747->6749 6750 404323 6749->6750 6108 403e87 6109 403e4c 6108->6109 6110 403e62 6109->6110 6111 403e7b 6109->6111 6114 403e67 6109->6114 6117 403cc8 6110->6117 6112 402674 4 API calls 6111->6112 6115 403e78 6112->6115 6114->6115 6121 402674 6114->6121 6118 403cd6 6117->6118 6119 403ceb 6118->6119 6120 402674 4 API calls 6118->6120 6119->6114 6120->6119 6122 403154 4 API calls 6121->6122 6123 40267a 6122->6123 6123->6115 5874 40758c ReadFile 5875 4075c3 5874->5875 5876 4075ac 5874->5876 5877 4075b2 GetLastError 5876->5877 5878 4075bc 5876->5878 5877->5875 5877->5878 5879 4073ec 21 API calls 5878->5879 5879->5875 6124 40708e 6125 407078 6124->6125 6126 403198 4 API calls 6125->6126 6127 407080 6126->6127 6128 403198 4 API calls 6127->6128 6129 407088 6128->6129 6134 403e95 6135 403e4c 6134->6135 6136 403e67 6135->6136 6137 403e62 6135->6137 6138 403e7b 6135->6138 6141 403e78 6136->6141 6142 402674 4 API calls 6136->6142 6140 403cc8 4 API calls 6137->6140 6139 402674 4 API calls 6138->6139 6139->6141 6140->6136 6142->6141 6143 403a97 6144 403aac 6143->6144 6145 403bbc GetStdHandle 6144->6145 6146 403b0e CreateFileA 6144->6146 6156 403ab2 6144->6156 6147 403c17 GetLastError 6145->6147 6151 403bba 6145->6151 6146->6147 6148 403b2c 6146->6148 6147->6156 6150 403b3b GetFileSize 6148->6150 6148->6151 6150->6147 6152 403b4e SetFilePointer 6150->6152 6153 403be7 GetFileType 6151->6153 6151->6156 6152->6147 6157 403b6a ReadFile 6152->6157 6155 403c02 CloseHandle 6153->6155 6153->6156 6155->6156 6157->6147 6158 403b8c 6157->6158 6158->6151 6159 403b9f SetFilePointer 6158->6159 6159->6147 6160 403bb0 SetEndOfFile 6159->6160 6160->6147 6160->6151 5685 4074a8 5686 4074b4 CloseHandle 5685->5686 5687 4074bd 5685->5687 5686->5687 6763 40a1a9 6772 409514 6763->6772 6766 402f24 5 API calls 6767 40a1b3 6766->6767 6768 403198 4 API calls 6767->6768 6769 40a1d2 6768->6769 6770 403198 4 API calls 6769->6770 6771 40a1da 6770->6771 6781 4055fc 6772->6781 6774 40952f 6775 40955d 6774->6775 6787 40716c 6774->6787 6778 403198 4 API calls 6775->6778 6777 40954d 6780 409555 MessageBoxA 6777->6780 6779 409572 6778->6779 6779->6766 6779->6767 6780->6775 6782 403154 4 API calls 6781->6782 6783 405601 6782->6783 6784 405619 6783->6784 6785 403154 4 API calls 6783->6785 6784->6774 6786 40560f 6785->6786 6786->6774 6788 4055fc 4 API calls 6787->6788 6789 40717b 6788->6789 6790 407181 6789->6790 6791 40718f 6789->6791 6792 40322c 4 API calls 6790->6792 6794 40719f 6791->6794 6796 4071ab 6791->6796 6793 40718d 6792->6793 6793->6777 6798 407130 6794->6798 6805 4032b8 6796->6805 6799 40322c 4 API calls 6798->6799 6800 40713f 6799->6800 6801 40715c 6800->6801 6802 4068b0 CharPrevA 6800->6802 6801->6793 6803 40714b 6802->6803 6803->6801 6804 4032fc 4 API calls 6803->6804 6804->6801 6806 403278 4 API calls 6805->6806 6807 4032c2 6806->6807 6807->6793 6808 4011aa 6809 4011ac GetStdHandle 6808->6809 6168 4028ac 6169 402594 4 API calls 6168->6169 6170 4028b6 6169->6170 6175 4050b0 6176 4050c3 6175->6176 6177 404da8 19 API calls 6176->6177 6178 4050d7 6177->6178 6818 409fb4 6819 409fe4 6818->6819 6820 409fee CreateWindowExA SetWindowLongA 6819->6820 6821 4050e4 19 API calls 6820->6821 6822 40a071 6821->6822 6823 4032fc 4 API calls 6822->6823 6824 40a07f 6823->6824 6825 4032fc 4 API calls 6824->6825 6826 40a08c 6825->6826 6827 406adc 5 API calls 6826->6827 6828 40a098 6827->6828 6829 4032fc 4 API calls 6828->6829 6830 40a0a1 6829->6830 6831 409888 29 API calls 6830->6831 6832 40a0b3 6831->6832 6833 40969c 5 API calls 6832->6833 6834 40a0c6 6832->6834 6833->6834 6835 40a0ff 6834->6835 6837 4093fc 9 API calls 6834->6837 6836 40a118 6835->6836 6840 40a112 RemoveDirectoryA 6835->6840 6838 40a121 73EA5CF0 6836->6838 6839 40a12c 6836->6839 6837->6835 6838->6839 6841 40a154 6839->6841 6842 40357c 4 API calls 6839->6842 6840->6836 6843 40a14a 6842->6843 6844 4025ac 4 API calls 6843->6844 6844->6841 6179 401ab9 6180 401a96 6179->6180 6181 401aa9 RtlDeleteCriticalSection 6180->6181 6182 401a9f RtlLeaveCriticalSection 6180->6182 6182->6181

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 108 409a14-409a38 GetSystemInfo VirtualQuery 109 409ac8-409acf 108->109 110 409a3e 108->110 111 409abd-409ac2 110->111 111->109 112 409a40-409a47 111->112 113 409aa9-409abb VirtualQuery 112->113 114 409a49-409a4d 112->114 113->109 113->111 114->113 115 409a4f-409a57 114->115 116 409a68-409a79 VirtualProtect 115->116 117 409a59-409a5c 115->117 119 409a7b 116->119 120 409a7d-409a7f 116->120 117->116 118 409a5e-409a61 117->118 118->116 121 409a63-409a66 118->121 119->120 122 409a8e-409a91 120->122 121->116 121->120 123 409a81-409a8a call 409a0c 122->123 124 409a93-409a95 122->124 123->122 124->113 126 409a97-409aa4 VirtualProtect 124->126 126->113
                                                                                      APIs
                                                                                      • GetSystemInfo.KERNEL32(?), ref: 00409A26
                                                                                      • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409A31
                                                                                      • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409A72
                                                                                      • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409AA4
                                                                                      • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409AB4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                      • String ID:
                                                                                      • API String ID: 2441996862-0
                                                                                      • Opcode ID: c2769086b94dacb7810d1409196c7497058a42c32b70979fc979e51038c0ff67
                                                                                      • Instruction ID: 05782b2e5a8588c9c74d05110837466633af9a4b7a19298b20ab433fd050a55e
                                                                                      • Opcode Fuzzy Hash: c2769086b94dacb7810d1409196c7497058a42c32b70979fc979e51038c0ff67
                                                                                      • Instruction Fuzzy Hash: D0216FB13003846BD6309A698C85E67B7DC9F85360F18492AFA85E62C3D73DED40CB59
                                                                                      APIs
                                                                                      • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale
                                                                                      • String ID:
                                                                                      • API String ID: 2299586839-0
                                                                                      • Opcode ID: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                                                                      • Instruction ID: b78bf48cff894a3999656c5243e329942f020ab22272e2e872fdbeeaebf0035e
                                                                                      • Opcode Fuzzy Hash: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                                                                      • Instruction Fuzzy Hash: EDE09271B0021426D711A9699C86AEB735DDB58310F0006BFB904EB3C6EDB49E8046ED

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00409061,?,?,?,?,00000000,?,00409B53), ref: 00408FE8
                                                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00408FEE
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00409061,?,?,?,?,00000000,?,00409B53), ref: 00409002
                                                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00409008
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                      • API String ID: 1646373207-2130885113
                                                                                      • Opcode ID: 17e7db4c528402608d9f53e260f8b79ce616995abb8d95c1af2dd02ed3ed6c5c
                                                                                      • Instruction ID: 9fcc65c531327f2d7efb14c601a25e4e420c6304718e48176e9e04a6a3b299d5
                                                                                      • Opcode Fuzzy Hash: 17e7db4c528402608d9f53e260f8b79ce616995abb8d95c1af2dd02ed3ed6c5c
                                                                                      • Instruction Fuzzy Hash: 6701DF70208300AEEB10AB76DC47B563AA8E782714F60843BF504B22C3CA7C5C44CA2E

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A010
                                                                                      • SetWindowLongA.USER32(000203EC,000000FC,004097FC), ref: 0040A027
                                                                                        • Part of subcall function 00406ADC: GetCommandLineA.KERNEL32(00000000,00406B20,?,?,?,?,00000000,?,0040A098,?), ref: 00406AF4
                                                                                        • Part of subcall function 00409888: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974,00000000,0040995B), ref: 004098F8
                                                                                        • Part of subcall function 00409888: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974,00000000), ref: 0040990C
                                                                                        • Part of subcall function 00409888: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                                                        • Part of subcall function 00409888: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                                                        • Part of subcall function 00409888: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974), ref: 00409940
                                                                                      • RemoveDirectoryA.KERNEL32(00000000,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A113
                                                                                      • 73EA5CF0.USER32(000203EC,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A127
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                      • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                      • API String ID: 978128352-3001827809
                                                                                      • Opcode ID: f35d8c1ce23740e5e47570a4a7ea1aa6b0c7a4e1336b706dbfad7c34b6de0a74
                                                                                      • Instruction ID: 994b03bd5abc72cbe06dd2c14f0861f5fc0fad0f3ad24bd21fe84be6bde737e4
                                                                                      • Opcode Fuzzy Hash: f35d8c1ce23740e5e47570a4a7ea1aa6b0c7a4e1336b706dbfad7c34b6de0a74
                                                                                      • Instruction Fuzzy Hash: 57411A70A00205DFD715EBA9EE86B9A7BA5EB84304F10427BF510B73E2DB789801DB5D

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 00409460: GetLastError.KERNEL32(00000000,00409503,?,0040B240,?,02091650), ref: 00409484
                                                                                      • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A010
                                                                                      • SetWindowLongA.USER32(000203EC,000000FC,004097FC), ref: 0040A027
                                                                                        • Part of subcall function 00406ADC: GetCommandLineA.KERNEL32(00000000,00406B20,?,?,?,?,00000000,?,0040A098,?), ref: 00406AF4
                                                                                        • Part of subcall function 00409888: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974,00000000,0040995B), ref: 004098F8
                                                                                        • Part of subcall function 00409888: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974,00000000), ref: 0040990C
                                                                                        • Part of subcall function 00409888: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                                                        • Part of subcall function 00409888: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                                                        • Part of subcall function 00409888: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974), ref: 00409940
                                                                                      • RemoveDirectoryA.KERNEL32(00000000,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A113
                                                                                      • 73EA5CF0.USER32(000203EC,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A127
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryErrorExitLastLineLongMultipleObjectsRemoveWait
                                                                                      • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                      • API String ID: 240127915-3001827809
                                                                                      • Opcode ID: 41e9b17cc1901837085009e7774581f9f675215498936b1d5fec870b95540319
                                                                                      • Instruction ID: cbbd3698a6e5ddb8e812fa6c760aedb007618753dcf5685e5a94b93d1743052f
                                                                                      • Opcode Fuzzy Hash: 41e9b17cc1901837085009e7774581f9f675215498936b1d5fec870b95540319
                                                                                      • Instruction Fuzzy Hash: 04412B70A00205DBC715EBA9EE86B9E3BA5EB84304F10427BF510B73E2DB789801DB5D

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974,00000000,0040995B), ref: 004098F8
                                                                                      • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974,00000000), ref: 0040990C
                                                                                      • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                                                      • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                                                      • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02091650,00409974), ref: 00409940
                                                                                        • Part of subcall function 00409460: GetLastError.KERNEL32(00000000,00409503,?,0040B240,?,02091650), ref: 00409484
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                      • String ID: D
                                                                                      • API String ID: 3356880605-2746444292
                                                                                      • Opcode ID: 3e364823df46f41b243604843b678d585e88c5cad38ef85377b023b87dae9783
                                                                                      • Instruction ID: 0c6d97fba1df7b16fba7b9ed0c132cba9133a3324ac8f072eb64155fee6ae1b7
                                                                                      • Opcode Fuzzy Hash: 3e364823df46f41b243604843b678d585e88c5cad38ef85377b023b87dae9783
                                                                                      • Instruction Fuzzy Hash: AC1130B16142086EDB10FBE68C52F9EBBACEF49718F50013EB614F62C7DA785D048669

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409D8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message
                                                                                      • String ID: $u@$.tmp
                                                                                      • API String ID: 2030045667-236237750
                                                                                      • Opcode ID: 76a7687ccf1c1f3f155fed8792e4b2e0c469f7c74cc7371f2538726c547644a2
                                                                                      • Instruction ID: fbeaf51a7290a35b1d20cf1acd7fffd14229a7cea4ec7fe779b7d8bf1d8f9ef0
                                                                                      • Opcode Fuzzy Hash: 76a7687ccf1c1f3f155fed8792e4b2e0c469f7c74cc7371f2538726c547644a2
                                                                                      • Instruction Fuzzy Hash: 7041A170604201DFD311EF19DE92A5A7BA6FB49304B11453AF801B73E2CB79AC01DAAD

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409D8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message
                                                                                      • String ID: $u@$.tmp
                                                                                      • API String ID: 2030045667-236237750
                                                                                      • Opcode ID: 4be92c8e37dddd0a3a50cfadddd3e7ce3c10b6794e32ae209eae1f209508f25f
                                                                                      • Instruction ID: 7aabf0afbc79ebbbc3d3aa4d6af75c8ddef5afe13af9357e4f9bebdf666c2db7
                                                                                      • Opcode Fuzzy Hash: 4be92c8e37dddd0a3a50cfadddd3e7ce3c10b6794e32ae209eae1f209508f25f
                                                                                      • Instruction Fuzzy Hash: 66418070600201DFC711EF69DE92A5A7BB6FB49304B11457AF801B73E2CB79AC01DAAD

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00409343,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040929A
                                                                                      • GetLastError.KERNEL32(00000000,00000000,?,00000000,00409343,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004092A3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                      • String ID: .tmp
                                                                                      • API String ID: 1375471231-2986845003
                                                                                      • Opcode ID: 7647810fba1c1a7df54c129ecd6d2966c744d5805a6f131b99297333171aebfe
                                                                                      • Instruction ID: 381de743b5e558d6c5ac88c9815bc56a2e764fefa580558ac3af8d983805238d
                                                                                      • Opcode Fuzzy Hash: 7647810fba1c1a7df54c129ecd6d2966c744d5805a6f131b99297333171aebfe
                                                                                      • Instruction Fuzzy Hash: 3C214975A002089BDB01EFE1C9429DEB7B9EB48304F10457BE901B73C2DA7CAF058AA5

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 253 401430-40143d 254 401446-40144c 253->254 255 40143f-401444 253->255 256 401452-40146a VirtualAlloc 254->256 255->256 257 40146c-40147a call 4012e4 256->257 258 40148f-401492 256->258 257->258 261 40147c-40148d VirtualFree 257->261 261->258
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Virtual$AllocFree
                                                                                      • String ID: da
                                                                                      • API String ID: 2087232378-1065653613
                                                                                      • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                      • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                      • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                      • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 320 401658-40168d 321 4016c7-4016cd 320->321 322 40168f-40169a 321->322 323 4016cf-4016d4 321->323 324 40169c 322->324 325 40169f-4016a1 322->325 324->325 326 4016a3 325->326 327 4016a5-4016a7 325->327 326->327 328 4016c5 327->328 329 4016a9-4016b9 VirtualFree 327->329 328->321 329->328 330 4016bb 329->330 330->328
                                                                                      APIs
                                                                                      • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeVirtual
                                                                                      • String ID: da
                                                                                      • API String ID: 1263568516-1065653613
                                                                                      • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                      • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                      • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                      • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 331 406f00-406f53 SetErrorMode call 403414 LoadLibraryA
                                                                                      APIs
                                                                                      • SetErrorMode.KERNEL32(00008000), ref: 00406F0A
                                                                                      • LoadLibraryA.KERNEL32(00000000,00000000,00406F54,?,00000000,00406F72,?,00008000), ref: 00406F39
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLibraryLoadMode
                                                                                      • String ID:
                                                                                      • API String ID: 2987862817-0
                                                                                      • Opcode ID: 280b78466cfb49ac5d1a4d8de4e82968344a77d2278ba686a31885ea79f0a63b
                                                                                      • Instruction ID: 61c75ae37e4b7eabf140846b9e9d3e90831ba1beb5fed57b889ca027c52d2016
                                                                                      • Opcode Fuzzy Hash: 280b78466cfb49ac5d1a4d8de4e82968344a77d2278ba686a31885ea79f0a63b
                                                                                      • Instruction Fuzzy Hash: 49F08270614704BEDB029FB69C6282BBBFCE749B0475348B6F904A26D2E53C5D208568

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 341 4075cc-4075f1 SetFilePointer 342 407603-407608 341->342 343 4075f3-4075fa GetLastError 341->343 343->342 344 4075fc-4075fe call 4073ec 343->344 344->342
                                                                                      APIs
                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 004075EB
                                                                                      • GetLastError.KERNEL32(?,?,?,00000000), ref: 004075F3
                                                                                        • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,020903AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$FilePointer
                                                                                      • String ID:
                                                                                      • API String ID: 1156039329-0
                                                                                      • Opcode ID: 4b4e93de333a3cce642c2996d73c93b1535ff8d1f0695df8178d397978e57373
                                                                                      • Instruction ID: cda5b13584bb414d1d7c0d7cef5a43535e1b929ad68122291bf656bee98e9d77
                                                                                      • Opcode Fuzzy Hash: 4b4e93de333a3cce642c2996d73c93b1535ff8d1f0695df8178d397978e57373
                                                                                      • Instruction Fuzzy Hash: A0E092766081016FD601D55EC881B9B33DCDFC5365F00453ABA54EB2D1D675AC0087B6

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 335 40758c-4075aa ReadFile 336 4075c3-4075ca 335->336 337 4075ac-4075b0 335->337 338 4075b2-4075ba GetLastError 337->338 339 4075bc-4075be call 4073ec 337->339 338->336 338->339 339->336
                                                                                      APIs
                                                                                      • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 004075A3
                                                                                      • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 004075B2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastRead
                                                                                      • String ID:
                                                                                      • API String ID: 1948546556-0
                                                                                      • Opcode ID: 60e63bc2ff5526e1bd28c8a7098a19329bed0093cf160d1b5924f83231400461
                                                                                      • Instruction ID: 6d0e635579d8ef6deec62af0acb898b5effba2491802df9b0589d4017bc118ea
                                                                                      • Opcode Fuzzy Hash: 60e63bc2ff5526e1bd28c8a7098a19329bed0093cf160d1b5924f83231400461
                                                                                      • Instruction Fuzzy Hash: 4FE012B1A181147AEB24965A9CC5FAB6BDCCBC5314F14847BF904DB282D678DC04877B

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 346 407524-407545 SetFilePointer 347 407557-407559 346->347 348 407547-40754e GetLastError 346->348 348->347 349 407550-407552 call 4073ec 348->349 349->347
                                                                                      APIs
                                                                                      • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 0040753B
                                                                                      • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 00407547
                                                                                        • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,020903AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$FilePointer
                                                                                      • String ID:
                                                                                      • API String ID: 1156039329-0
                                                                                      • Opcode ID: 0dd762855ce75d8d861d21fe55c1929f9bb0fd02210f0b496c114b023f039fab
                                                                                      • Instruction ID: cd7afd6369a15af5fc7b0f7528e30ca6696358c0ea2e6c45e94f6e0b4d50a73a
                                                                                      • Opcode Fuzzy Hash: 0dd762855ce75d8d861d21fe55c1929f9bb0fd02210f0b496c114b023f039fab
                                                                                      • Instruction Fuzzy Hash: 0EE04FB1600210AFEB10EEB98C81B9672DC9F48364F048576EA14DF2C6D274DC00C766
                                                                                      APIs
                                                                                      • GetSystemDefaultLCID.KERNEL32(00000000,00405306), ref: 004051EF
                                                                                        • Part of subcall function 00404C2C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404C49
                                                                                        • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                      • String ID:
                                                                                      • API String ID: 1658689577-0
                                                                                      • Opcode ID: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                                                                      • Instruction ID: c760dbbb10683706500036a577470844d35ac6ab0c013c9c95042e4326961867
                                                                                      • Opcode Fuzzy Hash: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                                                                      • Instruction Fuzzy Hash: 3B313D75E00119ABCB00EF95C8C19EEB779FF84304F158977E815BB285E739AE058B98
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407518
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: ce86d0b46b6749cbb1c8065cdd94f6338fa023cacd1506a2c152e65e14b54ccf
                                                                                      • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                      • Opcode Fuzzy Hash: ce86d0b46b6749cbb1c8065cdd94f6338fa023cacd1506a2c152e65e14b54ccf
                                                                                      • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407518
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: 5c7f1f50133f8918f9d70925a1da877e635501982028b62cfe689d085d452769
                                                                                      • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                      • Opcode Fuzzy Hash: 5c7f1f50133f8918f9d70925a1da877e635501982028b62cfe689d085d452769
                                                                                      • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                      APIs
                                                                                      • GetFileAttributesA.KERNEL32(00000000,00000000,00406984,?,?,?,?,00000000,?,00406999,00406CC7,00000000,00406D0C,?,?,?), ref: 00406967
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile
                                                                                      • String ID:
                                                                                      • API String ID: 3188754299-0
                                                                                      • Opcode ID: 53f9965764e037d0eade91fd77cfc00c47722664131d9e88e47f7f2d0abdeb71
                                                                                      • Instruction ID: a5d31a369ac9c1460ce21b6bb4ed2cb839aeaeb50f5f76e03c39097c5263300d
                                                                                      • Opcode Fuzzy Hash: 53f9965764e037d0eade91fd77cfc00c47722664131d9e88e47f7f2d0abdeb71
                                                                                      • Instruction Fuzzy Hash: A9E065712043047FD701EA629C52959B7ACDB89708B924476B501A6682D5785E108568
                                                                                      APIs
                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0040763F
                                                                                        • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,020903AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastWrite
                                                                                      • String ID:
                                                                                      • API String ID: 442123175-0
                                                                                      • Opcode ID: 2449abf237b154253dcf2b231e0da589e0eb2b5517b9a23d8c49629d5bbf5411
                                                                                      • Instruction ID: 68b513bd5595dc6b38f1d245c0222f257f742b1e6f06676187839ef0e6677733
                                                                                      • Opcode Fuzzy Hash: 2449abf237b154253dcf2b231e0da589e0eb2b5517b9a23d8c49629d5bbf5411
                                                                                      • Instruction Fuzzy Hash: 93E01A727081106BEB10E65EDCC0EABA7DCDFC5764F04547BBA08EB291D674AC049676
                                                                                      APIs
                                                                                      • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0040904B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00409061), ref: 00407203
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FormatMessage
                                                                                      • String ID:
                                                                                      • API String ID: 1306739567-0
                                                                                      • Opcode ID: 606059c89ae6d8e8cf07aa2f3a49422b1cb7a18355834490beef1a35ac41266b
                                                                                      • Instruction ID: 095b59eb22c1ada42cfe979e419102ec0d22498c88dfceb067fba30b4837873c
                                                                                      • Opcode Fuzzy Hash: 606059c89ae6d8e8cf07aa2f3a49422b1cb7a18355834490beef1a35ac41266b
                                                                                      • Instruction Fuzzy Hash: 8DE0D8A0B8830125F22514544C87B77110E53C0700F50847EB710ED3D3D6BEA90641AF
                                                                                      APIs
                                                                                      • SetEndOfFile.KERNEL32(?,020A8000,00409F6B,00000000), ref: 00407613
                                                                                        • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,020903AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLast
                                                                                      • String ID:
                                                                                      • API String ID: 734332943-0
                                                                                      • Opcode ID: 2ff8edb08080e924c2b395f282aa3d8258573adb5ced5672aaac345b41159427
                                                                                      • Instruction ID: 5d9383f6f08d3e81a9fa52c4aba0b6319cc61be016c813106cdb36ce464f185a
                                                                                      • Opcode Fuzzy Hash: 2ff8edb08080e924c2b395f282aa3d8258573adb5ced5672aaac345b41159427
                                                                                      • Instruction Fuzzy Hash: 39C04CB1A0450047DB40A6BE99C1A0662DC5A483157045576BA08DB297D679E8009665
                                                                                      APIs
                                                                                      • SetErrorMode.KERNEL32(?,00406F79), ref: 00406F6C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorMode
                                                                                      • String ID:
                                                                                      • API String ID: 2340568224-0
                                                                                      • Opcode ID: b3342c3bee8ef6d4bfebdffece25c86b3cab89117035339c57c774ddff03cb9f
                                                                                      • Instruction ID: 754ecbd0d3eeca534395493226652c0236480d823d7569c9efe771d01927bad3
                                                                                      • Opcode Fuzzy Hash: b3342c3bee8ef6d4bfebdffece25c86b3cab89117035339c57c774ddff03cb9f
                                                                                      • Instruction Fuzzy Hash: 97B09B7661C2015DE705D6D5745193863F4D7C47103A1457BF104D25C0D57CD4144518
                                                                                      APIs
                                                                                      • SetErrorMode.KERNEL32(?,00406F79), ref: 00406F6C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorMode
                                                                                      • String ID:
                                                                                      • API String ID: 2340568224-0
                                                                                      • Opcode ID: 8c0feaa3b8caa60bdda2d34a80aa64328f40d718bb3766066fe9d436f42a4d4e
                                                                                      • Instruction ID: 7c61e226393e4972c06343dd54fa3db727d2c771c967085a02b7622724de7152
                                                                                      • Opcode Fuzzy Hash: 8c0feaa3b8caa60bdda2d34a80aa64328f40d718bb3766066fe9d436f42a4d4e
                                                                                      • Instruction Fuzzy Hash: BAA022A8C00002B2CE00E2F08080A3C23282A8C3003C00AAA322EB20C0C03CC000822A
                                                                                      APIs
                                                                                      • CharPrevA.USER32(?,?,004068CC,?,004065A9,?,?,00406CE7,00000000,00406D0C,?,?,?,?,00000000,00000000), ref: 004068D2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharPrev
                                                                                      • String ID:
                                                                                      • API String ID: 122130370-0
                                                                                      • Opcode ID: 17375083e06acd4281245791c958798094bb343357575ce1856f87173c3dc77f
                                                                                      • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                      • Opcode Fuzzy Hash: 17375083e06acd4281245791c958798094bb343357575ce1856f87173c3dc77f
                                                                                      • Instruction Fuzzy Hash:
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407E8C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: 173b8e8880a2d8bc8916495ece18949fbab6e5abf9cd9f38168eb99c200b7a3e
                                                                                      • Instruction ID: 2791b199587b26d82634b85145401aad68464bde91e43c5b6ac1b5c6de7462a2
                                                                                      • Opcode Fuzzy Hash: 173b8e8880a2d8bc8916495ece18949fbab6e5abf9cd9f38168eb99c200b7a3e
                                                                                      • Instruction Fuzzy Hash: 7A1172716042449BDB00EE19C881B5B3794AF84359F1484BAF958AB2C6DB38EC04CBAA
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandle
                                                                                      • String ID:
                                                                                      • API String ID: 2962429428-0
                                                                                      • Opcode ID: e9d4eabf3352258034a438adb9f93a7799ac96b59790047b66948ab7235a5e89
                                                                                      • Instruction ID: 0172511661962fd54a17c381567595eb1d39a1afdb2a9088c563811225ee2893
                                                                                      • Opcode Fuzzy Hash: e9d4eabf3352258034a438adb9f93a7799ac96b59790047b66948ab7235a5e89
                                                                                      • Instruction Fuzzy Hash: FDD05E81B00A6017D215E2BE498864696C85F88745B08847AFA84E73D1D67CAC008399
                                                                                      APIs
                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E82), ref: 00407DBB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 1263568516-0
                                                                                      • Opcode ID: 5b9bfc86dfec920811477731d59a81a0154f8da7388717baf7e2e0d063c75e3e
                                                                                      • Instruction ID: 99ab645fda39969175de1cb99313e8e2edaeef7f3c7532f72142fb74a6686f70
                                                                                      • Opcode Fuzzy Hash: 5b9bfc86dfec920811477731d59a81a0154f8da7388717baf7e2e0d063c75e3e
                                                                                      • Instruction Fuzzy Hash: 0AD0E9B17553055BDB90EEB95CC5B123BD87B48601F5044B66904EB29AE674E8109614
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00000028), ref: 0040937B
                                                                                      • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00409381
                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 0040939A
                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004093C1
                                                                                      • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004093C6
                                                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 004093D7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                      • String ID: SeShutdownPrivilege
                                                                                      • API String ID: 107509674-3733053543
                                                                                      • Opcode ID: 2b7c2d1c4f590a8974f253569f8503172d2d606641626e35aa9b2bf4c08caf06
                                                                                      • Instruction ID: 611fb1cec5075bd7f6e538fe0f9c98e62950726bb4ce6d0bef13c3fa82a74cfd
                                                                                      • Opcode Fuzzy Hash: 2b7c2d1c4f590a8974f253569f8503172d2d606641626e35aa9b2bf4c08caf06
                                                                                      • Instruction Fuzzy Hash: 95F0627068430276E610A6718C47F67228C5B88B08F50483ABE51FA1C3D7BCCC044A6F
                                                                                      APIs
                                                                                      • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409ADA
                                                                                      • SizeofResource.KERNEL32(00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 00409AED
                                                                                      • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4,?,00000000), ref: 00409AFF
                                                                                      • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4), ref: 00409B10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Resource$FindLoadLockSizeof
                                                                                      • String ID:
                                                                                      • API String ID: 3473537107-0
                                                                                      • Opcode ID: 400a5822642c04a340576dade1617737d9942a0be047b9803f81a1d9eeffe18d
                                                                                      • Instruction ID: bd400d834a0aeaf6767d0a45abc69bca8fb82328816d2df24890c915d48f9c17
                                                                                      • Opcode Fuzzy Hash: 400a5822642c04a340576dade1617737d9942a0be047b9803f81a1d9eeffe18d
                                                                                      • Instruction Fuzzy Hash: 87E05AD035434625EA6036E718D2B2B62085FA471DF00013FBB00792D3DDBC8C04452E
                                                                                      APIs
                                                                                      • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale
                                                                                      • String ID:
                                                                                      • API String ID: 2299586839-0
                                                                                      • Opcode ID: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                                                                      • Instruction ID: dec8dcb9893e8432c944e1b70884c8cc40709e939aac0c2d0d2241257bb7fc31
                                                                                      • Opcode Fuzzy Hash: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                                                                      • Instruction Fuzzy Hash: D3D05EB631E6502AE210519B2D85EBB4EACCAC57A4F14443BF648DB242D2248C069776
                                                                                      APIs
                                                                                      • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: SystemTime
                                                                                      • String ID:
                                                                                      • API String ID: 2656138-0
                                                                                      • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                      • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                      • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                      • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                      APIs
                                                                                      • GetVersionExA.KERNEL32(?,00406540,00000000,0040654E,?,?,?,?,?,00409B44), ref: 00405C52
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Version
                                                                                      • String ID:
                                                                                      • API String ID: 1889659487-0
                                                                                      • Opcode ID: b3c8fce3f516c1eeee7654ac00498b0e6f5204205adccd6d1250d5bfc2945711
                                                                                      • Instruction ID: 6a84e84a5bdb2c7c5b206d002f2a3fc227ad50a79849cf1aa773f1ea3c1cbc6a
                                                                                      • Opcode Fuzzy Hash: b3c8fce3f516c1eeee7654ac00498b0e6f5204205adccd6d1250d5bfc2945711
                                                                                      • Instruction Fuzzy Hash: 5AC0126040470186E7109B319C42B1672D4A744310F4805396DA4953C2E73C81018A5A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                                      • Instruction ID: 956cfbd081f07b2254a6d3089f19d76ceb57970edf417c817245e325156cd300
                                                                                      • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                                      • Instruction Fuzzy Hash: 4432E875E04219DFCB14CF99CA80AADB7B2BF88314F24816AD845B7385DB34AE42CF55
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00406FAD
                                                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00406FB3
                                                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00407001
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressCloseHandleModuleProc
                                                                                      • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                      • API String ID: 4190037839-2401316094
                                                                                      • Opcode ID: 60a9e4a616bde9d3650d5374f7b0e792bef98a6345d6610fa7bc99ac1ec5f133
                                                                                      • Instruction ID: 4848c3cc747176469ce0ef08a48ea257d9f62360c4c8e5a9f2e1a14c28c6fa3b
                                                                                      • Opcode Fuzzy Hash: 60a9e4a616bde9d3650d5374f7b0e792bef98a6345d6610fa7bc99ac1ec5f133
                                                                                      • Instruction Fuzzy Hash: C3217370E04209ABDB10EBB5CD51B9F77A8EB44304F60857BA500F72C1DB7CAA05879E
                                                                                      APIs
                                                                                      • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                      • LocalFree.KERNEL32(0060F730,00000000,00401AB4), ref: 00401A1B
                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000,0060F730,00000000,00401AB4), ref: 00401A3A
                                                                                      • LocalFree.KERNEL32(00610730,?,00000000,00008000,0060F730,00000000,00401AB4), ref: 00401A79
                                                                                      • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                      • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                      • String ID: $a$Ta$da
                                                                                      • API String ID: 3782394904-3202075603
                                                                                      • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                      • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                      • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                      • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                      • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                      • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                      • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                      • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                      • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                      • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                      • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                      • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                      • String ID:
                                                                                      • API String ID: 1694776339-0
                                                                                      • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                      • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                      • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                      • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                      APIs
                                                                                      • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                      • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                      • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                      • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                      • String ID: $a$Ta$da
                                                                                      • API String ID: 730355536-3202075603
                                                                                      • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                                      • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                      • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                                      • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                                                      APIs
                                                                                      • GetSystemDefaultLCID.KERNEL32(00000000,0040555C,?,?,?,?,00000000,00000000,00000000,?,0040653B,00000000,0040654E), ref: 0040532E
                                                                                        • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                                                        • Part of subcall function 004051A8: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale$DefaultSystem
                                                                                      • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                      • API String ID: 1044490935-665933166
                                                                                      • Opcode ID: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                                                                      • Instruction ID: f22f4b18e1885e1925b87b286fa486de3d96a381b4aec2b7527aff107c54c5fa
                                                                                      • Opcode Fuzzy Hash: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                                                                      • Instruction Fuzzy Hash: 8E514234B00648ABDB00EBA59C91B9F776ADB89304F50957BB514BB3C6CA3DCA058B5C
                                                                                      APIs
                                                                                      • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                      • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExitMessageProcess
                                                                                      • String ID: Error$Runtime error at 00000000$9@
                                                                                      • API String ID: 1220098344-1503883590
                                                                                      • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                      • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                      • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                      • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                      • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                      • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$AllocString
                                                                                      • String ID:
                                                                                      • API String ID: 262959230-0
                                                                                      • Opcode ID: e5c78b39f57021be2b84baee447ab27339ef0409ceaef8bd5dd3a85dcd2f6a98
                                                                                      • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                      • Opcode Fuzzy Hash: e5c78b39f57021be2b84baee447ab27339ef0409ceaef8bd5dd3a85dcd2f6a98
                                                                                      • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,Ta,?,?,?,00401800), ref: 004014B2
                                                                                      • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,Ta,?,?,?,00401800), ref: 004014D7
                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,Ta,?,?,?,00401800), ref: 004014FD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Virtual$Alloc$Free
                                                                                      • String ID: Ta$da
                                                                                      • API String ID: 3668210933-3182373871
                                                                                      • Opcode ID: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                                                      • Instruction ID: d5dc587d839e3be782c9b7b9e1ff5a952950f17ebcccd457e3de013d7af40e21
                                                                                      • Opcode Fuzzy Hash: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                                                      • Instruction Fuzzy Hash: 7CF0C8717403106AEB316E694CC5F533AD89F85754F1040BAFA0DFF3DAD6745800826C
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(00000000,00409B3A), ref: 004030E3
                                                                                      • GetCommandLineA.KERNEL32(00000000,00409B3A), ref: 004030EE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CommandHandleLineModule
                                                                                      • String ID: U1hd.@$h'_
                                                                                      • API String ID: 2123368496-3076631442
                                                                                      • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                      • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                      • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                      • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                      APIs
                                                                                      • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040941B
                                                                                      • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040942B
                                                                                      • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040943E
                                                                                      • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 00409448
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3436798907.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3436754399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436844550.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3436923335.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastSleep
                                                                                      • String ID:
                                                                                      • API String ID: 1458359878-0
                                                                                      • Opcode ID: fb2155ff6e4859bec8591c3fde2b363a3ebb44483e144ae34e4cc697df15f474
                                                                                      • Instruction ID: 2c3041558bff2c9731999a3fdaa5bf7f611e1c5313eca5e15d372d414c244bd5
                                                                                      • Opcode Fuzzy Hash: fb2155ff6e4859bec8591c3fde2b363a3ebb44483e144ae34e4cc697df15f474
                                                                                      • Instruction Fuzzy Hash: 32F0B472A0811457CB34B5EF9981A6F638DEAD1368751813BF904F3383D578CD0392AD

                                                                                      Execution Graph

                                                                                      Execution Coverage:16.5%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:5.5%
                                                                                      Total number of Nodes:2000
                                                                                      Total number of Limit Nodes:50
                                                                                      execution_graph 53693 40ce60 53694 40ce72 53693->53694 53695 40ce6d 53693->53695 53697 406eb0 CloseHandle 53695->53697 53697->53694 48184 402584 48185 402598 48184->48185 48186 4025ab 48184->48186 48214 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 48185->48214 48187 4025c2 RtlEnterCriticalSection 48186->48187 48188 4025cc 48186->48188 48187->48188 48200 4023b4 13 API calls 48188->48200 48191 40259d 48191->48186 48193 4025a1 48191->48193 48192 4025d5 48194 4025d9 48192->48194 48201 402088 48192->48201 48196 402635 48194->48196 48197 40262b RtlLeaveCriticalSection 48194->48197 48197->48196 48198 4025e5 48198->48194 48215 402210 9 API calls 48198->48215 48200->48192 48202 40209c 48201->48202 48203 4020af 48201->48203 48222 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 48202->48222 48205 4020c6 RtlEnterCriticalSection 48203->48205 48208 4020d0 48203->48208 48205->48208 48206 4020a1 48206->48203 48207 4020a5 48206->48207 48211 402106 48207->48211 48208->48211 48216 401f94 48208->48216 48211->48198 48212 4021f1 RtlLeaveCriticalSection 48213 4021fb 48212->48213 48213->48198 48214->48191 48215->48194 48219 401fa4 48216->48219 48217 401fd0 48221 401ff4 48217->48221 48228 401db4 48217->48228 48219->48217 48219->48221 48223 401f0c 48219->48223 48221->48212 48221->48213 48222->48206 48232 40178c 48223->48232 48226 401f29 48226->48219 48229 401e02 48228->48229 48230 401dd2 48228->48230 48229->48230 48255 401d1c 48229->48255 48230->48221 48235 4017a8 48232->48235 48234 4017b2 48251 401678 VirtualAlloc 48234->48251 48235->48234 48237 40180f 48235->48237 48239 401803 48235->48239 48243 4014e4 48235->48243 48252 4013e0 LocalAlloc 48235->48252 48237->48226 48242 401e80 9 API calls 48237->48242 48253 4015c0 VirtualFree 48239->48253 48240 4017be 48240->48237 48242->48226 48244 4014f3 VirtualAlloc 48243->48244 48246 401520 48244->48246 48247 401543 48244->48247 48254 401398 LocalAlloc 48246->48254 48247->48235 48249 40152c 48249->48247 48250 401530 VirtualFree 48249->48250 48250->48247 48251->48240 48252->48235 48253->48237 48254->48249 48256 401d2e 48255->48256 48257 401d51 48256->48257 48258 401d63 48256->48258 48268 401940 48257->48268 48260 401940 3 API calls 48258->48260 48261 401d61 48260->48261 48262 401d79 48261->48262 48278 401bf8 9 API calls 48261->48278 48262->48230 48264 401d88 48265 401da2 48264->48265 48279 401c4c 9 API calls 48264->48279 48280 401454 LocalAlloc 48265->48280 48269 401966 48268->48269 48277 4019bf 48268->48277 48281 40170c 48269->48281 48273 401983 48274 40199a 48273->48274 48286 4015c0 VirtualFree 48273->48286 48274->48277 48287 401454 LocalAlloc 48274->48287 48277->48261 48278->48264 48279->48265 48280->48262 48283 401743 48281->48283 48282 401783 48285 4013e0 LocalAlloc 48282->48285 48283->48282 48284 40175d VirtualFree 48283->48284 48284->48283 48285->48273 48286->48274 48287->48277 48288 41edc4 48289 41edd3 IsWindowVisible 48288->48289 48290 41ee09 48288->48290 48289->48290 48291 41eddd IsWindowEnabled 48289->48291 48291->48290 48292 41ede7 48291->48292 48295 402648 48292->48295 48294 41edf1 EnableWindow 48294->48290 48296 40264c 48295->48296 48297 402656 48295->48297 48296->48297 48299 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48296->48299 48297->48294 48297->48297 48299->48297 53698 48cea0 53699 48ced4 53698->53699 53700 48ceea 53699->53700 53701 48ced6 53699->53701 53704 48cef9 53700->53704 53705 48cf26 53700->53705 53834 4469d0 18 API calls 53701->53834 53703 48cedf Sleep 53807 48cf21 53703->53807 53706 446a2c 18 API calls 53704->53706 53710 48cf62 53705->53710 53711 48cf35 53705->53711 53708 48cf08 53706->53708 53707 403420 4 API calls 53709 48d394 53707->53709 53712 48cf10 FindWindowA 53708->53712 53716 48cfb8 53710->53716 53717 48cf71 53710->53717 53713 446a2c 18 API calls 53711->53713 53714 446cac 5 API calls 53712->53714 53715 48cf42 53713->53715 53714->53807 53719 48cf4a FindWindowA 53715->53719 53722 48d014 53716->53722 53723 48cfc7 53716->53723 53835 4469d0 18 API calls 53717->53835 53721 446cac 5 API calls 53719->53721 53720 48cf7d 53836 4469d0 18 API calls 53720->53836 53818 48cf5d 53721->53818 53731 48d070 53722->53731 53732 48d023 53722->53732 53839 4469d0 18 API calls 53723->53839 53726 48cf8a 53837 4469d0 18 API calls 53726->53837 53727 48cfd3 53840 4469d0 18 API calls 53727->53840 53730 48cf97 53838 4469d0 18 API calls 53730->53838 53742 48d0aa 53731->53742 53743 48d07f 53731->53743 53844 4469d0 18 API calls 53732->53844 53734 48cfe0 53841 4469d0 18 API calls 53734->53841 53736 48d02f 53845 4469d0 18 API calls 53736->53845 53738 48cfa2 SendMessageA 53741 446cac 5 API calls 53738->53741 53740 48cfed 53842 4469d0 18 API calls 53740->53842 53741->53818 53751 48d0f8 53742->53751 53752 48d0b9 53742->53752 53746 446a2c 18 API calls 53743->53746 53744 48d03c 53846 4469d0 18 API calls 53744->53846 53749 48d08c 53746->53749 53748 48cff8 PostMessageA 53843 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53748->53843 53754 48d094 RegisterClipboardFormatA 53749->53754 53750 48d049 53847 4469d0 18 API calls 53750->53847 53760 48d14c 53751->53760 53761 48d107 53751->53761 53849 4469d0 18 API calls 53752->53849 53757 446cac 5 API calls 53754->53757 53757->53807 53758 48d054 SendNotifyMessageA 53848 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53758->53848 53759 48d0c5 53850 4469d0 18 API calls 53759->53850 53770 48d15b 53760->53770 53771 48d1a0 53760->53771 53852 4469d0 18 API calls 53761->53852 53765 48d0d2 53851 4469d0 18 API calls 53765->53851 53766 48d113 53853 4469d0 18 API calls 53766->53853 53769 48d0dd SendMessageA 53774 446cac 5 API calls 53769->53774 53856 4469d0 18 API calls 53770->53856 53779 48d1af 53771->53779 53780 48d202 53771->53780 53773 48d120 53854 4469d0 18 API calls 53773->53854 53774->53818 53775 48d167 53857 4469d0 18 API calls 53775->53857 53778 48d12b PostMessageA 53855 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53778->53855 53783 446a2c 18 API calls 53779->53783 53787 48d289 53780->53787 53788 48d211 53780->53788 53781 48d174 53858 4469d0 18 API calls 53781->53858 53785 48d1bc 53783->53785 53789 42e1f0 2 API calls 53785->53789 53786 48d17f SendNotifyMessageA 53859 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53786->53859 53797 48d298 53787->53797 53804 48d2be 53787->53804 53791 446a2c 18 API calls 53788->53791 53792 48d1c9 53789->53792 53795 48d220 53791->53795 53793 48d1df GetLastError 53792->53793 53794 48d1cf 53792->53794 53798 446cac 5 API calls 53793->53798 53796 446cac 5 API calls 53794->53796 53860 4469d0 18 API calls 53795->53860 53799 48d1dd 53796->53799 53865 4469d0 18 API calls 53797->53865 53798->53799 53803 446cac 5 API calls 53799->53803 53802 48d2a2 FreeLibrary 53866 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53802->53866 53803->53807 53808 48d2cd 53804->53808 53809 48d2f0 53804->53809 53805 48d233 GetProcAddress 53810 48d279 53805->53810 53811 48d23f 53805->53811 53807->53707 53812 446a2c 18 API calls 53808->53812 53816 48d2ff 53809->53816 53823 48d333 53809->53823 53864 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53810->53864 53861 4469d0 18 API calls 53811->53861 53814 48d2d9 53812->53814 53821 48d2e1 CreateMutexA 53814->53821 53867 487218 18 API calls 53816->53867 53817 48d24b 53862 4469d0 18 API calls 53817->53862 53818->53807 53821->53807 53822 48d258 53826 446cac 5 API calls 53822->53826 53823->53807 53869 487218 18 API calls 53823->53869 53825 48d30b 53827 48d31c OemToCharBuffA 53825->53827 53828 48d269 53826->53828 53868 487230 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53827->53868 53863 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53828->53863 53831 48d34e 53832 48d35f CharToOemBuffA 53831->53832 53870 487230 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53832->53870 53834->53703 53835->53720 53836->53726 53837->53730 53838->53738 53839->53727 53840->53734 53841->53740 53842->53748 53843->53818 53844->53736 53845->53744 53846->53750 53847->53758 53848->53807 53849->53759 53850->53765 53851->53769 53852->53766 53853->53773 53854->53778 53855->53818 53856->53775 53857->53781 53858->53786 53859->53807 53860->53805 53861->53817 53862->53822 53863->53818 53864->53818 53865->53802 53866->53807 53867->53825 53868->53807 53869->53831 53870->53807 48300 47b5ce 48301 47b5d7 48300->48301 48304 47b602 48300->48304 48303 47b5f4 48301->48303 48301->48304 48302 47b641 48305 47b654 48302->48305 48306 47b661 48302->48306 48707 472460 162 API calls 48303->48707 48304->48302 48709 479fc0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48304->48709 48310 47b696 48305->48310 48311 47b658 48305->48311 48313 47b67b 48306->48313 48314 47b66a 48306->48314 48309 47b634 48710 47a18c 37 API calls 48309->48710 48315 47b69f 48310->48315 48316 47b6ba 48310->48316 48318 47b65c 48311->48318 48323 47b6f4 48311->48323 48324 47b6d9 48311->48324 48312 47b5f9 48312->48304 48708 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 48312->48708 48712 47a1fc 37 API calls 48313->48712 48711 47a18c 37 API calls 48314->48711 48713 47a1fc 37 API calls 48315->48713 48714 47a1fc 37 API calls 48316->48714 48328 47b71d 48318->48328 48329 47b73b 48318->48329 48716 47a1fc 37 API calls 48323->48716 48715 47a1fc 37 API calls 48324->48715 48330 47b732 48328->48330 48717 47a18c 37 API calls 48328->48717 48719 479e58 24 API calls 48329->48719 48718 479e58 24 API calls 48330->48718 48334 47b739 48335 47b751 48334->48335 48336 47b74b 48334->48336 48337 47b74f 48335->48337 48339 47a168 37 API calls 48335->48339 48336->48337 48420 47a168 48336->48420 48425 477744 48337->48425 48339->48337 48788 479aec 37 API calls 48420->48788 48422 47a183 48789 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 48422->48789 48790 42d774 GetWindowsDirectoryA 48425->48790 48427 477762 48428 403450 4 API calls 48427->48428 48429 47776f 48428->48429 48792 42d7a0 GetSystemDirectoryA 48429->48792 48431 477777 48432 403450 4 API calls 48431->48432 48433 477784 48432->48433 48794 42d7cc 48433->48794 48435 47778c 48436 403450 4 API calls 48435->48436 48437 477799 48436->48437 48438 4777a2 48437->48438 48439 4777be 48437->48439 48850 42d0e4 48438->48850 48441 403400 4 API calls 48439->48441 48446 4777bc 48441->48446 48443 403450 4 API calls 48443->48446 48444 477803 48798 4775cc 48444->48798 48446->48444 48858 42c7a8 48446->48858 48450 403450 4 API calls 48452 47781f 48450->48452 48451 403450 4 API calls 48453 4777eb 48451->48453 48454 47783d 48452->48454 48456 4035c0 4 API calls 48452->48456 48453->48444 48455 403450 4 API calls 48453->48455 48457 4775cc 8 API calls 48454->48457 48455->48444 48456->48454 48458 47784c 48457->48458 48459 403450 4 API calls 48458->48459 48460 477859 48459->48460 48461 477881 48460->48461 48463 42c36c 5 API calls 48460->48463 48462 4778e8 48461->48462 48466 4775cc 8 API calls 48461->48466 48464 477912 48462->48464 48465 4778f1 48462->48465 48467 47786f 48463->48467 48809 42c36c 48464->48809 48469 42c36c 5 API calls 48465->48469 48470 477899 48466->48470 48468 4035c0 4 API calls 48467->48468 48468->48461 48472 4778fe 48469->48472 48473 403450 4 API calls 48470->48473 48475 4035c0 4 API calls 48472->48475 48476 4778a6 48473->48476 48474 47791f 48819 4035c0 48474->48819 48478 477910 48475->48478 48479 4778b9 48476->48479 48866 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48476->48866 48841 4776b0 48478->48841 48481 4775cc 8 API calls 48479->48481 48483 4778c8 48481->48483 48485 403450 4 API calls 48483->48485 48487 4778d5 48485->48487 48486 403400 4 API calls 48488 47794b 48486->48488 48487->48462 48867 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48487->48867 48490 477ba0 48488->48490 48491 477ba8 48490->48491 48491->48491 48945 45262c 48491->48945 48494 403450 4 API calls 48495 477bd5 48494->48495 48496 403494 4 API calls 48495->48496 48497 477be2 48496->48497 48963 40357c 48497->48963 48499 477bf0 48500 455f80 24 API calls 48499->48500 48501 477bf8 48500->48501 48502 477c0b 48501->48502 48993 455774 6 API calls 48501->48993 48504 42c36c 5 API calls 48502->48504 48505 477c18 48504->48505 48506 4035c0 4 API calls 48505->48506 48507 477c28 48506->48507 48508 477c32 CreateDirectoryA 48507->48508 48509 477c3c GetLastError 48508->48509 48531 477c98 48508->48531 48511 450b64 4 API calls 48509->48511 48510 4035c0 4 API calls 48512 477cad 48510->48512 48513 477c54 48511->48513 48977 477b48 48512->48977 48994 406cd0 19 API calls 48513->48994 48517 477c64 48995 42e670 FormatMessageA 48517->48995 48531->48510 48707->48312 48709->48309 48710->48302 48711->48318 48712->48318 48713->48318 48714->48318 48715->48318 48716->48318 48717->48330 48718->48334 48719->48334 48788->48422 48791 42d795 48790->48791 48791->48427 48793 42d7c1 48792->48793 48793->48431 48795 403400 4 API calls 48794->48795 48796 42d7dc GetModuleHandleA GetProcAddress 48795->48796 48797 42d7f5 48796->48797 48797->48435 48868 42dc54 48798->48868 48800 4775f2 48801 4775f6 48800->48801 48802 477618 48800->48802 48871 42db84 48801->48871 48804 403400 4 API calls 48802->48804 48806 47761f 48804->48806 48806->48450 48807 47760d RegCloseKey 48807->48806 48808 403400 4 API calls 48808->48807 48810 42c376 48809->48810 48811 42c399 48809->48811 48915 42c858 CharPrevA 48810->48915 48916 403494 48811->48916 48814 42c37d 48814->48811 48816 42c388 48814->48816 48817 4035c0 4 API calls 48816->48817 48818 42c396 48817->48818 48818->48474 48820 4035c4 48819->48820 48828 40357c 48819->48828 48821 403450 48820->48821 48823 4035e2 48820->48823 48824 4035d4 48820->48824 48820->48828 48826 4034bc 4 API calls 48821->48826 48830 403464 48821->48830 48822 403490 48822->48478 48827 4034bc 4 API calls 48823->48827 48825 403450 4 API calls 48824->48825 48825->48828 48826->48830 48837 4035f5 48827->48837 48828->48821 48829 4035bf 48828->48829 48831 40358a 48828->48831 48829->48478 48830->48822 48832 402660 4 API calls 48830->48832 48833 4035b4 48831->48833 48834 40359d 48831->48834 48832->48822 48836 4038a4 4 API calls 48833->48836 48835 4038a4 4 API calls 48834->48835 48839 4035a2 48835->48839 48836->48839 48838 403450 4 API calls 48837->48838 48840 403621 48838->48840 48839->48478 48840->48478 48842 4776be 48841->48842 48843 42dc54 RegOpenKeyExA 48842->48843 48844 4776e6 48843->48844 48845 477717 48844->48845 48846 42db84 6 API calls 48844->48846 48845->48486 48847 4776fc 48846->48847 48848 42db84 6 API calls 48847->48848 48849 47770e RegCloseKey 48848->48849 48849->48845 48851 4038a4 4 API calls 48850->48851 48852 42d0f7 48851->48852 48853 42d10e GetEnvironmentVariableA 48852->48853 48857 42d121 48852->48857 48925 42da08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48852->48925 48853->48852 48854 42d11a 48853->48854 48855 403400 4 API calls 48854->48855 48855->48857 48857->48443 48926 42c594 48858->48926 48861 42c7c5 48929 403778 48861->48929 48862 42c7bc 48863 403400 4 API calls 48862->48863 48865 42c7c3 48863->48865 48865->48451 48866->48479 48867->48462 48869 42dc65 RegOpenKeyExA 48868->48869 48870 42dc5f 48868->48870 48869->48800 48870->48869 48874 42da38 48871->48874 48875 42da5e RegQueryValueExA 48874->48875 48881 42da81 48875->48881 48890 42daa3 48875->48890 48876 403400 4 API calls 48878 42db6f 48876->48878 48877 42da9b 48879 403400 4 API calls 48877->48879 48878->48807 48878->48808 48879->48890 48881->48877 48881->48890 48891 4034e0 48881->48891 48896 403744 48881->48896 48883 42dad8 RegQueryValueExA 48883->48875 48884 42daf4 48883->48884 48884->48890 48900 4038a4 48884->48900 48886 42db48 48888 403450 4 API calls 48886->48888 48888->48890 48889 403744 4 API calls 48889->48886 48890->48876 48909 4034bc 48891->48909 48893 4034f0 48894 403400 4 API calls 48893->48894 48895 403508 48894->48895 48895->48881 48897 40374a 48896->48897 48899 40375b 48896->48899 48898 4034bc 4 API calls 48897->48898 48897->48899 48898->48899 48899->48883 48901 4038b1 48900->48901 48908 4038e1 48900->48908 48903 4038da 48901->48903 48905 4038bd 48901->48905 48902 403400 4 API calls 48904 4038cb 48902->48904 48906 4034bc 4 API calls 48903->48906 48904->48886 48904->48889 48914 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48905->48914 48906->48908 48908->48902 48910 4034c0 48909->48910 48911 4034dc 48909->48911 48912 402648 4 API calls 48910->48912 48911->48893 48913 4034c9 48912->48913 48913->48893 48914->48904 48915->48814 48918 403498 48916->48918 48917 4034ba 48917->48474 48918->48917 48920 402660 48918->48920 48921 402664 48920->48921 48922 40266e 48920->48922 48921->48922 48924 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48921->48924 48922->48917 48924->48922 48925->48852 48936 42c59c 48926->48936 48928 42c59b 48928->48861 48928->48862 48930 4037aa 48929->48930 48931 40377d 48929->48931 48932 403400 4 API calls 48930->48932 48931->48930 48934 403791 48931->48934 48933 4037a0 48932->48933 48933->48865 48935 4034e0 4 API calls 48934->48935 48935->48933 48939 42c5ad 48936->48939 48937 42c611 48940 42c60c 48937->48940 48944 42c3b4 IsDBCSLeadByte 48937->48944 48939->48937 48942 42c5cb 48939->48942 48940->48928 48942->48940 48943 42c3b4 IsDBCSLeadByte 48942->48943 48943->48942 48944->48940 48962 45264c 48945->48962 48948 452671 CreateDirectoryA 48949 4526e9 48948->48949 48950 45267b GetLastError 48948->48950 48951 403494 4 API calls 48949->48951 48950->48962 48952 4526f3 48951->48952 48954 403420 4 API calls 48952->48954 48953 450b64 4 API calls 48953->48962 48955 45270d 48954->48955 48957 403420 4 API calls 48955->48957 48958 45271a 48957->48958 48958->48494 48959 42e670 5 API calls 48959->48962 48960 450b34 4 API calls 48960->48962 48962->48948 48962->48953 48962->48959 48962->48960 49005 42d850 48962->49005 49028 4523b8 48962->49028 49047 406cd0 19 API calls 48962->49047 49048 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48962->49048 48964 403580 48963->48964 48965 4035bf 48963->48965 48966 40358a 48964->48966 48972 403450 48964->48972 48965->48499 48967 4035b4 48966->48967 48968 40359d 48966->48968 48971 4038a4 4 API calls 48967->48971 48970 4038a4 4 API calls 48968->48970 48969 403490 48969->48499 48976 4035a2 48970->48976 48971->48976 48973 4034bc 4 API calls 48972->48973 48974 403464 48972->48974 48973->48974 48974->48969 48975 402660 4 API calls 48974->48975 48975->48969 48976->48499 49122 40d0ac 48977->49122 48993->48502 48994->48517 48996 42e696 48995->48996 48997 4034e0 4 API calls 48996->48997 48998 42e6b3 48997->48998 48999 450b34 48998->48999 49000 450b54 48999->49000 49173 450a0c 49000->49173 49003 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49003->48531 49006 42d0e4 5 API calls 49005->49006 49008 42d876 49006->49008 49007 42d882 49010 42d0e4 5 API calls 49007->49010 49013 42d8ce 49007->49013 49008->49007 49058 42cc24 49008->49058 49011 42d892 49010->49011 49012 42d89e 49011->49012 49014 42cc24 7 API calls 49011->49014 49012->49013 49015 42d8c3 49012->49015 49017 42d0e4 5 API calls 49012->49017 49049 42c6e0 49013->49049 49014->49012 49015->49013 49018 42d774 GetWindowsDirectoryA 49015->49018 49020 42d8b7 49017->49020 49018->49013 49020->49015 49024 42cc24 7 API calls 49020->49024 49021 42c36c 5 API calls 49022 42d8e3 49021->49022 49023 403494 4 API calls 49022->49023 49025 42d8ed 49023->49025 49024->49015 49026 403420 4 API calls 49025->49026 49027 42d907 49026->49027 49027->48962 49029 4523d8 49028->49029 49030 42c36c 5 API calls 49029->49030 49031 4523f1 49030->49031 49032 403494 4 API calls 49031->49032 49039 4523fc 49032->49039 49034 42ca9c 6 API calls 49034->49039 49036 450b64 4 API calls 49036->49039 49039->49034 49039->49036 49040 452478 49039->49040 49080 452344 49039->49080 49088 403634 49039->49088 49094 4515f8 49039->49094 49102 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49039->49102 49041 403494 4 API calls 49040->49041 49042 452483 49041->49042 49043 403420 4 API calls 49042->49043 49044 45249d 49043->49044 49045 403400 4 API calls 49044->49045 49046 4524a5 49045->49046 49046->48962 49047->48962 49048->48962 49061 403738 49049->49061 49052 42c726 49055 403494 4 API calls 49052->49055 49053 42c70f 49053->49052 49054 42c717 49053->49054 49056 4034e0 4 API calls 49054->49056 49057 42c724 49055->49057 49056->49057 49057->49021 49063 42cba8 49058->49063 49062 40373c GetFullPathNameA 49061->49062 49062->49052 49062->49053 49069 42ca9c 49063->49069 49065 42cbca 49066 42cbd2 GetFileAttributesA 49065->49066 49067 403400 4 API calls 49066->49067 49068 42cbef 49067->49068 49068->49007 49070 42c59c IsDBCSLeadByte 49069->49070 49071 42caad 49070->49071 49073 42cad4 49071->49073 49079 42ca20 CharPrevA 49071->49079 49074 42caea 49073->49074 49075 42cadf 49073->49075 49077 403778 4 API calls 49074->49077 49076 403494 4 API calls 49075->49076 49078 42cae8 49076->49078 49077->49078 49078->49065 49079->49071 49081 403400 4 API calls 49080->49081 49082 452365 49081->49082 49085 452392 49082->49085 49103 403510 49082->49103 49106 403800 49082->49106 49086 403400 4 API calls 49085->49086 49087 4523a7 49086->49087 49087->49039 49089 40363c 49088->49089 49090 4034bc 4 API calls 49089->49090 49091 40364f 49090->49091 49092 403450 4 API calls 49091->49092 49093 403677 49092->49093 49110 45132c 49094->49110 49096 45160e 49097 451612 49096->49097 49116 42cc38 49096->49116 49097->49039 49102->49039 49104 4034e0 4 API calls 49103->49104 49105 40351d 49104->49105 49105->49082 49107 403804 49106->49107 49109 40382f 49106->49109 49108 4038a4 4 API calls 49107->49108 49108->49109 49109->49082 49111 451336 49110->49111 49112 45133a 49110->49112 49111->49096 49113 451343 Wow64DisableWow64FsRedirection 49112->49113 49114 45135c SetLastError 49112->49114 49115 451357 49113->49115 49114->49115 49115->49096 49117 42cba8 7 API calls 49116->49117 49118 42cc42 GetLastError 49117->49118 49119 451368 49118->49119 49120 451377 49119->49120 49121 45136d Wow64RevertWow64FsRedirection 49119->49121 49120->49039 49121->49120 49123 40d0b6 49122->49123 49133 40d170 FindResourceA 49123->49133 49125 40d0e4 49126 477a6c 49125->49126 49145 40cf00 49126->49145 49134 40d195 49133->49134 49135 40d19c LoadResource 49133->49135 49143 40d0fc 19 API calls 49134->49143 49136 40d1b6 SizeofResource LockResource 49135->49136 49137 40d1af 49135->49137 49140 40d1d4 49136->49140 49144 40d0fc 19 API calls 49137->49144 49140->49125 49141 40d19b 49141->49135 49142 40d1b5 49142->49136 49143->49141 49144->49142 49150 40cdb0 49145->49150 49147 40cf1a 49162 40cee8 49147->49162 49151 40cdbd 49150->49151 49152 40cdd9 49151->49152 49153 40ce0e 49151->49153 49166 406e28 49152->49166 49170 406de8 CreateFileA 49153->49170 49156 40cde0 49158 40ce07 49156->49158 49169 408c94 19 API calls 49156->49169 49157 40ce18 49157->49158 49171 408c94 19 API calls 49157->49171 49158->49147 49161 40ce3f 49161->49158 49167 403738 49166->49167 49168 406e44 CreateFileA 49167->49168 49168->49156 49169->49158 49170->49157 49171->49161 49174 403400 4 API calls 49173->49174 49182 450a3d 49174->49182 49175 403420 4 API calls 49176 450af5 49175->49176 49176->49003 49177 450a54 49179 40357c 4 API calls 49177->49179 49178 4034e0 4 API calls 49178->49182 49180 450a68 49179->49180 49180->49175 49181 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49181->49182 49182->49177 49182->49178 49182->49180 49182->49181 51061 42e24b SetErrorMode 51062 41fac8 51063 41fad1 51062->51063 51066 41fd6c 51063->51066 51065 41fade 51067 41fd83 51066->51067 51068 41fe5e 51066->51068 51067->51068 51087 41f92c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 51067->51087 51068->51065 51070 41fdb9 51071 41fde3 51070->51071 51072 41fdbd 51070->51072 51097 41f92c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 51071->51097 51088 41fb0c 51072->51088 51076 41fdf1 51078 41fdf5 51076->51078 51079 41fe1b 51076->51079 51077 41fb0c 10 API calls 51080 41fde1 51077->51080 51081 41fb0c 10 API calls 51078->51081 51082 41fb0c 10 API calls 51079->51082 51080->51065 51083 41fe07 51081->51083 51084 41fe2d 51082->51084 51085 41fb0c 10 API calls 51083->51085 51086 41fb0c 10 API calls 51084->51086 51085->51080 51086->51080 51087->51070 51089 41fb27 51088->51089 51090 41fb3d 51089->51090 51091 41f8ac 4 API calls 51089->51091 51098 41f8ac 51090->51098 51091->51090 51093 41fb85 51094 41fba8 SetScrollInfo 51093->51094 51106 41fa0c 51094->51106 51097->51076 51117 418150 51098->51117 51100 41f8c9 GetWindowLongA 51101 41f906 51100->51101 51102 41f8e6 51100->51102 51120 41f838 GetWindowLongA GetSystemMetrics GetSystemMetrics 51101->51120 51119 41f838 GetWindowLongA GetSystemMetrics GetSystemMetrics 51102->51119 51105 41f8f2 51105->51093 51107 41fa1a 51106->51107 51108 41fa22 51106->51108 51107->51077 51109 41fa61 51108->51109 51110 41fa51 51108->51110 51116 41fa5f 51108->51116 51122 417db8 IsWindowVisible ScrollWindow SetWindowPos 51109->51122 51121 417db8 IsWindowVisible ScrollWindow SetWindowPos 51110->51121 51111 41faa1 GetScrollPos 51111->51107 51114 41faac 51111->51114 51115 41fabb SetScrollPos 51114->51115 51115->51107 51116->51111 51118 41815a 51117->51118 51118->51100 51119->51105 51120->51105 51121->51116 51122->51116 51123 420508 51124 42051b 51123->51124 51144 415aa0 51124->51144 51126 420662 51127 420679 51126->51127 51151 414644 KiUserCallbackDispatcher 51126->51151 51132 420690 51127->51132 51152 414688 KiUserCallbackDispatcher 51127->51152 51128 4205c1 51149 4207b8 20 API calls 51128->51149 51133 4206b2 51132->51133 51153 41ffd0 12 API calls 51132->51153 51134 420556 51134->51126 51134->51128 51137 4205b2 MulDiv 51134->51137 51135 4205da 51135->51126 51150 41ffd0 12 API calls 51135->51150 51148 41a274 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 51137->51148 51140 4205f7 51141 420613 MulDiv 51140->51141 51142 420636 51140->51142 51141->51142 51142->51126 51143 42063f MulDiv 51142->51143 51143->51126 51145 415ab2 51144->51145 51154 4143e0 51145->51154 51147 415aca 51147->51134 51148->51128 51149->51135 51150->51140 51151->51127 51152->51132 51153->51133 51155 4143fa 51154->51155 51158 4105b8 51155->51158 51157 414410 51157->51147 51161 40de04 51158->51161 51160 4105be 51160->51157 51162 40de66 51161->51162 51163 40de17 51161->51163 51168 40de74 51162->51168 51166 40de74 19 API calls 51163->51166 51167 40de41 51166->51167 51167->51160 51169 40de84 51168->51169 51171 40de9a 51169->51171 51180 40d740 51169->51180 51200 40e1fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51169->51200 51183 40e0ac 51171->51183 51174 40d740 5 API calls 51175 40dea2 51174->51175 51175->51174 51176 40df0e 51175->51176 51186 40dcc0 51175->51186 51178 40e0ac 5 API calls 51176->51178 51179 40de70 51178->51179 51179->51160 51201 40eb68 51180->51201 51209 40d61c 51183->51209 51218 40e0b4 51186->51218 51191 40eacc 5 API calls 51192 40dd09 51191->51192 51193 40dd24 51192->51193 51194 40dd1b 51192->51194 51199 40dd21 51192->51199 51234 40db38 51193->51234 51237 40dc28 19 API calls 51194->51237 51197 403420 4 API calls 51198 40ddef 51197->51198 51198->51175 51199->51197 51200->51169 51204 40d8e0 51201->51204 51206 40d8eb 51204->51206 51205 40d74a 51205->51169 51206->51205 51208 40d92c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51206->51208 51208->51206 51210 40eb68 5 API calls 51209->51210 51211 40d629 51210->51211 51212 40d63c 51211->51212 51216 40ec6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51211->51216 51212->51175 51214 40d637 51217 40d5b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51214->51217 51216->51214 51217->51212 51238 40d8c4 51218->51238 51221 40eb68 5 API calls 51222 40e0d8 51221->51222 51224 40dcf3 51222->51224 51241 40e038 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51222->51241 51225 40eacc 51224->51225 51226 40d8e0 5 API calls 51225->51226 51227 40eae1 51226->51227 51228 4034e0 4 API calls 51227->51228 51229 40eaef 51228->51229 51230 403744 4 API calls 51229->51230 51231 40eaf6 51230->51231 51232 40d8e0 5 API calls 51231->51232 51233 40dcfe 51232->51233 51233->51191 51242 40acdc 19 API calls 51234->51242 51236 40db60 51236->51199 51237->51199 51239 40eb68 5 API calls 51238->51239 51240 40d8ce 51239->51240 51240->51221 51240->51224 51241->51224 51242->51236 51243 440dc8 51244 440dd1 51243->51244 51245 440ddf WriteFile 51243->51245 51244->51245 51246 440dea 51245->51246 53871 4135ac SetWindowLongA GetWindowLongA 53872 413609 SetPropA SetPropA 53871->53872 53873 4135eb GetWindowLongA 53871->53873 53877 41f30c 53872->53877 53873->53872 53874 4135fa SetWindowLongA 53873->53874 53874->53872 53882 4151e0 53877->53882 53889 423b7c 53877->53889 53983 4239f4 53877->53983 53878 413659 53883 4151ed 53882->53883 53884 415253 53883->53884 53885 415248 53883->53885 53888 415251 53883->53888 53990 424afc 13 API calls 53884->53990 53885->53888 53991 414fcc 46 API calls 53885->53991 53888->53878 53894 423bb2 53889->53894 53892 423c5c 53895 423c63 53892->53895 53896 423c97 53892->53896 53893 423bfd 53897 423c03 53893->53897 53898 423cc0 53893->53898 53908 423bd3 53894->53908 53992 423ad8 53894->53992 53901 423c69 53895->53901 53935 423f21 53895->53935 53904 423ca2 53896->53904 53905 42400a IsIconic 53896->53905 53902 423c35 53897->53902 53903 423c08 53897->53903 53899 423cd2 53898->53899 53900 423cdb 53898->53900 53906 423ce8 53899->53906 53907 423cd9 53899->53907 54001 424104 11 API calls 53900->54001 53910 423e83 SendMessageA 53901->53910 53911 423c77 53901->53911 53902->53908 53924 423c4e 53902->53924 53925 423daf 53902->53925 53913 423d66 53903->53913 53914 423c0e 53903->53914 53915 424046 53904->53915 53916 423cab 53904->53916 53905->53908 53912 42401e GetFocus 53905->53912 53919 42414c 11 API calls 53906->53919 54002 423af4 NtdllDefWindowProc_A 53907->54002 53908->53878 53910->53908 53911->53908 53936 423c30 53911->53936 53957 423ec6 53911->53957 53912->53908 53920 42402f 53912->53920 54006 423af4 NtdllDefWindowProc_A 53913->54006 53921 423c17 53914->53921 53922 423d8e PostMessageA 53914->53922 54021 4247c0 WinHelpA PostMessageA 53915->54021 53918 42405d 53916->53918 53916->53936 53932 424066 53918->53932 53933 42407b 53918->53933 53919->53908 54020 41ef64 GetCurrentThreadId 73EA5940 53920->54020 53929 423c20 53921->53929 53930 423e15 53921->53930 54007 423af4 NtdllDefWindowProc_A 53922->54007 53924->53936 53937 423d7b 53924->53937 53996 423af4 NtdllDefWindowProc_A 53925->53996 53941 423c29 53929->53941 53942 423d3e IsIconic 53929->53942 53943 423e1e 53930->53943 53944 423e4f 53930->53944 53931 423da9 53931->53908 53934 424444 5 API calls 53932->53934 54022 42449c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 53933->54022 53934->53908 53935->53908 53953 423f47 IsWindowEnabled 53935->53953 53936->53908 54000 423af4 NtdllDefWindowProc_A 53936->54000 53949 4240e8 12 API calls 53937->53949 53940 424036 53940->53908 53951 42403e SetFocus 53940->53951 53941->53936 53960 423d01 53941->53960 53945 423d5a 53942->53945 53946 423d4e 53942->53946 54009 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53943->54009 53997 423af4 NtdllDefWindowProc_A 53944->53997 54005 423af4 NtdllDefWindowProc_A 53945->54005 54004 423b30 15 API calls 53946->54004 53949->53908 53950 423db5 53958 423df3 53950->53958 53959 423dd1 53950->53959 53951->53908 53953->53908 53963 423f55 53953->53963 53956 423e55 53964 423e6d 53956->53964 53998 41ee14 GetCurrentThreadId 73EA5940 53956->53998 53957->53908 53972 423ee8 IsWindowEnabled 53957->53972 53966 4239f4 6 API calls 53958->53966 54008 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53959->54008 53960->53908 54003 422bbc ShowWindow PostMessageA PostQuitMessage 53960->54003 53961 423e38 54016 423af4 NtdllDefWindowProc_A 53961->54016 53962 423e26 53962->53961 54010 41eec8 53962->54010 53975 423f5c IsWindowVisible 53963->53975 53971 4239f4 6 API calls 53964->53971 53974 423dfb PostMessageA 53966->53974 53971->53908 53972->53908 53976 423ef6 53972->53976 53973 423dd9 PostMessageA 53973->53908 53974->53908 53975->53908 53977 423f6a GetFocus 53975->53977 54017 412280 7 API calls 53976->54017 53979 418150 53977->53979 53980 423f7f SetFocus 53979->53980 54018 4151b0 53980->54018 53984 423a04 53983->53984 53986 423a7d 53983->53986 53985 423a0a EnumWindows 53984->53985 53984->53986 53985->53986 53987 423a26 GetWindow GetWindowLongA 53985->53987 54023 42398c GetWindow 53985->54023 53986->53878 53988 423a45 53987->53988 53988->53986 53989 423a71 SetWindowPos 53988->53989 53989->53986 53989->53988 53990->53888 53991->53888 53993 423aed 53992->53993 53994 423ae2 53992->53994 53993->53892 53993->53893 53994->53993 53995 408688 7 API calls 53994->53995 53995->53993 53996->53950 53997->53956 53999 41ee99 53998->53999 53999->53964 54000->53908 54001->53908 54002->53908 54003->53908 54004->53908 54005->53908 54006->53908 54007->53931 54008->53973 54009->53962 54011 41eed0 IsWindow 54010->54011 54012 41eefc 54010->54012 54013 41eeea 54011->54013 54014 41eedf EnableWindow 54011->54014 54012->53961 54013->54011 54013->54012 54015 402660 4 API calls 54013->54015 54014->54013 54015->54013 54016->53908 54017->53908 54019 4151cb SetFocus 54018->54019 54019->53908 54020->53940 54021->53931 54022->53931 54024 4239ad GetWindowLongA 54023->54024 54025 4239b9 54023->54025 54024->54025 54026 467ca8 54027 467cde 54026->54027 54051 467ecb 54026->54051 54029 467d12 54027->54029 54031 467d5c 54027->54031 54032 467d6d 54027->54032 54033 467d3a 54027->54033 54034 467d4b 54027->54034 54035 467d29 54027->54035 54028 403400 4 API calls 54030 467f57 54028->54030 54036 46544c 19 API calls 54029->54036 54029->54051 54038 403400 4 API calls 54030->54038 54220 467a18 61 API calls 54031->54220 54221 467c38 40 API calls 54032->54221 54219 4676fc 37 API calls 54033->54219 54062 467844 54034->54062 54218 467594 42 API calls 54035->54218 54045 467d8f 54036->54045 54043 467f5f 54038->54043 54044 467d2f 54044->54029 54044->54051 54046 48f514 18 API calls 54045->54046 54045->54051 54061 467dd1 54045->54061 54046->54061 54047 465388 19 API calls 54047->54061 54048 467eb8 54222 47ddd8 97 API calls 54048->54222 54050 42ca9c 6 API calls 54050->54061 54051->54028 54052 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54052->54061 54054 414a58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54054->54061 54056 466fa4 23 API calls 54056->54061 54057 467f39 54059 466fa4 23 API calls 54057->54059 54059->54051 54061->54047 54061->54048 54061->54050 54061->54051 54061->54052 54061->54054 54061->54056 54061->54057 54103 466ed0 54061->54103 54110 4666d8 54061->54110 54147 47d994 54061->54147 54223 467370 19 API calls 54061->54223 54224 468348 54062->54224 54065 4679dc 54066 403400 4 API calls 54065->54066 54068 4679f1 54066->54068 54067 414a58 4 API calls 54069 467892 54067->54069 54070 403420 4 API calls 54068->54070 54071 46789f 54069->54071 54072 4679cd 54069->54072 54073 4679fe 54070->54073 54074 42c7a8 5 API calls 54071->54074 54075 403450 4 API calls 54072->54075 54076 403400 4 API calls 54073->54076 54077 4678ae 54074->54077 54075->54065 54078 467a06 54076->54078 54079 42c36c 5 API calls 54077->54079 54078->54029 54080 4678b9 54079->54080 54227 4547f8 13 API calls 54080->54227 54082 46792b 54082->54065 54083 42cc24 7 API calls 54082->54083 54096 46798b 54082->54096 54084 467964 54083->54084 54088 450b64 4 API calls 54084->54088 54084->54096 54085 4678c6 54085->54082 54087 462e64 19 API calls 54085->54087 54086 42cc24 7 API calls 54090 4679a1 54086->54090 54089 4678f5 54087->54089 54091 46797b 54088->54091 54092 462e64 19 API calls 54089->54092 54090->54072 54095 450b64 4 API calls 54090->54095 54229 479aec 37 API calls 54091->54229 54094 467906 54092->54094 54097 450b34 4 API calls 54094->54097 54098 4679b8 54095->54098 54096->54065 54096->54072 54096->54086 54099 46791b 54097->54099 54230 479aec 37 API calls 54098->54230 54228 479aec 37 API calls 54099->54228 54102 4679c8 54102->54065 54102->54072 54104 466ee1 54103->54104 54105 466edc 54103->54105 54423 466258 45 API calls 54104->54423 54106 466edf 54105->54106 54338 46693c 54105->54338 54106->54061 54108 466ee9 54108->54061 54111 46670b 54110->54111 54439 478b40 54111->54439 54113 466720 54114 466747 54113->54114 54115 466724 54113->54115 54117 46673e 54114->54117 54456 48f418 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54114->54456 54116 463064 20 API calls 54115->54116 54119 46672e 54116->54119 54123 403494 4 API calls 54117->54123 54146 466871 54117->54146 54122 403450 4 API calls 54119->54122 54120 466763 54120->54117 54125 46676b 54120->54125 54121 403400 4 API calls 54126 4668a6 54121->54126 54122->54117 54124 46681a 54123->54124 54127 40357c 4 API calls 54124->54127 54128 466fa4 23 API calls 54125->54128 54126->54061 54129 466827 54127->54129 54130 466778 54128->54130 54131 40357c 4 API calls 54129->54131 54457 42ef34 54130->54457 54133 466834 54131->54133 54135 40357c 4 API calls 54133->54135 54137 466841 54135->54137 54139 40357c 4 API calls 54137->54139 54138 4667ba 54140 403450 4 API calls 54138->54140 54141 46684f 54139->54141 54142 4667ca 54140->54142 54143 414a88 4 API calls 54141->54143 54142->54061 54144 466860 54143->54144 54145 46339c 11 API calls 54144->54145 54145->54146 54146->54121 54148 468348 42 API calls 54147->54148 54149 47d9d7 54148->54149 54150 47d9e0 54149->54150 54679 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54149->54679 54152 414a58 4 API calls 54150->54152 54153 47d9f0 54152->54153 54154 403450 4 API calls 54153->54154 54155 47d9fd 54154->54155 54506 468658 54155->54506 54158 47da0d 54160 414a58 4 API calls 54158->54160 54161 47da1d 54160->54161 54162 403450 4 API calls 54161->54162 54163 47da2a 54162->54163 54164 466040 SendMessageA 54163->54164 54165 47da43 54164->54165 54166 47da81 54165->54166 54681 4751b4 23 API calls 54165->54681 54168 42414c 11 API calls 54166->54168 54169 47da8b 54168->54169 54170 47dab1 54169->54170 54171 47da9c SetActiveWindow 54169->54171 54535 47cf98 54170->54535 54171->54170 54218->54044 54219->54029 54220->54029 54221->54029 54222->54051 54223->54061 54231 4683d4 54224->54231 54227->54085 54228->54082 54229->54096 54230->54102 54232 414a58 4 API calls 54231->54232 54233 468406 54232->54233 54285 4630fc 54233->54285 54236 414a88 4 API calls 54237 468418 54236->54237 54238 468427 54237->54238 54241 468440 54237->54241 54315 479aec 37 API calls 54238->54315 54240 46843b 54242 403420 4 API calls 54240->54242 54243 468487 54241->54243 54245 46846e 54241->54245 54244 467876 54242->54244 54246 4684ec 54243->54246 54259 46848b 54243->54259 54244->54065 54244->54067 54316 479aec 37 API calls 54245->54316 54318 42ca28 CharNextA 54246->54318 54249 4684fb 54250 4684ff 54249->54250 54253 468518 54249->54253 54319 479aec 37 API calls 54250->54319 54252 4684d3 54317 479aec 37 API calls 54252->54317 54254 46853c 54253->54254 54294 46326c 54253->54294 54320 479aec 37 API calls 54254->54320 54258 46852c 54258->54254 54299 46329c 54258->54299 54259->54252 54259->54253 54262 468555 54263 403778 4 API calls 54262->54263 54264 46856b 54263->54264 54303 42c878 54264->54303 54267 46857c 54321 4632f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54267->54321 54268 4685aa 54270 42c7a8 5 API calls 54268->54270 54272 4685b5 54270->54272 54271 46858f 54273 450b64 4 API calls 54271->54273 54274 42c36c 5 API calls 54272->54274 54276 46859c 54273->54276 54275 4685c0 54274->54275 54277 42ca9c 6 API calls 54275->54277 54322 479aec 37 API calls 54276->54322 54279 4685cb 54277->54279 54307 468368 54279->54307 54281 4685d3 54282 42cc24 7 API calls 54281->54282 54283 4685db 54282->54283 54283->54240 54323 479aec 37 API calls 54283->54323 54290 463116 54285->54290 54287 42ca9c 6 API calls 54287->54290 54288 403450 4 API calls 54288->54290 54289 406b18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54289->54290 54290->54287 54290->54288 54290->54289 54291 46315f 54290->54291 54324 42c988 54290->54324 54292 403420 4 API calls 54291->54292 54293 463179 54292->54293 54293->54236 54296 463276 54294->54296 54295 463297 54295->54258 54296->54295 54297 463289 54296->54297 54335 42ca18 CharNextA 54296->54335 54297->54258 54300 4632a6 54299->54300 54301 4632d3 54300->54301 54336 42ca18 CharNextA 54300->54336 54301->54254 54301->54262 54304 42c8d1 54303->54304 54305 42c88e 54303->54305 54304->54267 54304->54268 54305->54304 54337 42ca18 CharNextA 54305->54337 54308 4683cd 54307->54308 54309 46837b 54307->54309 54308->54281 54309->54308 54310 41ee14 2 API calls 54309->54310 54311 46838b 54310->54311 54312 4683a5 SHPathPrepareForWriteA 54311->54312 54313 41eec8 6 API calls 54312->54313 54314 4683c5 54313->54314 54314->54281 54315->54240 54316->54240 54317->54240 54318->54249 54319->54240 54320->54240 54321->54271 54322->54240 54323->54240 54325 403494 4 API calls 54324->54325 54326 42c998 54325->54326 54327 403744 4 API calls 54326->54327 54330 42c9ce 54326->54330 54333 42c3b4 IsDBCSLeadByte 54326->54333 54327->54326 54329 42ca12 54329->54290 54330->54329 54332 4037b8 4 API calls 54330->54332 54334 42c3b4 IsDBCSLeadByte 54330->54334 54332->54330 54333->54326 54334->54330 54335->54296 54336->54300 54337->54305 54340 466983 54338->54340 54339 466dfb 54342 466e16 54339->54342 54343 466e47 54339->54343 54340->54339 54341 466a3e 54340->54341 54345 403494 4 API calls 54340->54345 54344 466a5f 54341->54344 54348 466aa0 54341->54348 54346 403494 4 API calls 54342->54346 54347 403494 4 API calls 54343->54347 54349 403494 4 API calls 54344->54349 54350 4669c2 54345->54350 54351 466e24 54346->54351 54352 466e55 54347->54352 54356 403400 4 API calls 54348->54356 54353 466a6d 54349->54353 54354 414a58 4 API calls 54350->54354 54435 465934 12 API calls 54351->54435 54436 465934 12 API calls 54352->54436 54358 414a58 4 API calls 54353->54358 54359 4669e3 54354->54359 54361 466a9e 54356->54361 54363 466a8e 54358->54363 54364 403634 4 API calls 54359->54364 54360 466e32 54362 403400 4 API calls 54360->54362 54410 466b84 54361->54410 54424 466040 54361->54424 54366 466e78 54362->54366 54368 403634 4 API calls 54363->54368 54369 4669f3 54364->54369 54372 403400 4 API calls 54366->54372 54367 466c0c 54370 403400 4 API calls 54367->54370 54368->54361 54373 414a58 4 API calls 54369->54373 54374 466c0a 54370->54374 54371 466ac0 54375 466ac6 54371->54375 54376 466afe 54371->54376 54377 466e80 54372->54377 54378 466a07 54373->54378 54430 46647c 42 API calls 54374->54430 54379 403494 4 API calls 54375->54379 54381 403400 4 API calls 54376->54381 54380 403420 4 API calls 54377->54380 54378->54341 54386 414a58 4 API calls 54378->54386 54382 466ad4 54379->54382 54383 466e8d 54380->54383 54385 466afc 54381->54385 54389 47742c 42 API calls 54382->54389 54383->54106 54384 466bcb 54390 403494 4 API calls 54384->54390 54397 466334 42 API calls 54385->54397 54387 466a2e 54386->54387 54391 403634 4 API calls 54387->54391 54393 466aec 54389->54393 54394 466bd9 54390->54394 54391->54341 54392 466c35 54400 466c96 54392->54400 54401 466c40 54392->54401 54395 403634 4 API calls 54393->54395 54396 414a58 4 API calls 54394->54396 54395->54385 54398 466bfa 54396->54398 54399 466b25 54397->54399 54402 403634 4 API calls 54398->54402 54405 466b86 54399->54405 54406 466b30 54399->54406 54403 403400 4 API calls 54400->54403 54404 403494 4 API calls 54401->54404 54402->54374 54407 466c9e 54403->54407 54413 466c4e 54404->54413 54409 403400 4 API calls 54405->54409 54408 403494 4 API calls 54406->54408 54411 466c94 54407->54411 54422 466d47 54407->54422 54415 466b3e 54408->54415 54409->54410 54410->54367 54410->54384 54411->54407 54431 48f418 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54411->54431 54413->54407 54413->54411 54416 403634 4 API calls 54413->54416 54414 466cc1 54414->54422 54432 48f680 18 API calls 54414->54432 54415->54410 54418 403634 4 API calls 54415->54418 54416->54413 54418->54415 54420 466de8 54434 4290b4 SendMessageA SendMessageA 54420->54434 54433 429064 SendMessageA 54422->54433 54423->54108 54437 429fb0 SendMessageA 54424->54437 54426 46604f 54427 46606f 54426->54427 54438 429fb0 SendMessageA 54426->54438 54427->54371 54429 46605f 54429->54371 54430->54392 54431->54414 54432->54422 54433->54420 54434->54339 54435->54360 54436->54360 54437->54426 54438->54429 54440 478b6e 54439->54440 54444 478ba4 54439->54444 54474 4546f8 54440->54474 54441 403420 4 API calls 54442 478ca5 54441->54442 54442->54113 54444->54441 54445 478c6e 54445->54113 54446 474a30 19 API calls 54449 478b98 54446->54449 54447 47742c 42 API calls 54447->54449 54448 47742c 42 API calls 54452 478c1c 54448->54452 54449->54444 54449->54445 54449->54446 54449->54447 54449->54452 54481 478700 31 API calls 54449->54481 54451 42c808 5 API calls 54451->54452 54452->54448 54452->54449 54452->54451 54453 42c830 5 API calls 54452->54453 54455 478c5b 54452->54455 54482 47884c 54 API calls 54452->54482 54453->54452 54455->54444 54456->54120 54458 42ef40 54457->54458 54459 42ef63 GetActiveWindow GetFocus 54458->54459 54460 41ee14 2 API calls 54459->54460 54461 42ef7a 54460->54461 54462 42ef97 54461->54462 54463 42ef87 RegisterClassA 54461->54463 54464 42f026 SetFocus 54462->54464 54465 42efa5 CreateWindowExA 54462->54465 54463->54462 54467 403400 4 API calls 54464->54467 54465->54464 54466 42efd8 54465->54466 54500 4241ec 54466->54500 54469 42f042 54467->54469 54473 48f680 18 API calls 54469->54473 54470 42f000 54471 42f008 CreateWindowExA 54470->54471 54471->54464 54472 42f01e ShowWindow 54471->54472 54472->54464 54473->54138 54475 454709 54474->54475 54476 454716 54475->54476 54477 45470d 54475->54477 54491 4544dc 29 API calls 54476->54491 54483 4543fc 54477->54483 54480 454713 54480->54449 54481->54449 54482->54452 54484 42dc54 RegOpenKeyExA 54483->54484 54485 454419 54484->54485 54486 454467 54485->54486 54492 454330 54485->54492 54486->54480 54489 454330 6 API calls 54490 454448 RegCloseKey 54489->54490 54490->54480 54491->54480 54497 42db90 54492->54497 54494 403420 4 API calls 54495 4543e2 54494->54495 54495->54489 54496 454358 54496->54494 54498 42da38 6 API calls 54497->54498 54499 42db99 54498->54499 54499->54496 54501 42421e 54500->54501 54502 4241fe GetWindowTextA 54500->54502 54504 403494 4 API calls 54501->54504 54503 4034e0 4 API calls 54502->54503 54505 42421c 54503->54505 54504->54505 54505->54470 54507 468681 54506->54507 54508 414a58 4 API calls 54507->54508 54518 4686ce 54507->54518 54510 468697 54508->54510 54509 403420 4 API calls 54512 468778 54509->54512 54687 463188 6 API calls 54510->54687 54512->54158 54680 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54512->54680 54513 46869f 54514 414a88 4 API calls 54513->54514 54515 4686ad 54514->54515 54516 4686ba 54515->54516 54519 4686d3 54515->54519 54688 479aec 37 API calls 54516->54688 54518->54509 54520 4686eb 54519->54520 54522 46326c CharNextA 54519->54522 54689 479aec 37 API calls 54520->54689 54523 4686e7 54522->54523 54523->54520 54524 468701 54523->54524 54525 468707 54524->54525 54526 46871d 54524->54526 54690 479aec 37 API calls 54525->54690 54528 42c878 CharNextA 54526->54528 54529 46872a 54528->54529 54529->54518 54691 4632f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54529->54691 54531 468741 54532 450b64 4 API calls 54531->54532 54533 46874e 54532->54533 54692 479aec 37 API calls 54533->54692 54536 47cfe9 54535->54536 54537 47cfbb 54535->54537 54539 471744 54536->54539 54693 48f434 18 API calls 54537->54693 54540 455f80 24 API calls 54539->54540 54541 471790 54540->54541 54542 407210 SetCurrentDirectoryA 54541->54542 54543 47179a 54542->54543 54694 46a1c4 54543->54694 54545 47179f 54701 458854 54545->54701 54548 47742c 42 API calls 54549 4717f6 54548->54549 54551 471806 54549->54551 55098 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54549->55098 54552 471828 54551->54552 55099 451f4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54551->55099 54554 47426c 20 API calls 54552->54554 54555 471833 54554->54555 54556 403450 4 API calls 54555->54556 54557 471850 54556->54557 54558 403450 4 API calls 54557->54558 54559 47185e 54558->54559 54705 46a88c 54559->54705 54563 4718c4 54745 47169c 54563->54745 54570 46a414 17 API calls 54571 4718e8 54570->54571 54681->54166 54687->54513 54688->54518 54689->54518 54690->54518 54691->54531 54692->54518 54693->54536 54700 46a1eb 54694->54700 54695 46a268 55106 44f490 54695->55106 54696 474a30 19 API calls 54696->54700 54699 46a2c2 54699->54545 54700->54695 54700->54696 54702 45885a 54701->54702 54703 458b3c 4 API calls 54702->54703 54704 458876 54703->54704 54704->54548 54706 46a8ca 54705->54706 54707 46a8ba 54705->54707 54709 403400 4 API calls 54706->54709 54708 403494 4 API calls 54707->54708 54710 46a8c8 54708->54710 54709->54710 54711 453f4c 5 API calls 54710->54711 54712 46a8de 54711->54712 54713 453f88 5 API calls 54712->54713 54714 46a8ec 54713->54714 54715 46a864 5 API calls 54714->54715 54716 46a900 54715->54716 54717 458910 4 API calls 54716->54717 54718 46a918 54717->54718 54719 403420 4 API calls 54718->54719 54720 46a932 54719->54720 54721 403400 4 API calls 54720->54721 54722 46a93a 54721->54722 54723 46aa98 54722->54723 54724 4034e0 4 API calls 54723->54724 54725 46aad5 54724->54725 54726 46aade 54725->54726 54727 46aaed 54725->54727 54728 47742c 42 API calls 54726->54728 54729 403400 4 API calls 54727->54729 54730 46aaeb 54728->54730 54729->54730 54731 47742c 42 API calls 54730->54731 54732 46ab10 54731->54732 54733 46ab3d 54732->54733 55118 46a94c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54732->55118 55115 46aa84 54733->55115 54737 47742c 42 API calls 54738 46ab7e 54737->54738 54739 458910 4 API calls 54738->54739 54740 46ab9c 54739->54740 54741 403420 4 API calls 54740->54741 54742 46abb6 54741->54742 54743 403420 4 API calls 54742->54743 54744 46abc3 54743->54744 54744->54563 54746 4716ac 54745->54746 54748 4716dd 54745->54748 54747 4748f0 19 API calls 54746->54747 54746->54748 54747->54746 54749 46a414 54748->54749 54750 46a422 54749->54750 54751 46a41d 54749->54751 55119 42441c 54750->55119 55123 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54751->55123 54755 46a43a 54757 4716f0 54755->54757 54758 471700 54757->54758 54760 471733 54757->54760 54759 4748f0 19 API calls 54758->54759 54758->54760 54759->54758 54760->54570 55098->54551 55099->54552 55109 44f4a4 55106->55109 55110 44f4b5 55109->55110 55111 44f4d6 MulDiv 55110->55111 55112 44f4a1 7715E550 55110->55112 55113 418150 55111->55113 55112->54699 55114 44f501 SendMessageA 55113->55114 55114->55112 55116 403494 4 API calls 55115->55116 55117 46aa93 55116->55117 55117->54737 55118->54733 55120 42441f 55119->55120 55122 42442a 55120->55122 55125 42436c PeekMessageA 55120->55125 55122->54755 55124 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 55122->55124 55126 424410 55125->55126 55127 42438f 55125->55127 55126->55120 55127->55126 55137 42433c 55127->55137 55138 424364 55137->55138 55139 42434d 55137->55139 55138->55126 55141 424288 55138->55141 55139->55138 55156 424c28 UnhookWindowsHookEx TerminateThread KillTimer IsWindowVisible ShowWindow 55139->55156 55142 4242d2 55141->55142 55143 424298 55141->55143 55142->55126 55145 4242d8 55142->55145 55143->55142 55156->55138 56131 47b534 56132 450710 5 API calls 56131->56132 56133 47b548 56132->56133 56134 47a678 23 API calls 56133->56134 56135 47b56c 56134->56135 56136 416ab2 56137 416b5a 56136->56137 56138 416aca 56136->56138 56155 41528c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56137->56155 56139 416ae4 SendMessageA 56138->56139 56140 416ad8 56138->56140 56151 416b38 56139->56151 56142 416ae2 CallWindowProcA 56140->56142 56143 416afe 56140->56143 56142->56151 56152 419fc8 GetSysColor 56143->56152 56146 416b09 SetTextColor 56147 416b1e 56146->56147 56153 419fc8 GetSysColor 56147->56153 56149 416b23 SetBkColor 56154 41a650 GetSysColor CreateBrushIndirect 56149->56154 56152->56146 56153->56149 56154->56151 56155->56151 51247 48c0dc 51248 48c116 51247->51248 51249 48c118 51248->51249 51250 48c122 51248->51250 51447 409000 MessageBeep 51249->51447 51252 48c15a 51250->51252 51253 48c131 51250->51253 51260 48c169 51252->51260 51261 48c192 51252->51261 51254 446a2c 18 API calls 51253->51254 51256 48c13e 51254->51256 51255 403420 4 API calls 51257 48c76e 51255->51257 51259 406b18 4 API calls 51256->51259 51258 403400 4 API calls 51257->51258 51262 48c776 51258->51262 51263 48c149 51259->51263 51264 446a2c 18 API calls 51260->51264 51267 48c1ca 51261->51267 51268 48c1a1 51261->51268 51448 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51263->51448 51266 48c176 51264->51266 51449 406b68 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51266->51449 51275 48c1d9 51267->51275 51276 48c1f2 51267->51276 51270 446a2c 18 API calls 51268->51270 51272 48c1ae 51270->51272 51271 48c181 51450 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51271->51450 51451 406b9c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51272->51451 51453 4071e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 51275->51453 51282 48c201 51276->51282 51283 48c226 51276->51283 51277 48c1b9 51452 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51277->51452 51280 48c1e1 51454 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51280->51454 51284 446a2c 18 API calls 51282->51284 51287 48c25e 51283->51287 51288 48c235 51283->51288 51285 48c20e 51284->51285 51455 407210 51285->51455 51294 48c26d 51287->51294 51295 48c296 51287->51295 51289 446a2c 18 API calls 51288->51289 51291 48c242 51289->51291 51290 48c216 51458 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51290->51458 51293 42c6e0 5 API calls 51291->51293 51296 48c24d 51293->51296 51297 446a2c 18 API calls 51294->51297 51300 48c2e2 51295->51300 51301 48c2a5 51295->51301 51459 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51296->51459 51299 48c27a 51297->51299 51460 407160 8 API calls 51299->51460 51308 48c31a 51300->51308 51309 48c2f1 51300->51309 51303 446a2c 18 API calls 51301->51303 51305 48c2b4 51303->51305 51304 48c285 51461 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51304->51461 51307 446a2c 18 API calls 51305->51307 51311 48c2c5 51307->51311 51316 48c329 51308->51316 51317 48c352 51308->51317 51310 446a2c 18 API calls 51309->51310 51312 48c2fe 51310->51312 51462 48bde0 8 API calls 51311->51462 51464 42c780 51312->51464 51315 48c2d1 51463 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51315->51463 51320 446a2c 18 API calls 51316->51320 51323 48c361 51317->51323 51327 48c38a 51317->51327 51322 48c336 51320->51322 51325 42c7a8 5 API calls 51322->51325 51326 446a2c 18 API calls 51323->51326 51324 48c11d 51324->51255 51328 48c341 51325->51328 51329 48c36e 51326->51329 51332 48c399 51327->51332 51333 48c3c2 51327->51333 51470 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51328->51470 51471 42c7d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 51329->51471 51335 446a2c 18 API calls 51332->51335 51339 48c3fa 51333->51339 51340 48c3d1 51333->51340 51334 48c379 51472 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51334->51472 51337 48c3a6 51335->51337 51338 42c808 5 API calls 51337->51338 51341 48c3b1 51338->51341 51345 48c409 51339->51345 51346 48c446 51339->51346 51342 446a2c 18 API calls 51340->51342 51473 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51341->51473 51344 48c3de 51342->51344 51347 42c830 5 API calls 51344->51347 51348 446a2c 18 API calls 51345->51348 51353 48c498 51346->51353 51354 48c455 51346->51354 51349 48c3e9 51347->51349 51350 48c418 51348->51350 51474 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51349->51474 51352 446a2c 18 API calls 51350->51352 51355 48c429 51352->51355 51361 48c50b 51353->51361 51362 48c4a7 51353->51362 51356 446a2c 18 API calls 51354->51356 51475 42c424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 51355->51475 51358 48c468 51356->51358 51359 446a2c 18 API calls 51358->51359 51363 48c479 51359->51363 51360 48c435 51476 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51360->51476 51369 48c54a 51361->51369 51370 48c51a 51361->51370 51435 446a2c 51362->51435 51477 48bfd8 12 API calls 51363->51477 51368 48c487 51478 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51368->51478 51378 48c589 51369->51378 51379 48c559 51369->51379 51373 446a2c 18 API calls 51370->51373 51375 48c527 51373->51375 51374 48c4c2 51376 48c4fb 51374->51376 51377 48c4c6 51374->51377 51481 451510 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 51375->51481 51480 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51376->51480 51382 446a2c 18 API calls 51377->51382 51392 48c5c8 51378->51392 51393 48c598 51378->51393 51384 446a2c 18 API calls 51379->51384 51383 48c4d5 51382->51383 51440 451888 51383->51440 51388 48c566 51384->51388 51385 48c534 51482 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51385->51482 51483 451378 51388->51483 51389 48c545 51389->51324 51390 48c4e5 51479 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51390->51479 51400 48c610 51392->51400 51401 48c5d7 51392->51401 51394 446a2c 18 API calls 51393->51394 51397 48c5a5 51394->51397 51396 48c573 51490 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51396->51490 51491 451a18 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 51397->51491 51406 48c658 51400->51406 51407 48c61f 51400->51407 51403 446a2c 18 API calls 51401->51403 51402 48c5b2 51492 446b04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51402->51492 51405 48c5e6 51403->51405 51408 446a2c 18 API calls 51405->51408 51412 48c66b 51406->51412 51419 48c721 51406->51419 51409 446a2c 18 API calls 51407->51409 51410 48c5f7 51408->51410 51411 48c62e 51409->51411 51493 446cac 51410->51493 51413 446a2c 18 API calls 51411->51413 51415 446a2c 18 API calls 51412->51415 51416 48c63f 51413->51416 51417 48c698 51415->51417 51422 446cac 5 API calls 51416->51422 51418 446a2c 18 API calls 51417->51418 51420 48c6af 51418->51420 51419->51324 51502 4469d0 18 API calls 51419->51502 51499 407d44 7 API calls 51420->51499 51422->51324 51423 48c73a 51424 42e670 5 API calls 51423->51424 51425 48c742 51424->51425 51503 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51425->51503 51428 48c6d1 51429 446a2c 18 API calls 51428->51429 51430 48c6e5 51429->51430 51500 408470 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51430->51500 51432 48c6f0 51501 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51432->51501 51434 48c6fc 51436 446a34 51435->51436 51504 435aac 51436->51504 51438 446a53 51439 42c528 7 API calls 51438->51439 51439->51374 51441 45132c 2 API calls 51440->51441 51443 4518a1 51441->51443 51442 4518a5 51442->51390 51443->51442 51444 4518c9 MoveFileA GetLastError 51443->51444 51445 451368 Wow64RevertWow64FsRedirection 51444->51445 51446 4518ef 51445->51446 51446->51390 51447->51324 51448->51324 51449->51271 51450->51324 51451->51277 51452->51324 51453->51280 51454->51324 51456 403738 51455->51456 51457 40721a SetCurrentDirectoryA 51456->51457 51457->51290 51458->51324 51459->51324 51460->51304 51461->51324 51462->51315 51463->51324 51465 42c678 IsDBCSLeadByte 51464->51465 51466 42c790 51465->51466 51467 403778 4 API calls 51466->51467 51468 42c7a1 51467->51468 51469 446d80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51468->51469 51469->51324 51470->51324 51471->51334 51472->51324 51473->51324 51474->51324 51475->51360 51476->51324 51477->51368 51478->51324 51479->51324 51480->51324 51481->51385 51482->51389 51484 45132c 2 API calls 51483->51484 51485 45138e 51484->51485 51486 451392 51485->51486 51487 4513b0 CreateDirectoryA GetLastError 51485->51487 51486->51396 51488 451368 Wow64RevertWow64FsRedirection 51487->51488 51489 4513d6 51488->51489 51489->51396 51490->51324 51491->51402 51492->51324 51494 446cb4 51493->51494 51527 435e14 VariantClear 51494->51527 51496 446cd7 51497 446cee 51496->51497 51528 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51496->51528 51497->51324 51499->51428 51500->51432 51501->51434 51502->51423 51503->51324 51505 435ab8 51504->51505 51506 435ada 51504->51506 51505->51506 51524 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51505->51524 51507 435b5d 51506->51507 51509 435b21 51506->51509 51510 435b51 51506->51510 51511 435b45 51506->51511 51512 435b39 51506->51512 51513 435b2d 51506->51513 51526 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51507->51526 51517 403510 4 API calls 51509->51517 51525 4040e8 18 API calls 51510->51525 51515 403494 4 API calls 51511->51515 51512->51438 51518 403510 4 API calls 51513->51518 51519 435b4e 51515->51519 51521 435b2a 51517->51521 51523 435b36 51518->51523 51519->51438 51520 435b5a 51520->51438 51521->51438 51522 435b6e 51522->51438 51523->51438 51524->51506 51525->51520 51526->51522 51527->51496 51528->51497 51529 40cd94 51532 406e78 WriteFile 51529->51532 51533 406e95 51532->51533 56156 4165b4 56157 4165c1 56156->56157 56158 41661b 56156->56158 56163 4164c0 CreateWindowExA 56157->56163 56159 4165c8 SetPropA SetPropA 56159->56158 56160 4165fb 56159->56160 56161 41660e SetWindowPos 56160->56161 56161->56158 56163->56159 51534 422254 51535 422263 51534->51535 51540 4211e4 51535->51540 51538 422283 51541 421253 51540->51541 51543 4211f3 51540->51543 51546 421264 51541->51546 51565 412440 GetMenuItemCount GetMenuStringA GetMenuState 51541->51565 51543->51541 51564 408c94 19 API calls 51543->51564 51544 42132a 51551 42133e SetMenu 51544->51551 51561 421303 51544->51561 51545 421292 51550 421305 51545->51550 51555 4212ad 51545->51555 51546->51544 51546->51545 51547 421356 51568 42112c 10 API calls 51547->51568 51553 421319 51550->51553 51550->51561 51551->51561 51552 42135d 51552->51538 51563 422158 10 API calls 51552->51563 51556 421322 SetMenu 51553->51556 51557 4212d0 GetMenu 51555->51557 51555->51561 51556->51561 51558 4212f3 51557->51558 51559 4212da 51557->51559 51566 412440 GetMenuItemCount GetMenuStringA GetMenuState 51558->51566 51562 4212ed SetMenu 51559->51562 51561->51547 51567 421d9c 11 API calls 51561->51567 51562->51558 51563->51538 51564->51543 51565->51546 51566->51561 51567->51547 51568->51552 56164 42eef4 56165 42ef03 NtdllDefWindowProc_A 56164->56165 56166 42eeff 56164->56166 56165->56166 51569 435314 51570 435329 51569->51570 51574 435343 51570->51574 51575 434cfc 51570->51575 51581 434d46 51575->51581 51585 434d2c 51575->51585 51576 403400 4 API calls 51577 43514b 51576->51577 51577->51574 51588 43515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51577->51588 51578 4467d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51578->51585 51579 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51579->51585 51580 402648 4 API calls 51580->51585 51581->51576 51582 4316d4 4 API calls 51582->51585 51584 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51584->51585 51585->51578 51585->51579 51585->51580 51585->51581 51585->51582 51585->51584 51586 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51585->51586 51589 433de4 51585->51589 51601 4345a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51585->51601 51586->51585 51588->51574 51590 433ea1 51589->51590 51591 433e11 51589->51591 51620 433d44 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51590->51620 51592 403494 4 API calls 51591->51592 51594 433e1f 51592->51594 51595 403778 4 API calls 51594->51595 51599 433e40 51595->51599 51596 403400 4 API calls 51597 433ef1 51596->51597 51597->51585 51598 433e93 51598->51596 51599->51598 51602 48f0cc 51599->51602 51601->51585 51603 48f19c 51602->51603 51604 48f104 51602->51604 51621 448364 51603->51621 51605 403494 4 API calls 51604->51605 51610 48f10f 51605->51610 51607 48f11f 51608 403400 4 API calls 51607->51608 51609 48f1c0 51608->51609 51611 403400 4 API calls 51609->51611 51610->51607 51612 4037b8 4 API calls 51610->51612 51613 48f1c8 51611->51613 51614 48f138 51612->51614 51613->51599 51614->51607 51615 4037b8 4 API calls 51614->51615 51616 48f15b 51615->51616 51617 403778 4 API calls 51616->51617 51618 48f18c 51617->51618 51619 403634 4 API calls 51618->51619 51619->51603 51620->51598 51622 448389 51621->51622 51632 4483cc 51621->51632 51623 403494 4 API calls 51622->51623 51624 448394 51623->51624 51629 4037b8 4 API calls 51624->51629 51625 4483e0 51627 403400 4 API calls 51625->51627 51628 448413 51627->51628 51628->51607 51630 4483b0 51629->51630 51631 4037b8 4 API calls 51630->51631 51631->51632 51632->51625 51633 447f60 51632->51633 51634 403494 4 API calls 51633->51634 51635 447f96 51634->51635 51636 4037b8 4 API calls 51635->51636 51637 447fa8 51636->51637 51638 403778 4 API calls 51637->51638 51639 447fc9 51638->51639 51640 4037b8 4 API calls 51639->51640 51641 447fe1 51640->51641 51642 403778 4 API calls 51641->51642 51643 44800c 51642->51643 51644 4037b8 4 API calls 51643->51644 51655 448024 51644->51655 51645 44805c 51647 403420 4 API calls 51645->51647 51646 4480f7 51650 4480ff GetProcAddress 51646->51650 51651 44813c 51647->51651 51648 44807f LoadLibraryExA 51648->51655 51649 448091 LoadLibraryA 51649->51655 51652 448112 51650->51652 51651->51625 51652->51645 51653 403b80 4 API calls 51653->51655 51654 403450 4 API calls 51654->51655 51655->51645 51655->51646 51655->51648 51655->51649 51655->51653 51655->51654 51657 43d4bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51655->51657 51657->51655 51658 44815c 51659 448191 51658->51659 51660 44818a 51658->51660 51661 4481a5 51659->51661 51662 447f60 7 API calls 51659->51662 51664 403400 4 API calls 51660->51664 51661->51660 51663 403494 4 API calls 51661->51663 51662->51661 51665 4481be 51663->51665 51666 44833b 51664->51666 51667 4037b8 4 API calls 51665->51667 51668 4481da 51667->51668 51669 4037b8 4 API calls 51668->51669 51670 4481f6 51669->51670 51670->51660 51671 44820a 51670->51671 51672 4037b8 4 API calls 51671->51672 51673 448224 51672->51673 51674 431604 4 API calls 51673->51674 51675 448246 51674->51675 51676 4316d4 4 API calls 51675->51676 51683 448266 51675->51683 51676->51675 51677 4482bc 51690 441d68 51677->51690 51680 4482a4 51680->51677 51702 443004 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51680->51702 51682 4482f0 GetLastError 51703 447ef4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51682->51703 51683->51680 51701 443004 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51683->51701 51685 4482ff 51704 443044 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51685->51704 51687 448314 51705 443054 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51687->51705 51689 44831c 51691 442d46 51690->51691 51692 441da1 51690->51692 51694 403400 4 API calls 51691->51694 51693 403400 4 API calls 51692->51693 51695 441da9 51693->51695 51696 442d5b 51694->51696 51697 431604 4 API calls 51695->51697 51696->51682 51699 441db5 51697->51699 51698 442d36 51698->51682 51699->51698 51706 441440 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51699->51706 51701->51683 51702->51677 51703->51685 51704->51687 51705->51689 51706->51699 51707 44aedc 51708 44aeea 51707->51708 51710 44af09 51707->51710 51708->51710 51711 44adc0 51708->51711 51712 44adf3 51711->51712 51722 414a58 51712->51722 51714 44ae06 51715 40357c 4 API calls 51714->51715 51716 44ae33 73E9A570 51714->51716 51715->51716 51726 41a158 51716->51726 51719 44ae64 51734 44aaf4 51719->51734 51721 44ae78 73E9A480 51721->51710 51723 414a66 51722->51723 51724 4034e0 4 API calls 51723->51724 51725 414a73 51724->51725 51725->51714 51727 41a183 51726->51727 51728 41a21f 51726->51728 51731 403520 4 API calls 51727->51731 51729 403400 4 API calls 51728->51729 51730 41a237 SelectObject 51729->51730 51730->51719 51732 41a1db 51731->51732 51733 41a213 CreateFontIndirectA 51732->51733 51733->51728 51735 44ab0b 51734->51735 51736 44ab9e 51735->51736 51737 44ab87 51735->51737 51738 44ab1e 51735->51738 51736->51721 51739 44ab97 DrawTextA 51737->51739 51738->51736 51740 402648 4 API calls 51738->51740 51739->51736 51741 44ab2f 51740->51741 51742 44ab4d MultiByteToWideChar DrawTextW 51741->51742 51743 402660 4 API calls 51742->51743 51744 44ab7f 51743->51744 51744->51721 51745 4931d0 51801 403344 51745->51801 51747 4931de 51804 4056a0 51747->51804 51749 4931e3 51807 4098b4 51749->51807 51753 4931ed 51817 4108c4 51753->51817 51755 4931f2 51821 412898 51755->51821 51757 4931fc 51826 418fb0 GetVersion 51757->51826 52068 4032fc 51801->52068 51803 403349 GetModuleHandleA GetCommandLineA 51803->51747 51806 4056db 51804->51806 52069 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51804->52069 51806->51749 52070 408f8c 51807->52070 51816 409ae8 6F9E1CD0 51816->51753 51818 4108ce 51817->51818 51819 41090d GetCurrentThreadId 51818->51819 51820 410928 51819->51820 51820->51755 52161 40ae6c 51821->52161 51825 4128c4 51825->51757 52173 41dd94 8 API calls 51826->52173 51828 418fc9 52175 418ea8 GetCurrentProcessId 51828->52175 52068->51803 52069->51806 52142 408c24 52070->52142 52073 408544 GetSystemDefaultLCID 52077 40857a 52073->52077 52074 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52074->52077 52075 406d54 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 52075->52077 52076 4084d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 52076->52077 52077->52074 52077->52075 52077->52076 52080 4085dc 52077->52080 52078 406d54 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 52078->52080 52079 4084d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 52079->52080 52080->52078 52080->52079 52081 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52080->52081 52082 40865f 52080->52082 52081->52080 52083 403420 4 API calls 52082->52083 52084 408679 52083->52084 52085 408688 GetSystemDefaultLCID 52084->52085 52153 4084d0 GetLocaleInfoA 52085->52153 52088 403450 4 API calls 52089 4086c8 52088->52089 52090 4084d0 5 API calls 52089->52090 52091 4086dd 52090->52091 52092 4084d0 5 API calls 52091->52092 52093 408701 52092->52093 52159 40851c GetLocaleInfoA 52093->52159 52096 40851c GetLocaleInfoA 52097 408731 52096->52097 52098 4084d0 5 API calls 52097->52098 52099 40874b 52098->52099 52100 40851c GetLocaleInfoA 52099->52100 52101 408768 52100->52101 52102 4084d0 5 API calls 52101->52102 52103 408782 52102->52103 52104 403450 4 API calls 52103->52104 52105 40878f 52104->52105 52106 4084d0 5 API calls 52105->52106 52107 4087a4 52106->52107 52108 403450 4 API calls 52107->52108 52109 4087b1 52108->52109 52110 40851c GetLocaleInfoA 52109->52110 52111 4087bf 52110->52111 52112 4084d0 5 API calls 52111->52112 52113 4087d9 52112->52113 52114 403450 4 API calls 52113->52114 52115 4087e6 52114->52115 52116 4084d0 5 API calls 52115->52116 52117 4087fb 52116->52117 52118 403450 4 API calls 52117->52118 52119 408808 52118->52119 52120 4084d0 5 API calls 52119->52120 52121 40881d 52120->52121 52122 40883a 52121->52122 52123 40882b 52121->52123 52125 403494 4 API calls 52122->52125 52124 403494 4 API calls 52123->52124 52126 408838 52124->52126 52125->52126 52127 4084d0 5 API calls 52126->52127 52128 40885c 52127->52128 52129 408879 52128->52129 52130 40886a 52128->52130 52132 403400 4 API calls 52129->52132 52131 403494 4 API calls 52130->52131 52133 408877 52131->52133 52132->52133 52134 403634 4 API calls 52133->52134 52135 40889b 52134->52135 52136 403634 4 API calls 52135->52136 52137 4088b5 52136->52137 52138 403420 4 API calls 52137->52138 52139 4088cf 52138->52139 52140 408fd8 GetVersionExA 52139->52140 52141 408fef 52140->52141 52141->51816 52143 408c30 52142->52143 52150 406d54 LoadStringA 52143->52150 52146 403450 4 API calls 52147 408c61 52146->52147 52148 403400 4 API calls 52147->52148 52149 408c76 52148->52149 52149->52073 52151 4034e0 4 API calls 52150->52151 52152 406d81 52151->52152 52152->52146 52154 4084f7 52153->52154 52155 408509 52153->52155 52156 4034e0 4 API calls 52154->52156 52157 403494 4 API calls 52155->52157 52158 408507 52156->52158 52157->52158 52158->52088 52160 408538 52159->52160 52160->52096 52163 40ae73 52161->52163 52162 40ae92 52165 410f7c 52162->52165 52163->52162 52172 40ada4 19 API calls 52163->52172 52166 410f9e 52165->52166 52167 406d54 5 API calls 52166->52167 52168 403450 4 API calls 52166->52168 52169 410fbd 52166->52169 52167->52166 52168->52166 52170 403400 4 API calls 52169->52170 52171 410fd2 52170->52171 52171->51825 52172->52163 52174 41de0e 52173->52174 52174->51828 52191 407828 52175->52191 52178 407828 19 API calls 52179 418f09 GlobalAddAtomA 52178->52179 52192 40783b 52191->52192 52193 407520 19 API calls 52192->52193 52194 40784f GlobalAddAtomA GetCurrentThreadId 52193->52194 52194->52178 53676 40cfdc 53677 40cfe4 53676->53677 53678 40d012 53677->53678 53679 40d007 53677->53679 53685 40d00e 53677->53685 53680 40d016 53678->53680 53681 40d028 53678->53681 53690 4062a0 GlobalHandle GlobalUnWire GlobalFree 53679->53690 53691 406274 GlobalAlloc GlobalFix 53680->53691 53689 406284 GlobalHandle GlobalUnWire GlobalReAlloc GlobalFix 53681->53689 53686 40d024 53687 40d038 53686->53687 53687->53685 53688 408c24 5 API calls 53687->53688 53688->53685 53689->53687 53690->53685 53691->53686 53692 41655c 73EA5CF0
                                                                                      Strings
                                                                                      • Skipping due to "onlyifdoesntexist" flag., xrefs: 0046C8EA
                                                                                      • IF, xrefs: 0046D613
                                                                                      • Non-default bitness: 64-bit, xrefs: 0046C7CB
                                                                                      • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0046CDB2
                                                                                      • InUn, xrefs: 0046D061
                                                                                      • Non-default bitness: 32-bit, xrefs: 0046C7D7
                                                                                      • Time stamp of existing file: %s, xrefs: 0046C947
                                                                                      • Dest file exists., xrefs: 0046C8D7
                                                                                      • Same time stamp. Skipping., xrefs: 0046CC71
                                                                                      • Version of existing file: (none), xrefs: 0046CC16
                                                                                      • -- File entry --, xrefs: 0046C617
                                                                                      • Version of our file: (none), xrefs: 0046CA18
                                                                                      • Existing file is protected by Windows File Protection. Skipping., xrefs: 0046CD08
                                                                                      • Will register the file (a DLL/OCX) later., xrefs: 0046D41E
                                                                                      • Failed to strip read-only attribute., xrefs: 0046CDEF
                                                                                      • Existing file's MD5 sum matches our file. Skipping., xrefs: 0046CBD1
                                                                                      • Existing file's MD5 sum is different from our file. Proceeding., xrefs: 0046CBE0
                                                                                      • Time stamp of existing file: (failed to read), xrefs: 0046C953
                                                                                      • Skipping due to "onlyifdestfileexists" flag., xrefs: 0046CE16
                                                                                      • Incrementing shared file count (64-bit)., xrefs: 0046D48B
                                                                                      • Couldn't read time stamp. Skipping., xrefs: 0046CC51
                                                                                      • Installing the file., xrefs: 0046CE25
                                                                                      • Dest filename: %s, xrefs: 0046C7B0
                                                                                      • Version of our file: %u.%u.%u.%u, xrefs: 0046CA0C
                                                                                      • User opted not to overwrite the existing file. Skipping., xrefs: 0046CD69
                                                                                      • @, xrefs: 0046C6CC
                                                                                      • Existing file is a newer version. Skipping., xrefs: 0046CB1E
                                                                                      • Time stamp of our file: %s, xrefs: 0046C8B7
                                                                                      • Same version. Skipping., xrefs: 0046CC01
                                                                                      • .tmp, xrefs: 0046CED3
                                                                                      • Existing file has a later time stamp. Skipping., xrefs: 0046CCEB
                                                                                      • Will register the file (a type library) later., xrefs: 0046D412
                                                                                      • , xrefs: 0046CAEB, 0046CCBC, 0046CD3A
                                                                                      • Failed to read existing file's MD5 sum. Proceeding., xrefs: 0046CBEC
                                                                                      • Stripped read-only attribute., xrefs: 0046CDE3
                                                                                      • Dest file is protected by Windows File Protection., xrefs: 0046C809
                                                                                      • Incrementing shared file count (32-bit)., xrefs: 0046D4A4
                                                                                      • Uninstaller requires administrator: %s, xrefs: 0046D091
                                                                                      • Version of existing file: %u.%u.%u.%u, xrefs: 0046CA98
                                                                                      • Time stamp of our file: (failed to read), xrefs: 0046C8C3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's MD5 sum is different from our file. Proceeding.$Existing file's MD5 sum matches our file. Skipping.$Failed to read existing file's MD5 sum. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing the file.$IF$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                      • API String ID: 0-3571605357
                                                                                      • Opcode ID: c331ed72d788f652b5d8a0e231ec5862484b2ca6a8e1fb95928deca83195554c
                                                                                      • Instruction ID: bbba4ebc422fcc932ed0245fa1df0834f4a6a16cbc4990aadff4421ccbeeb5a2
                                                                                      • Opcode Fuzzy Hash: c331ed72d788f652b5d8a0e231ec5862484b2ca6a8e1fb95928deca83195554c
                                                                                      • Instruction Fuzzy Hash: 54928630E042889FCB11DFA5C485BEDBBB5AF05308F5440ABE844B7392D7789E45DB5A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1559 423b7c-423bb0 1560 423bb2-423bb3 1559->1560 1561 423be4-423bfb call 423ad8 1559->1561 1563 423bb5-423bd1 call 40b3ac 1560->1563 1566 423c5c-423c61 1561->1566 1567 423bfd 1561->1567 1584 423bd3-423bdb 1563->1584 1585 423be0-423be2 1563->1585 1569 423c63 1566->1569 1570 423c97-423c9c 1566->1570 1571 423c03-423c06 1567->1571 1572 423cc0-423cd0 1567->1572 1576 423f21-423f29 1569->1576 1577 423c69-423c71 1569->1577 1580 423ca2-423ca5 1570->1580 1581 42400a-424018 IsIconic 1570->1581 1578 423c35-423c38 1571->1578 1579 423c08 1571->1579 1573 423cd2-423cd7 1572->1573 1574 423cdb-423ce3 call 424104 1572->1574 1582 423ce8-423cf0 call 42414c 1573->1582 1583 423cd9-423cfc call 423af4 1573->1583 1589 4240c2-4240ca 1574->1589 1576->1589 1595 423f2f-423f3a call 418150 1576->1595 1587 423e83-423eaa SendMessageA 1577->1587 1588 423c77-423c7c 1577->1588 1596 423d19-423d20 1578->1596 1597 423c3e-423c3f 1578->1597 1591 423d66-423d76 call 423af4 1579->1591 1592 423c0e-423c11 1579->1592 1593 424046-42405b call 4247c0 1580->1593 1594 423cab-423cac 1580->1594 1581->1589 1590 42401e-424029 GetFocus 1581->1590 1582->1589 1583->1589 1604 4240e1-4240e7 1584->1604 1585->1561 1585->1563 1587->1589 1602 423c82-423c83 1588->1602 1603 423fba-423fc5 1588->1603 1589->1604 1590->1589 1611 42402f-424038 call 41ef64 1590->1611 1591->1589 1612 423c17-423c1a 1592->1612 1613 423d8e-423daa PostMessageA call 423af4 1592->1613 1593->1589 1606 423cb2-423cb5 1594->1606 1607 42405d-424064 1594->1607 1595->1589 1636 423f40-423f4f call 418150 IsWindowEnabled 1595->1636 1596->1589 1599 423d26-423d2d 1596->1599 1600 423c45-423c48 1597->1600 1601 423eaf-423eb6 1597->1601 1599->1589 1616 423d33-423d39 1599->1616 1617 423c4e-423c51 1600->1617 1618 423daf-423dcf call 423af4 1600->1618 1601->1589 1625 423ebc-423ec1 call 404e54 1601->1625 1619 423fe2-423fed 1602->1619 1620 423c89-423c8c 1602->1620 1603->1589 1622 423fcb-423fdd 1603->1622 1623 424090-424097 1606->1623 1624 423cbb 1606->1624 1633 424066-424079 call 424444 1607->1633 1634 42407b-42408e call 42449c 1607->1634 1611->1589 1668 42403e-424044 SetFocus 1611->1668 1630 423c20-423c23 1612->1630 1631 423e15-423e1c 1612->1631 1613->1589 1616->1589 1637 423c57 1617->1637 1638 423d7b-423d89 call 4240e8 1617->1638 1681 423df3-423e10 call 4239f4 PostMessageA 1618->1681 1682 423dd1-423dee call 423a84 PostMessageA 1618->1682 1619->1589 1645 423ff3-424005 1619->1645 1642 423c92 1620->1642 1643 423ec6-423ece 1620->1643 1622->1589 1640 4240aa-4240b9 1623->1640 1641 424099-4240a8 1623->1641 1644 4240bb-4240bc call 423af4 1624->1644 1625->1589 1651 423c29-423c2a 1630->1651 1652 423d3e-423d4c IsIconic 1630->1652 1653 423e1e-423e31 call 423a84 1631->1653 1654 423e4f-423e60 call 423af4 1631->1654 1633->1589 1634->1589 1636->1589 1686 423f55-423f64 call 418150 IsWindowVisible 1636->1686 1637->1644 1638->1589 1640->1589 1641->1589 1642->1644 1643->1589 1666 423ed4-423edb 1643->1666 1677 4240c1 1644->1677 1645->1589 1669 423c30 1651->1669 1670 423d01-423d09 1651->1670 1659 423d5a-423d61 call 423af4 1652->1659 1660 423d4e-423d55 call 423b30 1652->1660 1684 423e43-423e4a call 423af4 1653->1684 1685 423e33-423e3d call 41eec8 1653->1685 1689 423e62-423e68 call 41ee14 1654->1689 1690 423e76-423e7e call 4239f4 1654->1690 1659->1589 1660->1589 1666->1589 1680 423ee1-423ef0 call 418150 IsWindowEnabled 1666->1680 1668->1589 1669->1644 1670->1589 1683 423d0f-423d14 call 422bbc 1670->1683 1677->1589 1680->1589 1709 423ef6-423f0c call 412280 1680->1709 1681->1589 1682->1589 1683->1589 1684->1589 1685->1684 1686->1589 1710 423f6a-423fb5 GetFocus call 418150 SetFocus call 4151b0 SetFocus 1686->1710 1707 423e6d-423e70 1689->1707 1690->1589 1707->1690 1709->1589 1715 423f12-423f1c 1709->1715 1710->1589 1715->1589
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3f3425962c5664b7636b89eb7a729afb539010c318ec026ce06c6a7b4d19c74a
                                                                                      • Instruction ID: 08d2eb01bbb0ed60fc7aa7cee5e011afdc801c2d0a550085eeb8675b0aa62de6
                                                                                      • Opcode Fuzzy Hash: 3f3425962c5664b7636b89eb7a729afb539010c318ec026ce06c6a7b4d19c74a
                                                                                      • Instruction Fuzzy Hash: ACE19A30B00124EBC710DF69E585A5EB7B0FF48704FA441AAE645AB352CB7DEE81DB09

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1978 463b8c-463ba2 1979 463ba4-463ba7 call 402d30 1978->1979 1980 463bac-463c63 call 48ff28 call 402b30 * 6 1978->1980 1979->1980 1997 463c65-463c8c call 4145ac 1980->1997 1998 463ca0-463cb9 1980->1998 2002 463c91-463c9b call 41456c 1997->2002 2003 463c8e 1997->2003 2004 463cf6-463d04 call 490208 1998->2004 2005 463cbb-463ce2 call 41458c 1998->2005 2002->1998 2003->2002 2011 463d06-463d15 call 490078 2004->2011 2012 463d17-463d19 call 49019c 2004->2012 2013 463ce7-463cf1 call 41454c 2005->2013 2014 463ce4 2005->2014 2019 463d1e-463d71 call 48fb8c call 41a340 * 2 2011->2019 2012->2019 2013->2004 2014->2013 2026 463d82-463d97 call 450b64 call 414a88 2019->2026 2027 463d73-463d80 call 414a88 2019->2027 2033 463d9c-463da3 2026->2033 2027->2033 2034 463da5-463de6 call 41462c call 414670 call 420f08 call 420f34 call 420ad8 call 420b04 2033->2034 2035 463deb-464271 call 48ffc8 call 4902c4 call 41458c * 3 call 41462c call 41454c * 3 call 45d548 call 45d560 call 45d56c call 45d5b4 call 45d548 call 45d560 call 45d56c call 45d5b4 call 45d560 call 45d5b4 LoadBitmapA call 41d620 call 45d584 call 45d59c call 4639e8 call 46546c call 463064 call 40357c call 414a88 call 46339c call 4633a4 call 463064 call 40357c * 2 call 414a88 call 46546c call 463064 call 414a88 call 46339c call 4633a4 call 414a88 * 2 call 46546c call 414a88 * 2 call 46339c call 41456c call 46339c call 41456c call 46546c call 414a88 call 46339c call 4633a4 call 46546c call 414a88 call 46339c call 41456c * 2 call 414a88 call 46339c call 41456c 2033->2035 2034->2035 2165 464273-4642cb call 41456c call 414a88 call 46339c call 41456c 2035->2165 2166 4642cd-4642e6 call 4149b4 * 2 2035->2166 2173 4642eb-46439c call 463064 call 46546c call 463064 call 414a88 call 4902c4 call 46339c 2165->2173 2166->2173 2192 4643d6-4645fa call 463064 call 414a88 call 4902d4 * 2 call 42e668 call 41456c call 46339c call 41456c call 414a88 call 48ffc8 call 4902c4 call 41458c call 463064 call 414a88 call 46339c call 41456c call 463064 call 46546c call 463064 call 414a88 call 46339c call 41456c call 4633a4 call 463064 call 414a88 call 46339c 2173->2192 2193 46439e-4643b9 2173->2193 2250 4645fc-464605 2192->2250 2251 46463b-4646f4 call 463064 call 46546c call 463064 call 414a88 call 4902c4 call 46339c 2192->2251 2194 4643be-4643d1 call 41456c 2193->2194 2195 4643bb 2193->2195 2194->2192 2195->2194 2250->2251 2253 464607-464636 call 4149b4 call 4633a4 2250->2253 2269 4646f6-464711 2251->2269 2270 46472e-464b4f call 463064 call 414a88 call 4902d4 * 2 call 42e668 call 41456c call 46339c call 41456c call 414a88 call 48ffc8 call 4902c4 call 41458c call 414a88 call 463064 call 46546c call 463064 call 414a88 call 46339c call 4633a4 call 42bb40 call 4902d4 call 44e2e4 call 463064 call 46546c call 463064 call 46546c call 463064 call 46546c * 2 call 414a88 call 46339c call 4633a4 call 46546c call 48fb8c call 41a340 call 463064 call 40357c call 414a88 call 46339c call 41456c call 414a88 * 2 call 4902d4 call 403494 call 40357c * 2 call 414a88 2251->2270 2253->2251 2271 464716-464729 call 41456c 2269->2271 2272 464713 2269->2272 2369 464b73-464b7a 2270->2369 2370 464b51-464b6e call 44f8f8 call 44fa54 2270->2370 2271->2270 2272->2271 2372 464b9e-464ba5 2369->2372 2373 464b7c-464b99 call 44f8f8 call 44fa54 2369->2373 2370->2369 2374 464ba7-464bc4 call 44f8f8 call 44fa54 2372->2374 2375 464bc9-464c0f call 418150 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 465560 2372->2375 2373->2372 2374->2375 2390 464c11-464c18 2375->2390 2391 464c29 2375->2391 2393 464c25-464c27 2390->2393 2394 464c1a-464c23 2390->2394 2392 464c2b-464c3a 2391->2392 2395 464c54 2392->2395 2396 464c3c-464c43 2392->2396 2393->2392 2394->2391 2394->2393 2399 464c56-464c70 2395->2399 2397 464c45-464c4e 2396->2397 2398 464c50-464c52 2396->2398 2397->2395 2397->2398 2398->2399 2400 464c76-464c7f 2399->2400 2401 464d19-464d20 2399->2401 2402 464c81-464cd8 call 47742c call 414a88 call 47742c call 414a88 call 47742c call 414a88 2400->2402 2403 464cda-464d14 call 414a88 * 3 2400->2403 2404 464d26-464d49 call 47742c call 403450 2401->2404 2405 464db4-464dc2 call 414a88 2401->2405 2402->2401 2403->2401 2424 464d5b-464d6f call 403494 2404->2424 2425 464d4b-464d59 call 403494 2404->2425 2410 464dc7-464dd0 2405->2410 2414 464dd6-464dee call 429f48 2410->2414 2415 464ee0-464f0f call 42b8dc call 44e270 2410->2415 2432 464e65-464e69 2414->2432 2433 464df0-464df4 2414->2433 2449 464f15-464f19 2415->2449 2450 464fbd-464fc1 2415->2450 2445 464d81-464db2 call 42c6e0 call 42ca9c call 403494 call 414a88 2424->2445 2446 464d71-464d7c call 403494 2424->2446 2425->2445 2438 464e6b-464e74 2432->2438 2439 464eb9-464ebd 2432->2439 2440 464df6-464e30 call 40b3ac call 47742c 2433->2440 2438->2439 2447 464e76-464e81 2438->2447 2443 464ed1-464edb call 429fcc 2439->2443 2444 464ebf-464ecf call 429fcc 2439->2444 2508 464e32-464e39 2440->2508 2509 464e5f-464e63 2440->2509 2443->2415 2444->2415 2445->2410 2446->2445 2447->2439 2457 464e83-464e87 2447->2457 2459 464f1b-464f2d call 40b3ac 2449->2459 2460 464fc3-464fca 2450->2460 2461 465040-465044 2450->2461 2465 464e89-464eac call 40b3ac call 406a2c 2457->2465 2480 464f5f-464f96 call 47742c call 44c540 2459->2480 2481 464f2f-464f5d call 47742c call 44c610 2459->2481 2460->2461 2468 464fcc-464fd3 2460->2468 2469 465046-46505d call 40b3ac 2461->2469 2470 4650ad-4650b6 2461->2470 2518 464eb3-464eb7 2465->2518 2519 464eae-464eb1 2465->2519 2468->2461 2471 464fd5-464fe0 2468->2471 2492 46505f-46509b call 40b3ac call 4661d4 * 2 call 466074 2469->2492 2493 46509d-4650ab call 4661d4 2469->2493 2478 4650d5-4650ea call 463748 call 4634c0 2470->2478 2479 4650b8-4650d0 call 40b3ac call 4661d4 2470->2479 2471->2478 2483 464fe6-464fea 2471->2483 2526 46513c-465146 call 4149b4 2478->2526 2527 4650ec-46510f call 429fb0 call 40b3ac 2478->2527 2479->2478 2528 464f9b-464f9f 2480->2528 2481->2528 2491 464fec-465002 call 40b3ac 2483->2491 2523 465004-465030 call 429fcc call 4661d4 call 466074 2491->2523 2524 465035-465039 2491->2524 2492->2478 2493->2478 2508->2509 2510 464e3b-464e4d call 406a2c 2508->2510 2509->2432 2509->2440 2510->2509 2537 464e4f-464e59 2510->2537 2518->2439 2518->2465 2519->2439 2523->2478 2524->2491 2536 46503b 2524->2536 2538 46514b-46516a call 4149b4 2526->2538 2556 465111-465118 2527->2556 2557 46511a-465129 call 4149b4 2527->2557 2534 464fa1-464fa8 2528->2534 2535 464faa-464fac 2528->2535 2534->2535 2542 464fb3-464fb7 2534->2542 2535->2542 2536->2478 2537->2509 2543 464e5b 2537->2543 2552 465194-4651b7 call 47742c call 403450 2538->2552 2553 46516c-46518f call 429fb0 call 466334 2538->2553 2542->2450 2542->2459 2543->2509 2571 4651d4-4651dd 2552->2571 2572 4651b9-4651c2 2552->2572 2553->2552 2556->2557 2561 46512b-46513a call 4149b4 2556->2561 2557->2538 2561->2538 2574 4651f3-465203 call 403494 2571->2574 2575 4651df-4651f1 call 403684 2571->2575 2572->2571 2573 4651c4-4651d2 call 403494 2572->2573 2582 465215-46522c call 414a88 2573->2582 2574->2582 2575->2574 2583 465205-465210 call 403494 2575->2583 2587 465262-46526c call 4149b4 2582->2587 2588 46522e-465235 2582->2588 2583->2582 2594 465271-465296 call 403400 * 3 2587->2594 2589 465237-465240 2588->2589 2590 465242-46524c call 42b054 2588->2590 2589->2590 2592 465251-465260 call 4149b4 2589->2592 2590->2592 2592->2594
                                                                                      APIs
                                                                                        • Part of subcall function 00490078: GetWindowRect.USER32(00000000), ref: 0049008E
                                                                                      • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00463F5B
                                                                                        • Part of subcall function 0041D620: GetObjectA.GDI32(?,00000018,00463F75), ref: 0041D64B
                                                                                        • Part of subcall function 004639E8: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00463A85
                                                                                        • Part of subcall function 004639E8: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463AAB
                                                                                        • Part of subcall function 004639E8: SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00463B07
                                                                                        • Part of subcall function 004639E8: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463B2D
                                                                                        • Part of subcall function 004633A4: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00464010,00000000,00000000,00000000,0000000C,00000000), ref: 004633BC
                                                                                        • Part of subcall function 004902D4: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 004902DE
                                                                                        • Part of subcall function 0048FFC8: 73E9A570.USER32(00000000,?,?,?), ref: 0048FFEA
                                                                                        • Part of subcall function 0048FFC8: SelectObject.GDI32(?,00000000), ref: 00490010
                                                                                        • Part of subcall function 0048FFC8: 73E9A480.USER32(00000000,?,0049006E,00490067,?,00000000,?,?,?), ref: 00490061
                                                                                        • Part of subcall function 004902C4: MulDiv.KERNEL32(0000004B,?,00000006), ref: 004902CE
                                                                                      • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,0212ECFC,021307DC,?,?,0213080C,?,?,0213085C,?), ref: 00464BD3
                                                                                      • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00464BE4
                                                                                      • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00464BFC
                                                                                        • Part of subcall function 00429FCC: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 00429FE2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$AppendExtractFileIconInfoObject$A480A570BitmapCallbackDispatcherLoadMessageRectSelectSendSystemUserWindow
                                                                                      • String ID: $(Default)$STOPIMAGE
                                                                                      • API String ID: 1965080796-770201673
                                                                                      • Opcode ID: 80f7aee92de1e31dca4f16c75dc9a4f5f3520f9015eb7726ec2554a956d9f7b2
                                                                                      • Instruction ID: 9b804f360638e7ec9479bb78d72ee5234d78dd0d5496d892e29c920f99ca9afd
                                                                                      • Opcode Fuzzy Hash: 80f7aee92de1e31dca4f16c75dc9a4f5f3520f9015eb7726ec2554a956d9f7b2
                                                                                      • Instruction Fuzzy Hash: 7DF2C6386105218FCB00EF69D8D9F9973F5BF89304F1541B6E9049B36ADB78AC46CB4A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2692 47a964-47a9d0 call 403634 call 403738 FindFirstFileA 2697 47a9d2-47a9da 2692->2697 2698 47aa1f-47aa23 2692->2698 2699 47aa02-47aa14 FindNextFileA 2697->2699 2700 47a9dc-47a9e0 2697->2700 2701 47ab3a-47ab5f call 403420 call 403400 2698->2701 2702 47aa29-47aa72 call 403494 call 40357c * 2 call 403738 FindFirstFileA 2698->2702 2699->2697 2706 47aa16-47aa1a FindClose 2699->2706 2703 47a9e6-47a9fd call 4305a0 2700->2703 2704 47a9e2-47a9e4 2700->2704 2702->2701 2719 47aa78-47aa83 2702->2719 2703->2699 2704->2699 2704->2703 2706->2698 2720 47aa86-47aa93 call 478660 2719->2720 2723 47aa95-47aaff call 403494 call 40355c call 40357c * 2 call 47a964 call 4305a0 2720->2723 2724 47ab04-47ab16 FindNextFileA 2720->2724 2723->2724 2724->2720 2725 47ab1c-47ab32 FindClose 2724->2725
                                                                                      APIs
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,?,00000000,?,00000000,13I,?,00000000,00000000,?,?,0047BCC8,?,?,00000000), ref: 0047A9C4
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,?,?,00000000,?,00000000,13I,?,00000000,00000000,?,?,0047BCC8,?), ref: 0047AA0D
                                                                                      • FindClose.KERNEL32(000000FF,000000FF,?,00000000,?,?,00000000,?,00000000,13I,?,00000000,00000000,?,?,0047BCC8), ref: 0047AA1A
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,13I,?,00000000,00000000,?,?,0047BCC8,?), ref: 0047AA66
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,0047AB33,?,00000000,?,00000000,?,?,00000000,?,00000000,13I,?,00000000), ref: 0047AB0F
                                                                                      • FindClose.KERNEL32(000000FF,0047AB3A,0047AB33,?,00000000,?,00000000,?,?,00000000,?,00000000,13I,?,00000000,00000000), ref: 0047AB2D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$File$CloseFirstNext
                                                                                      • String ID: 13I
                                                                                      • API String ID: 3541575487-562285233
                                                                                      • Opcode ID: 14a22c9b19f9f593fc8f290ef9588bdea0a1845b81f46d5d148d05f04d7c5859
                                                                                      • Instruction ID: 4e67e333ed9d0cc1fab42887fed5e7c2c21fb1f12194a2671a08295e0f582913
                                                                                      • Opcode Fuzzy Hash: 14a22c9b19f9f593fc8f290ef9588bdea0a1845b81f46d5d148d05f04d7c5859
                                                                                      • Instruction Fuzzy Hash: C7517E71900648AFCB11EFA6CC45ADEB7BCEB88315F1084BAA508E7341D6389F95CF19
                                                                                      APIs
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,00470DEE,?,?,00000001,00497154), ref: 00470CDD
                                                                                      • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00470DEE,?,?,00000001,00497154), ref: 00470DBA
                                                                                      • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00470DEE,?,?,00000001,00497154), ref: 00470DC8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$File$CloseFirstNext
                                                                                      • String ID: unins$unins???.*
                                                                                      • API String ID: 3541575487-1009660736
                                                                                      • Opcode ID: b8508960964e18f228b5b6a455ee562c9244d5bac447fc9a6e43c63091bc2de7
                                                                                      • Instruction ID: efef7a00cc11a416bc55dd6669f4c7d8ef89bbc17b889cc882c0d169e59b9d03
                                                                                      • Opcode Fuzzy Hash: b8508960964e18f228b5b6a455ee562c9244d5bac447fc9a6e43c63091bc2de7
                                                                                      • Instruction Fuzzy Hash: A63113756012489FCB50EB65C981BDE77B9AF44304F5084B6A448AB3A2D738AF818B58
                                                                                      APIs
                                                                                      • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,0044813D), ref: 00448080
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00448101
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressLibraryLoadProc
                                                                                      • String ID:
                                                                                      • API String ID: 2574300362-0
                                                                                      • Opcode ID: d9787b66ae215e656ee415771d480fc3d32ddb8ef1add214a3308f413d75a1a6
                                                                                      • Instruction ID: 5c6eebc632780948e30306f747c70913dfebb380d33768fd88d962b889412947
                                                                                      • Opcode Fuzzy Hash: d9787b66ae215e656ee415771d480fc3d32ddb8ef1add214a3308f413d75a1a6
                                                                                      • Instruction Fuzzy Hash: CD515170A00105AFDB00EFA5C481AAFB7F9EB54315F10817FE814BB392DB389E458B99
                                                                                      APIs
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,004516CB,?,?,-00000001,00000000), ref: 004516A5
                                                                                      • GetLastError.KERNEL32(00000000,?,00000000,004516CB,?,?,-00000001,00000000), ref: 004516AD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileFindFirstLast
                                                                                      • String ID:
                                                                                      • API String ID: 873889042-0
                                                                                      • Opcode ID: 2ccb38690e6aaf115f3138c94c71e4fbb344a9e4605e64161c765321e8b078e6
                                                                                      • Instruction ID: 1035efb27f9b4b466a521b4d59d966f000d53702a43f221aaee312fb08fd4d5a
                                                                                      • Opcode Fuzzy Hash: 2ccb38690e6aaf115f3138c94c71e4fbb344a9e4605e64161c765321e8b078e6
                                                                                      • Instruction Fuzzy Hash: 9EF04931A00304BB8B10EB769C5159EB7ECDB4532571046BBFC14D32A2DA784D048458
                                                                                      APIs
                                                                                      • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale
                                                                                      • String ID:
                                                                                      • API String ID: 2299586839-0
                                                                                      • Opcode ID: db4c94cdf382ee3399fd393310c0d3b07f3e4771964ce669c16d021a31866df8
                                                                                      • Instruction ID: 1ce02aaae6ec4ade8b295bae84213e8e13784b7c216e354617812bc232f4da8b
                                                                                      • Opcode Fuzzy Hash: db4c94cdf382ee3399fd393310c0d3b07f3e4771964ce669c16d021a31866df8
                                                                                      • Instruction Fuzzy Hash: 59E0D87170021467D711E95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE4046ED
                                                                                      APIs
                                                                                      • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004240C1,?,00000000,004240CC), ref: 00423B1E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: NtdllProc_Window
                                                                                      • String ID:
                                                                                      • API String ID: 4255912815-0
                                                                                      • Opcode ID: f78a68ed826797f4bf69a42243cc74bd686c7ff48922d06499da9bfac42a5011
                                                                                      • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                                                      • Opcode Fuzzy Hash: f78a68ed826797f4bf69a42243cc74bd686c7ff48922d06499da9bfac42a5011
                                                                                      • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: NameUser
                                                                                      • String ID:
                                                                                      • API String ID: 2645101109-0
                                                                                      • Opcode ID: e5c4147ce8d30c90c427c53b97d0de2aa7d796d22412cffb07543fa3924af9c1
                                                                                      • Instruction ID: 1680b636b72d7d7da35d26ad3489112d7b5719c0f4c6eb10b1da13dd6a5c5f2b
                                                                                      • Opcode Fuzzy Hash: e5c4147ce8d30c90c427c53b97d0de2aa7d796d22412cffb07543fa3924af9c1
                                                                                      • Instruction Fuzzy Hash: CAD0C2B260420053C300AEA9AC82697769C8B84316F10483F7C85CA3C3E67CDB4C569A
                                                                                      APIs
                                                                                      • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042EF10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: NtdllProc_Window
                                                                                      • String ID:
                                                                                      • API String ID: 4255912815-0
                                                                                      • Opcode ID: 526567439b164cf8a1cedbeebbc24c6bfdc41ebf56c0565ee429dfc079ee367e
                                                                                      • Instruction ID: 914d3360e1f6a3e7d3a1e305f80b88d129d6a01b97e8a9d2bd08e0dbdb8f1123
                                                                                      • Opcode Fuzzy Hash: 526567439b164cf8a1cedbeebbc24c6bfdc41ebf56c0565ee429dfc079ee367e
                                                                                      • Instruction Fuzzy Hash: 16D0A77120010C7FCB00DE99D940C6F33AC9B88700BA0C805F508C7205C734EC1087B4

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 409 46af80-46afb0 410 46afb2-46afb9 409->410 411 46afbb 409->411 412 46afc2-46affa call 403634 call 403738 call 42dcf8 410->412 411->412 419 46b015-46b03e call 403738 call 42dc1c 412->419 420 46affc-46b010 call 403738 call 42dcf8 412->420 428 46b040-46b049 call 46ac50 419->428 429 46b04e-46b077 call 46ad6c 419->429 420->419 428->429 433 46b089-46b08c call 403400 429->433 434 46b079-46b087 call 403494 429->434 437 46b091-46b0dc call 46ad6c call 42c36c call 46adb4 call 46ad6c 433->437 434->437 447 46b0f2-46b113 call 453f88 call 46ad6c 437->447 448 46b0de-46b0f1 call 46addc 437->448 455 46b115-46b168 call 46ad6c call 474c04 call 46ad6c call 474c04 call 46ad6c 447->455 456 46b169-46b170 447->456 448->447 455->456 458 46b172-46b1af call 474c04 call 46ad6c call 474c04 call 46ad6c 456->458 459 46b1b0-46b1b7 456->459 458->459 462 46b1f8-46b1fc 459->462 463 46b1b9-46b1f7 call 46ad6c * 3 459->463 465 46b1fe-46b209 call 47742c 462->465 466 46b20b-46b214 call 403494 462->466 463->462 476 46b219-46b3e6 call 403778 call 46ad6c call 47742c call 46adb4 call 403494 call 40357c * 2 call 46ad6c call 403494 call 40357c * 2 call 46ad6c call 47742c call 46adb4 call 47742c call 46adb4 call 47742c call 46adb4 call 47742c call 46adb4 call 47742c call 46adb4 call 47742c call 46adb4 call 47742c call 46adb4 call 47742c call 46adb4 call 47742c call 46adb4 call 47742c 465->476 466->476 553 46b3fc-46b40a call 46addc 476->553 554 46b3e8-46b3fa call 46ad6c 476->554 558 46b40f 553->558 559 46b410-46b438 call 46addc call 46ae10 call 46ad6c 554->559 558->559 565 46b43d-46b459 call 47742c call 46ae74 559->565 570 46b47f-46b486 565->570 571 46b45b-46b47e call 46addc * 2 565->571 573 46b4e0-46b4f6 RegCloseKey 570->573 574 46b488-46b4be call 48f434 570->574 571->570 574->573
                                                                                      APIs
                                                                                        • Part of subcall function 0046AD6C: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,?,00497154,?,0046B06F,?,00000000,0046B4F7,?,_is1), ref: 0046AD8F
                                                                                      • RegCloseKey.ADVAPI32(?,0046B4FE,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046B549,?,?,00000001,00497154), ref: 0046B4F1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseValue
                                                                                      • String ID: " /SILENT$5.3.5 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                      • API String ID: 3132538880-4162757603
                                                                                      • Opcode ID: 74ada5f7f4b3b84f6d30dbb7f605c502c19f4e02ec6191c5605d87bebef11242
                                                                                      • Instruction ID: 6b8bd6052d7011f0313b6456d796e8b41d00091cb6ba677f30044cb60bcfab9c
                                                                                      • Opcode Fuzzy Hash: 74ada5f7f4b3b84f6d30dbb7f605c502c19f4e02ec6191c5605d87bebef11242
                                                                                      • Instruction Fuzzy Hash: DBF14374A001099BCB14EB55D8819AEB7B9EB44304F60C07BEC11AB7A5EB7CBD41CB5E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 972 48cea0-48ced4 call 403684 975 48ceea-48cef7 call 403684 972->975 976 48ced6-48cee5 call 4469d0 Sleep 972->976 982 48cef9-48cf1c call 446a2c call 403738 FindWindowA call 446cac 975->982 983 48cf26-48cf33 call 403684 975->983 981 48d37a-48d394 call 403420 976->981 1001 48cf21 982->1001 991 48cf62-48cf6f call 403684 983->991 992 48cf35-48cf5d call 446a2c call 403738 FindWindowA call 446cac 983->992 999 48cfb8-48cfc5 call 403684 991->999 1000 48cf71-48cfb3 call 4469d0 * 4 SendMessageA call 446cac 991->1000 992->981 1009 48d014-48d021 call 403684 999->1009 1010 48cfc7-48d00f call 4469d0 * 4 PostMessageA call 446b04 999->1010 1000->981 1001->981 1021 48d070-48d07d call 403684 1009->1021 1022 48d023-48d06b call 4469d0 * 4 SendNotifyMessageA call 446b04 1009->1022 1010->981 1034 48d0aa-48d0b7 call 403684 1021->1034 1035 48d07f-48d0a5 call 446a2c call 403738 RegisterClipboardFormatA call 446cac 1021->1035 1022->981 1047 48d0f8-48d105 call 403684 1034->1047 1048 48d0b9-48d0f3 call 4469d0 * 3 SendMessageA call 446cac 1034->1048 1035->981 1060 48d14c-48d159 call 403684 1047->1060 1061 48d107-48d147 call 4469d0 * 3 PostMessageA call 446b04 1047->1061 1048->981 1073 48d15b-48d19b call 4469d0 * 3 SendNotifyMessageA call 446b04 1060->1073 1074 48d1a0-48d1ad call 403684 1060->1074 1061->981 1073->981 1085 48d1af-48d1cd call 446a2c call 42e1f0 1074->1085 1086 48d202-48d20f call 403684 1074->1086 1103 48d1df-48d1ed GetLastError call 446cac 1085->1103 1104 48d1cf-48d1dd call 446cac 1085->1104 1096 48d289-48d296 call 403684 1086->1096 1097 48d211-48d23d call 446a2c call 403738 call 4469d0 GetProcAddress 1086->1097 1109 48d298-48d2b9 call 4469d0 FreeLibrary call 446b04 1096->1109 1110 48d2be-48d2cb call 403684 1096->1110 1128 48d279-48d284 call 446b04 1097->1128 1129 48d23f-48d274 call 4469d0 * 2 call 446cac call 446b04 1097->1129 1115 48d1f2-48d1fd call 446cac 1103->1115 1104->1115 1109->981 1125 48d2cd-48d2eb call 446a2c call 403738 CreateMutexA 1110->1125 1126 48d2f0-48d2fd call 403684 1110->1126 1115->981 1125->981 1136 48d2ff-48d331 call 487218 call 403574 call 403738 OemToCharBuffA call 487230 1126->1136 1137 48d333-48d340 call 403684 1126->1137 1128->981 1129->981 1136->981 1149 48d342-48d374 call 487218 call 403574 call 403738 CharToOemBuffA call 487230 1137->1149 1150 48d376 1137->1150 1149->981 1150->981
                                                                                      APIs
                                                                                      • Sleep.KERNEL32(00000000,00000000,0048D395,?,?,?,?,00000000,00000000,00000000), ref: 0048CEE0
                                                                                      • FindWindowA.USER32(00000000,00000000), ref: 0048CF11
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FindSleepWindow
                                                                                      • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                      • API String ID: 3078808852-3310373309
                                                                                      • Opcode ID: fab8a4fe477002bc53f13639ab52b518f0439af39f0fe01b7890694e2865f2f1
                                                                                      • Instruction ID: b0d844213b24b695988cfb35ecebf8c704e926cd3cc1ee44f2907765548c277e
                                                                                      • Opcode Fuzzy Hash: fab8a4fe477002bc53f13639ab52b518f0439af39f0fe01b7890694e2865f2f1
                                                                                      • Instruction Fuzzy Hash: 36C161A0B0461067D714BE3E9C4261E569A9F89704B11D93FB406EB7CACE7DDC06439E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1479 47e1e8-47e20d GetModuleHandleA GetProcAddress 1480 47e274-47e279 GetSystemInfo 1479->1480 1481 47e20f-47e225 GetNativeSystemInfo GetProcAddress 1479->1481 1482 47e27e-47e287 1480->1482 1481->1482 1483 47e227-47e232 GetCurrentProcess 1481->1483 1484 47e297-47e29e 1482->1484 1485 47e289-47e28d 1482->1485 1483->1482 1490 47e234-47e238 1483->1490 1489 47e2b9-47e2be 1484->1489 1487 47e2a0-47e2a7 1485->1487 1488 47e28f-47e293 1485->1488 1487->1489 1491 47e295-47e2b2 1488->1491 1492 47e2a9-47e2b0 1488->1492 1490->1482 1493 47e23a-47e241 call 451324 1490->1493 1491->1489 1492->1489 1493->1482 1497 47e243-47e250 GetProcAddress 1493->1497 1497->1482 1498 47e252-47e269 GetModuleHandleA GetProcAddress 1497->1498 1498->1482 1499 47e26b-47e272 1498->1499 1499->1482
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0047E1F9
                                                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0047E206
                                                                                      • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0047E214
                                                                                      • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0047E21C
                                                                                      • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0047E228
                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0047E249
                                                                                      • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 0047E25C
                                                                                      • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0047E262
                                                                                      • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0047E279
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                      • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                      • API String ID: 2230631259-2623177817
                                                                                      • Opcode ID: 4e477b3967b851c9eac5dc78f32453af4a94d1867c0ed92fe90c0839294704c9
                                                                                      • Instruction ID: 2d47f8cf15d4e27fa0f1176fe36efced94cd1240a4270aaae3bb705869ea135a
                                                                                      • Opcode Fuzzy Hash: 4e477b3967b851c9eac5dc78f32453af4a94d1867c0ed92fe90c0839294704c9
                                                                                      • Instruction Fuzzy Hash: 6E11B155104741A4DA1073B79D45FEB164C8B09718F188BFB6C8CA62D3D67CC84996BF

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1500 465560-465598 call 47742c 1503 46559e-4655ae call 47426c 1500->1503 1504 46577a-465794 call 403420 1500->1504 1509 4655b3-4655f8 call 40785c call 403738 call 42dc54 1503->1509 1515 4655fd-4655ff 1509->1515 1516 465605-46561a 1515->1516 1517 465770-465774 1515->1517 1518 46562f-465636 1516->1518 1519 46561c-46562a call 42db84 1516->1519 1517->1504 1517->1509 1521 465663-46566a 1518->1521 1522 465638-46565a call 42db84 call 42db9c 1518->1522 1519->1518 1524 4656c3-4656ca 1521->1524 1525 46566c-465691 call 42db84 * 2 1521->1525 1522->1521 1541 46565c 1522->1541 1527 465710-465717 1524->1527 1528 4656cc-4656de call 42db84 1524->1528 1544 465693-46569c call 474cf8 1525->1544 1545 4656a1-4656b3 call 42db84 1525->1545 1530 465752-465768 RegCloseKey 1527->1530 1531 465719-46574d call 42db84 * 3 1527->1531 1542 4656e0-4656e9 call 474cf8 1528->1542 1543 4656ee-465700 call 42db84 1528->1543 1531->1530 1541->1521 1542->1543 1543->1527 1553 465702-46570b call 474cf8 1543->1553 1544->1545 1545->1524 1557 4656b5-4656be call 474cf8 1545->1557 1553->1527 1557->1524
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegCloseKey.ADVAPI32(?,0046577A,?,?,00000001,00000000,00000000,00465795,?,00000000,00000000,?), ref: 00465763
                                                                                      Strings
                                                                                      • Inno Setup: Deselected Components, xrefs: 004656A4
                                                                                      • Inno Setup: User Info: Name, xrefs: 0046571F
                                                                                      • Inno Setup: No Icons, xrefs: 0046564B
                                                                                      • Inno Setup: Setup Type, xrefs: 00465672
                                                                                      • Inno Setup: User Info: Serial, xrefs: 00465745
                                                                                      • Inno Setup: User Info: Organization, xrefs: 00465732
                                                                                      • Inno Setup: App Path, xrefs: 00465622
                                                                                      • Inno Setup: Selected Components, xrefs: 00465682
                                                                                      • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 004655BF
                                                                                      • Inno Setup: Icon Group, xrefs: 0046563E
                                                                                      • Inno Setup: Selected Tasks, xrefs: 004656CF
                                                                                      • Inno Setup: Deselected Tasks, xrefs: 004656F1
                                                                                      • %s\%s_is1, xrefs: 004655DD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen
                                                                                      • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                      • API String ID: 47109696-1093091907
                                                                                      • Opcode ID: 94c9d62fb1d7e435db0e42792cab2a1aa0121b794f6c09036552146ff74fe873
                                                                                      • Instruction ID: 8cdb4376706b2a9b24b9b35df1ecfc56159c4b319484bfede528e66c14f5fdf6
                                                                                      • Opcode Fuzzy Hash: 94c9d62fb1d7e435db0e42792cab2a1aa0121b794f6c09036552146ff74fe873
                                                                                      • Instruction Fuzzy Hash: 4951B630A00B04DBCB11EB65D951BDEBBF5EF84304F5084BAE845A7391E738AE05CB59

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1718 4237e4-4237ee 1719 423917-42391b 1718->1719 1720 4237f4-423816 call 41f334 GetClassInfoA 1718->1720 1723 423847-423850 GetSystemMetrics 1720->1723 1724 423818-42382f RegisterClassA 1720->1724 1726 423852 1723->1726 1727 423855-42385f GetSystemMetrics 1723->1727 1724->1723 1725 423831-423842 call 408c24 call 40311c 1724->1725 1725->1723 1726->1727 1729 423861 1727->1729 1730 423864-4238c0 call 403738 call 406300 call 403400 call 4235bc SetWindowLongA 1727->1730 1729->1730 1741 4238c2-4238d5 call 4240e8 SendMessageA 1730->1741 1742 4238da-423908 GetSystemMenu DeleteMenu * 2 1730->1742 1741->1742 1742->1719 1744 42390a-423912 DeleteMenu 1742->1744 1744->1719
                                                                                      APIs
                                                                                        • Part of subcall function 0041F334: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED14,?,004237FF,00423B7C,0041ED14), ref: 0041F352
                                                                                      • GetClassInfoA.USER32(00400000,004235EC), ref: 0042380F
                                                                                      • RegisterClassA.USER32(00494630), ref: 00423827
                                                                                      • GetSystemMetrics.USER32(00000000), ref: 00423849
                                                                                      • GetSystemMetrics.USER32(00000001), ref: 00423858
                                                                                      • SetWindowLongA.USER32(004105C0,000000FC,004235FC), ref: 004238B4
                                                                                      • SendMessageA.USER32(004105C0,00000080,00000001,00000000), ref: 004238D5
                                                                                      • GetSystemMenu.USER32(004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C,0041ED14), ref: 004238E0
                                                                                      • DeleteMenu.USER32(00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C,0041ED14), ref: 004238EF
                                                                                      • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 004238FC
                                                                                      • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000), ref: 00423912
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                      • String ID: 5B
                                                                                      • API String ID: 183575631-3738334870
                                                                                      • Opcode ID: e5b5147e0e34996107640ab488c5a955b3283bc40e3e9afea641ea9dff5fb6f0
                                                                                      • Instruction ID: 4eea79998965153292ad411f177aff7c9d901da1d54039d3c3496ec011b6d66c
                                                                                      • Opcode Fuzzy Hash: e5b5147e0e34996107640ab488c5a955b3283bc40e3e9afea641ea9dff5fb6f0
                                                                                      • Instruction Fuzzy Hash: C53161B17402106AEB10AF65EC82F6A36989715709F11017BBA41AF2D7C67DED04876C

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1857 477ecc-477f22 call 42c36c call 4035c0 call 477b48 call 4511e0 1866 477f24-477f29 call 451f4c 1857->1866 1867 477f2e-477f3d call 4511e0 1857->1867 1866->1867 1871 477f57-477f5d 1867->1871 1872 477f3f-477f45 1867->1872 1875 477f74-477f9c call 42e1f0 * 2 1871->1875 1876 477f5f-477f65 1871->1876 1873 477f67-477f6f call 403494 1872->1873 1874 477f47-477f4d 1872->1874 1873->1875 1874->1871 1877 477f4f-477f55 1874->1877 1883 477fc3-477fdd GetProcAddress 1875->1883 1884 477f9e-477fbe call 40785c call 451f4c 1875->1884 1876->1873 1876->1875 1877->1871 1877->1873 1885 477fdf-477fe4 call 451f4c 1883->1885 1886 477fe9-478006 call 403400 * 2 1883->1886 1884->1883 1885->1886
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(6E7B0000,SHGetFolderPathA), ref: 00477FCE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$] I$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                      • API String ID: 190572456-953201679
                                                                                      • Opcode ID: 39e346f91b0b191ca7c9d4b76c1215527ff936a439ab04cc6e1b4ee361ca35d9
                                                                                      • Instruction ID: be8cea5b208f70f3497dc675e9b67cc11d28b3b7ca4846f22d5268085fe32373
                                                                                      • Opcode Fuzzy Hash: 39e346f91b0b191ca7c9d4b76c1215527ff936a439ab04cc6e1b4ee361ca35d9
                                                                                      • Instruction Fuzzy Hash: D5312530A04249DBCB00EB95D9859DEB7B4EB54308F51C87BE508E7351DB789E08CBAD

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00477D13,?,?,00000000,00496628,00000000,00000000,?,00492BF5,00000000,00492D9E,?,00000000), ref: 00477C33
                                                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,00477D13,?,?,00000000,00496628,00000000,00000000,?,00492BF5,00000000,00492D9E,?,00000000), ref: 00477C3C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                      • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup$e1I$o1I
                                                                                      • API String ID: 1375471231-477672290
                                                                                      • Opcode ID: 4c75ab1de06e94221e890cf111cb2a76886db217d149b9edc6180f5924f9a91e
                                                                                      • Instruction ID: 656792ce42a3b8ee986284f240f9f7d4df8ffa0b35947b5a09b08d7327d2a589
                                                                                      • Opcode Fuzzy Hash: 4c75ab1de06e94221e890cf111cb2a76886db217d149b9edc6180f5924f9a91e
                                                                                      • Instruction Fuzzy Hash: 89412674A042099FCB11EF95D882ADEB7B5EF48309F50857BE81477392D738AE05CB58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1947 42ef34-42ef3e 1948 42ef40-42ef43 call 402d30 1947->1948 1949 42ef48-42ef85 call 402b30 GetActiveWindow GetFocus call 41ee14 1947->1949 1948->1949 1955 42ef97-42ef9f 1949->1955 1956 42ef87-42ef91 RegisterClassA 1949->1956 1957 42f026-42f042 SetFocus call 403400 1955->1957 1958 42efa5-42efd6 CreateWindowExA 1955->1958 1956->1955 1958->1957 1959 42efd8-42f01c call 4241ec call 403738 CreateWindowExA 1958->1959 1959->1957 1966 42f01e-42f021 ShowWindow 1959->1966 1966->1957
                                                                                      APIs
                                                                                      • GetActiveWindow.USER32 ref: 0042EF63
                                                                                      • GetFocus.USER32 ref: 0042EF6B
                                                                                      • RegisterClassA.USER32(004947AC), ref: 0042EF8C
                                                                                      • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F060,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042EFCA
                                                                                      • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F010
                                                                                      • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F021
                                                                                      • SetFocus.USER32(00000000,00000000,0042F043,?,?,?,00000001,00000000,?,00456ACA,00000000,00496628), ref: 0042F028
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                      • String ID: (fI$TWindowDisabler-Window
                                                                                      • API String ID: 3167913817-2792019125
                                                                                      • Opcode ID: 8c16546f9a585749c763ac640097901552d234e7c9639c2d0d67cc4ae301c64c
                                                                                      • Instruction ID: 77e24118650528b8c543fe6d0d23e90f8f7024fb04e3d66e63b834f41b798fd0
                                                                                      • Opcode Fuzzy Hash: 8c16546f9a585749c763ac640097901552d234e7c9639c2d0d67cc4ae301c64c
                                                                                      • Instruction Fuzzy Hash: 35219571740710BAE220EF62DD02F1A76A4EB05B04FA2453BF604BB2D2D7BC6D54C6AD

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1967 451df8-451e49 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1968 451e54-451e56 1967->1968 1969 451e4b-451e52 1967->1969 1971 451e5a-451e90 call 42e1f0 call 42e670 call 403400 1968->1971 1969->1968 1970 451e58 1969->1970 1970->1971
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451E91,?,?,?,?,00000000,?,00493224), ref: 00451E18
                                                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451E1E
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451E91,?,?,?,?,00000000,?,00493224), ref: 00451E32
                                                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451E38
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                      • API String ID: 1646373207-2130885113
                                                                                      • Opcode ID: dad4633167d2715cc0ebda844063a592ad4074400e663550045590e6248a3f3e
                                                                                      • Instruction ID: bff3e1d123b44789eb661b74cfa9bb81be17ee1d1842bcd010c9e5766072ccdb
                                                                                      • Opcode Fuzzy Hash: dad4633167d2715cc0ebda844063a592ad4074400e663550045590e6248a3f3e
                                                                                      • Instruction Fuzzy Hash: E4018470200744AED701AB62AC03B6B3A98D754B5AF91447BFC04A61A3D7BC5D089E2D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2603 46e048-46e0b7 call 403634 call 451668 2608 46e220-46e227 2603->2608 2609 46e0bd-46e0c8 2603->2609 2610 46e342-46e346 2608->2610 2611 46e22d-46e274 call 403494 call 40357c * 2 call 451668 2608->2611 2612 46e0cb-46e0d3 2609->2612 2616 46e3b7-46e3e6 call 46a414 call 403420 * 2 2610->2616 2617 46e348-46e34f 2610->2617 2611->2610 2655 46e27a-46e285 2611->2655 2613 46e1ea-46e1fc FindNextFileA 2612->2613 2614 46e0d9-46e0dd 2612->2614 2613->2612 2623 46e202-46e218 FindClose 2613->2623 2618 46e0df-46e0e1 2614->2618 2619 46e0fc-46e102 call 403494 2614->2619 2617->2616 2622 46e351-46e355 2617->2622 2618->2613 2624 46e0e7-46e0fa call 40355c 2618->2624 2631 46e107-46e136 call 403634 call 47742c 2619->2631 2622->2616 2628 46e357-46e36c call 47742c 2622->2628 2624->2631 2640 46e36e-46e379 call 40357c 2628->2640 2641 46e37b-46e395 call 42c830 call 4035c0 2628->2641 2656 46e150-46e154 2631->2656 2657 46e138-46e14e call 403634 2631->2657 2653 46e39a-46e3b3 call 46b8b4 2640->2653 2641->2653 2653->2616 2661 46e288-46e295 call 478660 2655->2661 2658 46e156-46e189 call 42c830 call 42c808 call 403634 2656->2658 2659 46e18e-46e1ad call 430560 2656->2659 2657->2659 2658->2659 2672 46e1af-46e1ba 2659->2672 2673 46e1bd-46e1d9 call 46c5c4 2659->2673 2674 46e297-46e309 call 403494 call 40355c call 40357c * 2 call 46e048 2661->2674 2675 46e30c-46e31e FindNextFileA 2661->2675 2672->2673 2682 46e1de-46e1e5 call 430588 2673->2682 2674->2675 2675->2661 2677 46e324-46e33a FindClose 2675->2677 2682->2613
                                                                                      APIs
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,0046E219,?,00000000,?,00000001,00000000,0046E3E7,?,00000000,?,00000000,?,0046E5A2), ref: 0046E1F5
                                                                                      • FindClose.KERNEL32(000000FF,0046E220,0046E219,?,00000000,?,00000001,00000000,0046E3E7,?,00000000,?,00000000,?,0046E5A2,?), ref: 0046E213
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,0046E33B,?,00000000,?,00000001,00000000,0046E3E7,?,00000000,?,00000000,?,0046E5A2), ref: 0046E317
                                                                                      • FindClose.KERNEL32(000000FF,0046E342,0046E33B,?,00000000,?,00000001,00000000,0046E3E7,?,00000000,?,00000000,?,0046E5A2,?), ref: 0046E335
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$CloseFileNext
                                                                                      • String ID: IF$sF$sF
                                                                                      • API String ID: 2066263336-2713198477
                                                                                      • Opcode ID: 6a7a0da7ad197dfdba6f926028919c8a572ec1f5835758eec4f6d61e2094463d
                                                                                      • Instruction ID: 1230aeaf309185c7ec03d96dbdc6ad6414d2784c2265a1c5d62d22ef3a6f047c
                                                                                      • Opcode Fuzzy Hash: 6a7a0da7ad197dfdba6f926028919c8a572ec1f5835758eec4f6d61e2094463d
                                                                                      • Instruction Fuzzy Hash: 51B13D3490425D9FCF11DFA6C881ADEBBF9BF49304F5081AAE808A7391D7389A46CF55
                                                                                      APIs
                                                                                      • RegisterClipboardFormatA.USER32(commdlg_help), ref: 0043031C
                                                                                      • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0043032B
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00430345
                                                                                      • GlobalAddAtomA.KERNEL32(00000000), ref: 00430366
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                      • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                      • API String ID: 4130936913-2943970505
                                                                                      • Opcode ID: d957c5322606f91c3a63daffd078634db936568746c689a8806e8aa63a5fc16b
                                                                                      • Instruction ID: 0713c644b5c0c2c8d9555e19a872e1a2a1cf9f6f22ed51b2a28eccd68185566a
                                                                                      • Opcode Fuzzy Hash: d957c5322606f91c3a63daffd078634db936568746c689a8806e8aa63a5fc16b
                                                                                      • Instruction Fuzzy Hash: 9CF082704483808BD700EB75C842B197AE0EB98708F01467FB898A62E1D77A8500CB5F
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00453C20,00453C20,00000031,00453C20,00000000), ref: 00453BAC
                                                                                      • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00453C20,00453C20,00000031,00453C20), ref: 00453BB9
                                                                                        • Part of subcall function 00453970: WaitForInputIdle.USER32(00000001,00000032), ref: 0045399C
                                                                                        • Part of subcall function 00453970: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004539BE
                                                                                        • Part of subcall function 00453970: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 004539CD
                                                                                        • Part of subcall function 00453970: CloseHandle.KERNEL32(00000001,004539FA,004539F3,?,00000031,00000080,00000000,?,?,00453D4B,00000080,0000003C,00000000,00453D61), ref: 004539ED
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                      • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                      • API String ID: 854858120-615399546
                                                                                      • Opcode ID: 969602a1eac1dd91b4af2a32f62313c77e3a40ceb3341a8b7a3818eab434afd5
                                                                                      • Instruction ID: 0d4c244814a61e6a9f40f8d6579175ec88b371b5f0bc4768c512e06936e56e52
                                                                                      • Opcode Fuzzy Hash: 969602a1eac1dd91b4af2a32f62313c77e3a40ceb3341a8b7a3818eab434afd5
                                                                                      • Instruction Fuzzy Hash: 0D51767460035DABCB01EFA5C842B9EBBB9AF44346F50443BB844B7283D7789F098B58
                                                                                      APIs
                                                                                      • LoadIconA.USER32(00400000,MAINICON), ref: 0042368C
                                                                                      • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 004236B9
                                                                                      • OemToCharA.USER32(?,?), ref: 004236CC
                                                                                      • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 0042370C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Char$FileIconLoadLowerModuleName
                                                                                      • String ID: 2$MAINICON
                                                                                      • API String ID: 3935243913-3181700818
                                                                                      • Opcode ID: b8e4f3de8f6e7962c855b1bbff0a6ea575b20ad32e9f870a500b7efad52da8d9
                                                                                      • Instruction ID: d7f5d394b2ec06d520cb0a4b60bf3498b9d8aa77ab50e693133e7ce4a757069a
                                                                                      • Opcode Fuzzy Hash: b8e4f3de8f6e7962c855b1bbff0a6ea575b20ad32e9f870a500b7efad52da8d9
                                                                                      • Instruction Fuzzy Hash: DC31A2B0A042559ADF10EF29D8C57C67BE8AF14308F4441BAE844DB393D7BED988CB65
                                                                                      APIs
                                                                                      • GetCurrentProcessId.KERNEL32(00000000), ref: 00418EAD
                                                                                      • GlobalAddAtomA.KERNEL32(00000000), ref: 00418ECE
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00418EE9
                                                                                      • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F0A
                                                                                        • Part of subcall function 00423038: 73E9A570.USER32(00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 0042308E
                                                                                        • Part of subcall function 00423038: EnumFontsA.GDI32(00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 004230A1
                                                                                        • Part of subcall function 00423038: 73EA4620.GDI32(00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230A9
                                                                                        • Part of subcall function 00423038: 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230B4
                                                                                        • Part of subcall function 004235FC: LoadIconA.USER32(00400000,MAINICON), ref: 0042368C
                                                                                        • Part of subcall function 004235FC: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 004236B9
                                                                                        • Part of subcall function 004235FC: OemToCharA.USER32(?,?), ref: 004236CC
                                                                                        • Part of subcall function 004235FC: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 0042370C
                                                                                        • Part of subcall function 0041F088: GetVersion.KERNEL32(?,00418F60,00000000,?,?,?,00000001), ref: 0041F096
                                                                                        • Part of subcall function 0041F088: SetErrorMode.KERNEL32(00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0B2
                                                                                        • Part of subcall function 0041F088: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0BE
                                                                                        • Part of subcall function 0041F088: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0CC
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F0FC
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F125
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F13A
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F14F
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F164
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F179
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F18E
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1A3
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1B8
                                                                                        • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F1CD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A4620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                                                      • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                      • API String ID: 1580766901-2767913252
                                                                                      • Opcode ID: 1c5da02b922e4aac06326fd948070b9cb60db65944391413fb0283cc291dbe50
                                                                                      • Instruction ID: b4a2cca2d4326696562d23f03e9beb5cdbbc64ba536a620a3ee3ba5bc66bdef7
                                                                                      • Opcode Fuzzy Hash: 1c5da02b922e4aac06326fd948070b9cb60db65944391413fb0283cc291dbe50
                                                                                      • Instruction Fuzzy Hash: 9A1160B06142409AC700FF2A984274A7AE0EB64309F41843FF448DB2A1DB3D9945CB5E
                                                                                      APIs
                                                                                      • SetWindowLongA.USER32(?,000000FC,?), ref: 004135D4
                                                                                      • GetWindowLongA.USER32(?,000000F0), ref: 004135DF
                                                                                      • GetWindowLongA.USER32(?,000000F4), ref: 004135F1
                                                                                      • SetWindowLongA.USER32(?,000000F4,?), ref: 00413604
                                                                                      • SetPropA.USER32(?,00000000,00000000), ref: 0041361B
                                                                                      • SetPropA.USER32(?,00000000,00000000), ref: 00413632
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: LongWindow$Prop
                                                                                      • String ID:
                                                                                      • API String ID: 3887896539-0
                                                                                      • Opcode ID: 86a15e674b3ea48860a72e4751bd866d9c55aec508b8b4782c27e449c12c4e66
                                                                                      • Instruction ID: 44bb5ba5a57c54889193f85f1a8a28b74f903b4ef320443ee5f093ebf11223bc
                                                                                      • Opcode Fuzzy Hash: 86a15e674b3ea48860a72e4751bd866d9c55aec508b8b4782c27e449c12c4e66
                                                                                      • Instruction Fuzzy Hash: B611C975500244BFDB00DF99DC85E9A3BE8BB19364F114266B928DB2A1D738D9908B68
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045425B,?,00000000,0045429B), ref: 004541A1
                                                                                      Strings
                                                                                      • PendingFileRenameOperations, xrefs: 00454140
                                                                                      • WININIT.INI, xrefs: 004541D0
                                                                                      • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454124
                                                                                      • PendingFileRenameOperations2, xrefs: 00454170
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen
                                                                                      • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                      • API String ID: 47109696-2199428270
                                                                                      • Opcode ID: 3b606e1cfbb150bd088f74f1063c905db1383d3fd6ed35e0c09aba21d543f6f9
                                                                                      • Instruction ID: 8ceaccac1fe58e6261fec66e20af0929b63452d54162f6f6a325dab65676f0d5
                                                                                      • Opcode Fuzzy Hash: 3b606e1cfbb150bd088f74f1063c905db1383d3fd6ed35e0c09aba21d543f6f9
                                                                                      • Instruction Fuzzy Hash: 0051BA30E001189FDB10DF62DC519DEB7B9EFC4348F5085B7F814AB292DB78AA85CA58
                                                                                      APIs
                                                                                      • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00463A85
                                                                                      • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463AAB
                                                                                        • Part of subcall function 00463928: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004639C0
                                                                                        • Part of subcall function 00463928: DestroyCursor.USER32(00000000), ref: 004639D6
                                                                                      • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00463B07
                                                                                      • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463B2D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Icon$ExtractFileInfo$CursorDestroyDraw
                                                                                      • String ID: c:\directory
                                                                                      • API String ID: 2926980410-3984940477
                                                                                      • Opcode ID: 1a7901e35b7efb8855ed844898b1e62419ded63c9a28a762335ba207438abc47
                                                                                      • Instruction ID: 671f662d79a6b5497fd1efd513546b718c4d5ac7f56db0c83477fb4c85f01fd4
                                                                                      • Opcode Fuzzy Hash: 1a7901e35b7efb8855ed844898b1e62419ded63c9a28a762335ba207438abc47
                                                                                      • Instruction Fuzzy Hash: 5C417F70640288AFD711DF55DC8AFDEBBE8EB48705F1040A6F904DB382D679EE808B59
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00453876
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,0045393C), ref: 004538E0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressByteCharMultiProcWide
                                                                                      • String ID: P@l$SfcIsFileProtected$sfc.dll
                                                                                      • API String ID: 2508298434-1167317136
                                                                                      • Opcode ID: 7bac0491a20355553d1817e9708559ea9c2ee3dc019520cc376e2a618a3a3bbf
                                                                                      • Instruction ID: 8896df26e74b4f53e6f77957fc07a02fe6ad1856ac683947f167e21e68caa71d
                                                                                      • Opcode Fuzzy Hash: 7bac0491a20355553d1817e9708559ea9c2ee3dc019520cc376e2a618a3a3bbf
                                                                                      • Instruction Fuzzy Hash: 9D4167B0A042189FEB10DF55DC85B9D77B8AB04346F5041BBB908A7293D7785F48CE5C
                                                                                      APIs
                                                                                      • RegDeleteKeyA.ADVAPI32(00000000,?), ref: 0042DC88
                                                                                      • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DE0B,00000000,0042DE23,?,?,?,?,00000006,?,00000000,00491FBA), ref: 0042DCA3
                                                                                      • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DCA9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressDeleteHandleModuleProc
                                                                                      • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                      • API String ID: 588496660-1846899949
                                                                                      • Opcode ID: 1ac9f45d9403d68368f5ea09b308c2771ffc131f1d77a79e4eddddbac772e20e
                                                                                      • Instruction ID: 479eeeb2458f1cbf9b477f45b3eef1c6296245770f751ec8fb172f928072974a
                                                                                      • Opcode Fuzzy Hash: 1ac9f45d9403d68368f5ea09b308c2771ffc131f1d77a79e4eddddbac772e20e
                                                                                      • Instruction Fuzzy Hash: 57E06DF0B45230AAD620676B7D4AFA327299B64725F54403BB105A619182FD4C40DE5C
                                                                                      APIs
                                                                                      • SetActiveWindow.USER32(?,?,00000000,0047DCA9,?,?,00000001,?), ref: 0047DAA5
                                                                                      • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0047DB1A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ActiveChangeNotifyWindow
                                                                                      • String ID: $Need to restart Windows? %s
                                                                                      • API String ID: 1160245247-4200181552
                                                                                      • Opcode ID: 12037f27ca6cd308aea1d326a4c3b70745560e3ec434e9b2862bfd7b37a3da6d
                                                                                      • Instruction ID: 90cd12f1ce5866ea51d49213f29bb353ee2a99eceb2f679e27348fc142a0b483
                                                                                      • Opcode Fuzzy Hash: 12037f27ca6cd308aea1d326a4c3b70745560e3ec434e9b2862bfd7b37a3da6d
                                                                                      • Instruction Fuzzy Hash: FD91B170A142448FCB11EB69D882B9E77F1AF55308F5080BBE8049B366DB78AD09DB5D
                                                                                      APIs
                                                                                        • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                                                      • GetLastError.KERNEL32(00000000,0046BAB1,?,?,00000001,00497154), ref: 0046B98E
                                                                                      • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046BA08
                                                                                      • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046BA2D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                      • String ID: Creating directory: %s
                                                                                      • API String ID: 2451617938-483064649
                                                                                      • Opcode ID: 6e6b56944f7af39c61aec4d517d3385b6d008573cf9049f4c4aabfc7d62e10ff
                                                                                      • Instruction ID: 7ea54ca36873d6337a8b148a308a739efa0342075aaa82460d6101fa077cad05
                                                                                      • Opcode Fuzzy Hash: 6e6b56944f7af39c61aec4d517d3385b6d008573cf9049f4c4aabfc7d62e10ff
                                                                                      • Instruction Fuzzy Hash: 40512F74E00258ABDB01DFE5C482BDEB7F5EF48304F50856AE851A7382D7785E44CB99
                                                                                      APIs
                                                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0045271B,?,?,00000000,00496628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452672
                                                                                      • GetLastError.KERNEL32(00000000,00000000,?,00000000,0045271B,?,?,00000000,00496628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045267B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                      • String ID: .tmp$o1I
                                                                                      • API String ID: 1375471231-2043145612
                                                                                      • Opcode ID: 6263e7da38dc712251df72676f2ee857ab2003e645070e4b394e34e858e0385a
                                                                                      • Instruction ID: 89aaa5dd644a1bfb9c6e4ab11305a67587a6d25824e33790291d603b6c08dcc0
                                                                                      • Opcode Fuzzy Hash: 6263e7da38dc712251df72676f2ee857ab2003e645070e4b394e34e858e0385a
                                                                                      • Instruction Fuzzy Hash: 14216575A002089BDB01EFA1C9929DFB7B8EF58305F50457BEC01B7342DA7CAE058AA5
                                                                                      APIs
                                                                                      • 751C1520.VERSION(00000000,?,?,?,] I), ref: 00451138
                                                                                      • 751C1500.VERSION(00000000,?,00000000,?,00000000,004511B3,?,00000000,?,?,?,] I), ref: 00451165
                                                                                      • 751C1540.VERSION(?,004511DC,?,?,00000000,?,00000000,?,00000000,004511B3,?,00000000,?,?,?,] I), ref: 0045117F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: C1500C1520C1540
                                                                                      • String ID: ] I
                                                                                      • API String ID: 1315064709-27375975
                                                                                      • Opcode ID: ae97c8c8a0c1eba3379072f8b46b7e7df9da348ac85090545a8034cef28368fb
                                                                                      • Instruction ID: c2ad28a97d73236a39d00b1522cfa6caf261f6f5eba90309d69346832355d152
                                                                                      • Opcode Fuzzy Hash: ae97c8c8a0c1eba3379072f8b46b7e7df9da348ac85090545a8034cef28368fb
                                                                                      • Instruction Fuzzy Hash: 5D219235A00508AFDB01DAA98C41EBFB7FCEB49340F5544BAFD00E3392D6799E058769
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegCloseKey.ADVAPI32(?,00454467,?,00000001,00000000), ref: 0045445A
                                                                                      Strings
                                                                                      • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454408
                                                                                      • PendingFileRenameOperations, xrefs: 0045442C
                                                                                      • PendingFileRenameOperations2, xrefs: 0045443B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen
                                                                                      • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                      • API String ID: 47109696-2115312317
                                                                                      • Opcode ID: 4d74768cc722451e6c2d7b21cab6517138d2d42bcabe4ec3ebcd03ef8cae5871
                                                                                      • Instruction ID: f6b2750a9208994f71abef58e55a78fed862e8850860690132b194e4ac46e676
                                                                                      • Opcode Fuzzy Hash: 4d74768cc722451e6c2d7b21cab6517138d2d42bcabe4ec3ebcd03ef8cae5871
                                                                                      • Instruction Fuzzy Hash: C0F062313442046FDB04D6A6EC12B5B73ADD7C5B19FA0446AFC009A682DA79AD48D51C
                                                                                      APIs
                                                                                      • GetMenu.USER32(00000000), ref: 004212D1
                                                                                      • SetMenu.USER32(00000000,00000000), ref: 004212EE
                                                                                      • SetMenu.USER32(00000000,00000000), ref: 00421323
                                                                                      • SetMenu.USER32(00000000,00000000), ref: 0042133F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu
                                                                                      • String ID:
                                                                                      • API String ID: 3711407533-0
                                                                                      • Opcode ID: 828adb1f4503573b8b19ec7e50c880e5d7ba93b5c851f867c46ca8f401a21855
                                                                                      • Instruction ID: 658f50d7c39b10a4f0c402205ec9e9078e39c2738942e4c3e39302bb3a71e335
                                                                                      • Opcode Fuzzy Hash: 828adb1f4503573b8b19ec7e50c880e5d7ba93b5c851f867c46ca8f401a21855
                                                                                      • Instruction Fuzzy Hash: 7641BE307002645BEB20AA7AA88579B37914F65308F4845BFFC44EF3A7CA7DCC4582AD
                                                                                      APIs
                                                                                      • SendMessageA.USER32(?,?,?,?), ref: 00416AF4
                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00416B0E
                                                                                      • SetBkColor.GDI32(?,00000000), ref: 00416B28
                                                                                      • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416B50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$CallMessageProcSendTextWindow
                                                                                      • String ID:
                                                                                      • API String ID: 601730667-0
                                                                                      • Opcode ID: 1d3cbda9518b2ce12e9cd07cc94b211126e19477f7e649d954dcb8d793c07e3f
                                                                                      • Instruction ID: c000e8b01db0500dd6874d208778bcf8efa3d9016d5589f965051e8255cd057a
                                                                                      • Opcode Fuzzy Hash: 1d3cbda9518b2ce12e9cd07cc94b211126e19477f7e649d954dcb8d793c07e3f
                                                                                      • Instruction Fuzzy Hash: 74115EB2604604AFC710EE6ECC84E8777ECEF49710B15886BB55ADB652C638FC418B79
                                                                                      APIs
                                                                                      • EnumWindows.USER32(0042398C), ref: 00423A18
                                                                                      • GetWindow.USER32(?,00000003), ref: 00423A2D
                                                                                      • GetWindowLongA.USER32(?,000000EC), ref: 00423A3C
                                                                                      • SetWindowPos.USER32(00000000,004240CC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042411B,?,?,00423CE3), ref: 00423A72
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$EnumLongWindows
                                                                                      • String ID:
                                                                                      • API String ID: 4191631535-0
                                                                                      • Opcode ID: b2f5db6fe163c30d8c8c0473a117728a579ec2d7ead3c741ce22ac317b482cf1
                                                                                      • Instruction ID: 335c349655b4e4ce664b27c97d7ab575fba50449cb033fde685ace27ceb71c75
                                                                                      • Opcode Fuzzy Hash: b2f5db6fe163c30d8c8c0473a117728a579ec2d7ead3c741ce22ac317b482cf1
                                                                                      • Instruction Fuzzy Hash: 91115A70700610ABDB10EF68DC85F5A77E8EB08725F11026AF9A4AB2E2C37CDC40CB58
                                                                                      APIs
                                                                                      • 73E9A570.USER32(00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 0042308E
                                                                                      • EnumFontsA.GDI32(00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 004230A1
                                                                                      • 73EA4620.GDI32(00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230A9
                                                                                      • 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230B4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: A4620A480A570EnumFonts
                                                                                      • String ID:
                                                                                      • API String ID: 178811091-0
                                                                                      • Opcode ID: 0130a543140e80f2b9f86b8e83a342749db33d5760528b3305e50fe7c2cc1c24
                                                                                      • Instruction ID: 4d68480f6d607538855b0f171b38ffa839f5ce6e0578d669e72114bdc8101102
                                                                                      • Opcode Fuzzy Hash: 0130a543140e80f2b9f86b8e83a342749db33d5760528b3305e50fe7c2cc1c24
                                                                                      • Instruction Fuzzy Hash: 0601D2616053002AE700BF6A5C82B9B37649F00709F40027BF804AF2C7D6BE9805476E
                                                                                      APIs
                                                                                      • WaitForInputIdle.USER32(00000001,00000032), ref: 0045399C
                                                                                      • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004539BE
                                                                                      • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 004539CD
                                                                                      • CloseHandle.KERNEL32(00000001,004539FA,004539F3,?,00000031,00000080,00000000,?,?,00453D4B,00000080,0000003C,00000000,00453D61), ref: 004539ED
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                      • String ID:
                                                                                      • API String ID: 4071923889-0
                                                                                      • Opcode ID: b5c2dbf5272f504e7b06945f00b02d3f578c52004c30b2aed4c8e7ec893f2b0e
                                                                                      • Instruction ID: f26be41c5c034272f157e269139ed2410fa661b94adc91c278c581610335523b
                                                                                      • Opcode Fuzzy Hash: b5c2dbf5272f504e7b06945f00b02d3f578c52004c30b2aed4c8e7ec893f2b0e
                                                                                      • Instruction Fuzzy Hash: 3301F9F06006087EEB219B998C06F6BBB9CDB457A1F600167F904D32C2C5F89E00CA69
                                                                                      APIs
                                                                                      • GlobalHandle.KERNEL32 ref: 00406287
                                                                                      • GlobalUnWire.KERNEL32(00000000), ref: 0040628E
                                                                                      • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                                                      • GlobalFix.KERNEL32(00000000), ref: 00406299
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$AllocHandleWire
                                                                                      • String ID:
                                                                                      • API String ID: 2210401237-0
                                                                                      • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                                      • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                                                      • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                                      • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                                                      APIs
                                                                                        • Part of subcall function 00450088: SetEndOfFile.KERNEL32(?,?,0045AA1E,00000000,0045ABA9,?,00000000,00000002,00000002), ref: 0045008F
                                                                                      • FlushFileBuffers.KERNEL32(?), ref: 0045AB75
                                                                                      Strings
                                                                                      • EndOffset range exceeded, xrefs: 0045AAA9
                                                                                      • NumRecs range exceeded, xrefs: 0045AA72
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$BuffersFlush
                                                                                      • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                      • API String ID: 3593489403-659731555
                                                                                      • Opcode ID: 284914d50a052015b7c75a6107dacc898a09a70c67966605e73dc69b2178a5f5
                                                                                      • Instruction ID: 49fd1ead36e8c92626c0d22f3e04e342ae71ee3369d077df08b87a69a2b16800
                                                                                      • Opcode Fuzzy Hash: 284914d50a052015b7c75a6107dacc898a09a70c67966605e73dc69b2178a5f5
                                                                                      • Instruction Fuzzy Hash: 68617334A002588FDB24DF25C881BDAB7B5EF49305F0085EAED889B352D674AEC9CF55
                                                                                      APIs
                                                                                        • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,004931DE), ref: 0040334B
                                                                                        • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,004931DE), ref: 00403356
                                                                                        • Part of subcall function 00409AE8: 6F9E1CD0.COMCTL32(004931ED), ref: 00409AE8
                                                                                        • Part of subcall function 004108C4: GetCurrentThreadId.KERNEL32 ref: 00410912
                                                                                        • Part of subcall function 00418FB0: GetVersion.KERNEL32(00493201), ref: 00418FB0
                                                                                        • Part of subcall function 0044F178: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00493215), ref: 0044F1B3
                                                                                        • Part of subcall function 0044F178: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F1B9
                                                                                        • Part of subcall function 0044F55C: GetVersionExA.KERNEL32(00496780,0049321A), ref: 0044F56B
                                                                                        • Part of subcall function 00451DF8: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451E91,?,?,?,?,00000000,?,00493224), ref: 00451E18
                                                                                        • Part of subcall function 00451DF8: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451E1E
                                                                                        • Part of subcall function 00451DF8: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451E91,?,?,?,?,00000000,?,00493224), ref: 00451E32
                                                                                        • Part of subcall function 00451DF8: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451E38
                                                                                        • Part of subcall function 00460EAC: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00493238), ref: 00460EBB
                                                                                        • Part of subcall function 00460EAC: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00460EC1
                                                                                        • Part of subcall function 00468C50: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 00468C65
                                                                                        • Part of subcall function 00474088: GetModuleHandleA.KERNEL32(kernel32.dll,?,00493242), ref: 0047408E
                                                                                        • Part of subcall function 00474088: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047409B
                                                                                        • Part of subcall function 00474088: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 004740AB
                                                                                        • Part of subcall function 00490338: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00490351
                                                                                      • SetErrorMode.KERNEL32(00000001,00000000,0049328A), ref: 0049325C
                                                                                        • Part of subcall function 00492FE0: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00493266,00000001,00000000,0049328A), ref: 00492FEA
                                                                                        • Part of subcall function 00492FE0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00492FF0
                                                                                        • Part of subcall function 00424444: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424463
                                                                                        • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                                      • ShowWindow.USER32(?,00000005,00000000,0049328A), ref: 004932CD
                                                                                        • Part of subcall function 0047D0AC: SetActiveWindow.USER32(?), ref: 0047D150
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModeRegisterSendShowTextThread
                                                                                      • String ID: Setup
                                                                                      • API String ID: 4266685988-3839654196
                                                                                      • Opcode ID: fee832f36ce975679e260f9b0954113cf3741595f260ce40ded7ca7ebb5c54dd
                                                                                      • Instruction ID: 779a321fc15f42447a8f0963ad68d9f2a93317841f7d3acf2e890d1de8ee30c9
                                                                                      • Opcode Fuzzy Hash: fee832f36ce975679e260f9b0954113cf3741595f260ce40ded7ca7ebb5c54dd
                                                                                      • Instruction Fuzzy Hash: 0531A3312146409FDB11BBB7AC1351D3BA4EB8A71DBA2447FF804C2653CE3D5C548A6E
                                                                                      APIs
                                                                                      • CreateProcessA.KERNEL32(00000000,00000000,?,?,dE,00000000,004564D0,?,?,?,00000000,0045146A,?,?,?,00000001), ref: 00451444
                                                                                      • GetLastError.KERNEL32(00000000,00000000,?,?,dE,00000000,004564D0,?,?,?,00000000,0045146A,?,?,?,00000001), ref: 0045144C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateErrorLastProcess
                                                                                      • String ID: dE
                                                                                      • API String ID: 2919029540-3809906464
                                                                                      • Opcode ID: 593608dd5432025e5c10579cc54da45850a235723a39842afc18d8064d6d1a21
                                                                                      • Instruction ID: 6a74b67a3bdf66ca54efcfc0657381ecd904da166113fafb2436bbcb0ae12e28
                                                                                      • Opcode Fuzzy Hash: 593608dd5432025e5c10579cc54da45850a235723a39842afc18d8064d6d1a21
                                                                                      • Instruction Fuzzy Hash: E1117972600208AF8B00DEA9DC41EDFB7ECEB4D310B114566FD18D3212D638AD15CBA4
                                                                                      APIs
                                                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,00477936,00000000,0047794C,?,?,?,?,00000000), ref: 00477712
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Close
                                                                                      • String ID: RegisteredOrganization$RegisteredOwner
                                                                                      • API String ID: 3535843008-1113070880
                                                                                      • Opcode ID: 5da0313d24de2a72906f0e02df73607d497778b3bd604c1f31dadd7d7b78e1f2
                                                                                      • Instruction ID: 44da9ba76ca96eafcd406259b3cb4b8fe95da4c4325a64976e48815ca65e7baf
                                                                                      • Opcode Fuzzy Hash: 5da0313d24de2a72906f0e02df73607d497778b3bd604c1f31dadd7d7b78e1f2
                                                                                      • Instruction Fuzzy Hash: 94F0593470C244AFDB04D6A5EC52BAB3B9AD740308FA4807BA544CB391C67CBD05D74C
                                                                                      APIs
                                                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 004231B9
                                                                                      • LoadCursorA.USER32(00000000,00000000), ref: 004231E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CursorLoad
                                                                                      • String ID: EI
                                                                                      • API String ID: 3238433803-1715459816
                                                                                      • Opcode ID: cf7d116e50ce189f5790faa080c989bb411d79830bfeb1cde74da96b9f6355ff
                                                                                      • Instruction ID: e763212e35d88e91f52bf3e5ce882ef76e84b1945e438db40d164ba05c470673
                                                                                      • Opcode Fuzzy Hash: cf7d116e50ce189f5790faa080c989bb411d79830bfeb1cde74da96b9f6355ff
                                                                                      • Instruction Fuzzy Hash: 1DF0A7117001145BD620593E6CC1D3A72688F87736B61033BFE2AD72D1C62E2D51426D
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047117F), ref: 00470F6D
                                                                                      • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047117F), ref: 00470F84
                                                                                        • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492A61,00000000), ref: 004520A7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateErrorFileHandleLast
                                                                                      • String ID: CreateFile
                                                                                      • API String ID: 2528220319-823142352
                                                                                      • Opcode ID: 8e17254768e76acdbc2e0aeec1a0314679b2821655cd6b60debc059c7f00f31f
                                                                                      • Instruction ID: 4dce3a0fb710f8058c99a71000b1262451dde5c1e1bb000cefd451e94b844243
                                                                                      • Opcode Fuzzy Hash: 8e17254768e76acdbc2e0aeec1a0314679b2821655cd6b60debc059c7f00f31f
                                                                                      • Instruction Fuzzy Hash: C4E06D74341304BFEA20E669DCC6F4977889B04728F108152FA48AF3E2C6F9EC408658
                                                                                      APIs
                                                                                      • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,TqI,00000004,00000001,?,0046B40F,?,?,00000000,0046B4F7,?,_is1,?), ref: 0046ADEF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Value
                                                                                      • String ID: NoModify$TqI
                                                                                      • API String ID: 3702945584-2484388882
                                                                                      • Opcode ID: f5a2910f86b5d4890aa6fcbcf0034d47aef96215c39c1bb137200c97013dc63d
                                                                                      • Instruction ID: 388a847686ab158aae351853834ee3a19678c554c0d9cb8fd514d48c61279f2c
                                                                                      • Opcode Fuzzy Hash: f5a2910f86b5d4890aa6fcbcf0034d47aef96215c39c1bb137200c97013dc63d
                                                                                      • Instruction Fuzzy Hash: F4E04FB0640704BFEB04DB55CD4AF6B77ACDB48714F104059BA08EB281E674FE10CA69
                                                                                      APIs
                                                                                      • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Open
                                                                                      • String ID: OG$System\CurrentControlSet\Control\Windows
                                                                                      • API String ID: 71445658-2870956291
                                                                                      • Opcode ID: cac79e148e5d1637301d0cd401e0a8768c8b40d51dfb76d9d00be79e5a4099f3
                                                                                      • Instruction ID: fabb803f5ff523eeab3b7a035bb747b9213277980d9d81731b2bf545c5070290
                                                                                      • Opcode Fuzzy Hash: cac79e148e5d1637301d0cd401e0a8768c8b40d51dfb76d9d00be79e5a4099f3
                                                                                      • Instruction Fuzzy Hash: EDD0C772910128BBDB10DA89DC41DF7775DDB59760F54401AFD0497141C1B4EC5197F4
                                                                                      APIs
                                                                                        • Part of subcall function 0042E1F0: SetErrorMode.KERNEL32(00008000), ref: 0042E1FA
                                                                                        • Part of subcall function 0042E1F0: LoadLibraryA.KERNEL32(00000000,00000000,0042E244,?,00000000,0042E262,?,00008000), ref: 0042E229
                                                                                      • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 00468C65
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressErrorLibraryLoadModeProc
                                                                                      • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                      • API String ID: 2492108670-2683653824
                                                                                      • Opcode ID: 2242cd585e3a95cf47e04d02ab2c9cb54a1972a887a648b3717fd23610ab8d3e
                                                                                      • Instruction ID: f54d236eaa647a004fc156d77ac0774b12b8f86e94465ae50302f3b70839ea38
                                                                                      • Opcode Fuzzy Hash: 2242cd585e3a95cf47e04d02ab2c9cb54a1972a887a648b3717fd23610ab8d3e
                                                                                      • Instruction Fuzzy Hash: FDB092A064271082CE006BB2584271B22149750744B10C57FB040AA295EE7D88044FBE
                                                                                      APIs
                                                                                      • GetSystemMenu.USER32(00000000,00000000,00000000,0047C898), ref: 0047C830
                                                                                      • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0047C841
                                                                                      • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 0047C859
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$Append$System
                                                                                      • String ID:
                                                                                      • API String ID: 1489644407-0
                                                                                      • Opcode ID: 103ad35a9952b07d56bdb3bad9c34a645578be9cba599f62803875c0b4fd2168
                                                                                      • Instruction ID: 938ecdfec97688d9e91313a56ab48558b9b04f1f4dc78c4c1ee95835cae09dfe
                                                                                      • Opcode Fuzzy Hash: 103ad35a9952b07d56bdb3bad9c34a645578be9cba599f62803875c0b4fd2168
                                                                                      • Instruction Fuzzy Hash: BA31CF307143455AD710FB768CC2B9A3A989B51318F55947FF904AA2D3CA7C9C09C66E
                                                                                      APIs
                                                                                      • 73E9A570.USER32(00000000,?,00000000,00000000,0044AEC1,?,0047D0C7,?,?), ref: 0044AE35
                                                                                      • SelectObject.GDI32(?,00000000), ref: 0044AE58
                                                                                      • 73E9A480.USER32(00000000,?,0044AE98,00000000,0044AE91,?,00000000,?,00000000,00000000,0044AEC1,?,0047D0C7,?,?), ref: 0044AE8B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: A480A570ObjectSelect
                                                                                      • String ID:
                                                                                      • API String ID: 1230475511-0
                                                                                      • Opcode ID: 91444e5bf131007ac93604d47e6fc7e18e34c23fefa9c833d2c38518ec62aedf
                                                                                      • Instruction ID: 233d7bfbdcc25e67ff0a572e229f91d747dfb26028a93c536af8bc2826ebb7c8
                                                                                      • Opcode Fuzzy Hash: 91444e5bf131007ac93604d47e6fc7e18e34c23fefa9c833d2c38518ec62aedf
                                                                                      • Instruction Fuzzy Hash: D721B570E84208AFEB01DFA5C841B9F7BB9DB48304F51847AF504A6281C77C9950CB19
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044AB80,?,0047D0C7,?,?), ref: 0044AB52
                                                                                      • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044AB65
                                                                                      • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044AB99
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: DrawText$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 65125430-0
                                                                                      • Opcode ID: 145cb60817e1461b02aba970f6a399deb92e78d362c3eca44f3c4fb02434d21d
                                                                                      • Instruction ID: de988064b5c118741e346c03ff1e8b17db840b4da88b1af59de34c2d8924ec6d
                                                                                      • Opcode Fuzzy Hash: 145cb60817e1461b02aba970f6a399deb92e78d362c3eca44f3c4fb02434d21d
                                                                                      • Instruction Fuzzy Hash: D811E6B27446447FE711DAAA8C81D6FB7EDDB88724F10413AF604E7280C6389E018669
                                                                                      APIs
                                                                                      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424382
                                                                                      • TranslateMessage.USER32(?), ref: 004243FF
                                                                                      • DispatchMessageA.USER32(?), ref: 00424409
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$DispatchPeekTranslate
                                                                                      • String ID:
                                                                                      • API String ID: 4217535847-0
                                                                                      • Opcode ID: 4c72fe453077d3d5441811771d3c73f57da1beb0f02e586e781598996b195a0c
                                                                                      • Instruction ID: aef1b0206ccdbb2aa8587e86ea6dacd49c82d9c27d6d10fa8c02d352bba97142
                                                                                      • Opcode Fuzzy Hash: 4c72fe453077d3d5441811771d3c73f57da1beb0f02e586e781598996b195a0c
                                                                                      • Instruction Fuzzy Hash: 6F11543030432056DA20E665A94179B73D4DFC1B44F80886EF9DD97382D77D9D4987AA
                                                                                      APIs
                                                                                      • SetPropA.USER32(00000000,00000000), ref: 004165DA
                                                                                      • SetPropA.USER32(00000000,00000000), ref: 004165EF
                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 00416616
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Prop$Window
                                                                                      • String ID:
                                                                                      • API String ID: 3363284559-0
                                                                                      • Opcode ID: 1283a2ba918a1a05b7609b6f7b848b7b983b1697ade3d6b61c1960e914505d94
                                                                                      • Instruction ID: 49560f5f00ee2c9135054c0b38937f4b9f373f0e35015079742173c5fde362c9
                                                                                      • Opcode Fuzzy Hash: 1283a2ba918a1a05b7609b6f7b848b7b983b1697ade3d6b61c1960e914505d94
                                                                                      • Instruction Fuzzy Hash: C3F0BD71701220BBEB10AB599C85FA632DCAB09715F16057ABE09EF286C778DC44C7A8
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Virtual$AllocFree
                                                                                      • String ID: 1[
                                                                                      • API String ID: 2087232378-3738508114
                                                                                      • Opcode ID: ac11951010fca1e09d027c43c8ed5b4b578696c80165eb8de0d03b95ec4bb515
                                                                                      • Instruction ID: 1d7fc67d8943aca9bd8b7424c3d760102f2274f63a1bf98f742a2cdc6a51162d
                                                                                      • Opcode Fuzzy Hash: ac11951010fca1e09d027c43c8ed5b4b578696c80165eb8de0d03b95ec4bb515
                                                                                      • Instruction Fuzzy Hash: 28F0A772B0073067EB605A6A4C81F5359C49FC5B94F154076FD0DFF3E9D6B58C0142A9
                                                                                      APIs
                                                                                      • IsWindowVisible.USER32(?), ref: 0041EDD4
                                                                                      • IsWindowEnabled.USER32(?), ref: 0041EDDE
                                                                                      • EnableWindow.USER32(?,00000000), ref: 0041EE04
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$EnableEnabledVisible
                                                                                      • String ID:
                                                                                      • API String ID: 3234591441-0
                                                                                      • Opcode ID: f1041f771c00274fafaec7c92c8c7bfa6f382932e423aeab5ff933265dcc9458
                                                                                      • Instruction ID: feef2f1e36016e7b5cf4fb144cadbc7ab6d373431457e94ba2eb74728d462d7d
                                                                                      • Opcode Fuzzy Hash: f1041f771c00274fafaec7c92c8c7bfa6f382932e423aeab5ff933265dcc9458
                                                                                      • Instruction Fuzzy Hash: B9E0E5B41003006BD711AF67DC85E57769CBB94314F568437AD0597793EA3ED8418AB8
                                                                                      APIs
                                                                                      • GetSystemDefaultLCID.KERNEL32(00000000,0040867A), ref: 00408563
                                                                                        • Part of subcall function 00406D54: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406D71
                                                                                        • Part of subcall function 004084D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                      • String ID: 1I
                                                                                      • API String ID: 1658689577-762079770
                                                                                      • Opcode ID: 6e8303e27ed7ddfbf6acd002e5c720f3c58af445dc5c20a44dc96457956c1da1
                                                                                      • Instruction ID: 74dcf24fece9135f842d9e2340cbc50c81b3ec91f87ebb2824f4d2ce1649f107
                                                                                      • Opcode Fuzzy Hash: 6e8303e27ed7ddfbf6acd002e5c720f3c58af445dc5c20a44dc96457956c1da1
                                                                                      • Instruction Fuzzy Hash: E7316375E00109ABCF00EF95C8819EEB7B9FF84314F118577E815BB285E738AE058B98
                                                                                      APIs
                                                                                      • SetActiveWindow.USER32(?), ref: 0047D150
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ActiveWindow
                                                                                      • String ID: InitializeWizard
                                                                                      • API String ID: 2558294473-2356795471
                                                                                      • Opcode ID: 669a6a269d9429eb07b4638d8b152cc205309fde65fa91bd383415d10fe050b9
                                                                                      • Instruction ID: 27c915d5e84757d1ee1c922a0b45ecd3517ff57706a6a9b1ea1830c72a43ed0f
                                                                                      • Opcode Fuzzy Hash: 669a6a269d9429eb07b4638d8b152cc205309fde65fa91bd383415d10fe050b9
                                                                                      • Instruction Fuzzy Hash: 9811C2306382009FD710EB29EC82B5A7BF5EB15724F50403BE808872A2DA39AC50CB5D
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,00477812,00000000,0047794C), ref: 00477611
                                                                                      Strings
                                                                                      • Software\Microsoft\Windows\CurrentVersion, xrefs: 004775E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen
                                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                      • API String ID: 47109696-1019749484
                                                                                      • Opcode ID: 225175c1cb3e5d3e9e70e9ef9a971fa01c6206b910d71101a0ac37fcff0035a7
                                                                                      • Instruction ID: 814c6dcea663d1405d948e9489940348151ed5d62cb49aab8d6aacd0da240b25
                                                                                      • Opcode Fuzzy Hash: 225175c1cb3e5d3e9e70e9ef9a971fa01c6206b910d71101a0ac37fcff0035a7
                                                                                      • Instruction Fuzzy Hash: C7F0A7317085146BDA00A65E6D42B9FA6DDCB84778F60443BF608EB346DABDDE0243AD
                                                                                      APIs
                                                                                      • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,?,00497154,?,0046B06F,?,00000000,0046B4F7,?,_is1), ref: 0046AD8F
                                                                                      Strings
                                                                                      • Inno Setup: Setup Version, xrefs: 0046AD8D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Value
                                                                                      • String ID: Inno Setup: Setup Version
                                                                                      • API String ID: 3702945584-4166306022
                                                                                      • Opcode ID: b5001300976c311ff63bf81daa3498fb24628c1a8b44004d588d325ece062412
                                                                                      • Instruction ID: 411328d8211db58a77dae3404ef256999053971fa6961c2aedf3cbf650fcdf7d
                                                                                      • Opcode Fuzzy Hash: b5001300976c311ff63bf81daa3498fb24628c1a8b44004d588d325ece062412
                                                                                      • Instruction Fuzzy Hash: 7FE06D713016043FD710AA6ADC85F5BBADCDF88365F10403AB908EB392D578DD0085A9
                                                                                      APIs
                                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DB70), ref: 0042DA74
                                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DB70), ref: 0042DAE4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: QueryValue
                                                                                      • String ID:
                                                                                      • API String ID: 3660427363-0
                                                                                      • Opcode ID: fe899f6043c7f770a4508ac600d0d0e70af19fa3b1a52c17f713553a047210da
                                                                                      • Instruction ID: de7305fe23da407263f6a21fe748e6d6d926aae016943a7179aec9e2dd5a457b
                                                                                      • Opcode Fuzzy Hash: fe899f6043c7f770a4508ac600d0d0e70af19fa3b1a52c17f713553a047210da
                                                                                      • Instruction Fuzzy Hash: 4F417171E04129AFDF10DF91D891BAFBBB8EB01704F918466E810B7240D778BE04CB99
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DDF6,?,?,00000008,00000000,00000000,0042DE23), ref: 0042DD8C
                                                                                      • RegCloseKey.ADVAPI32(?,0042DDFD,?,00000000,00000000,00000000,00000000,00000000,0042DDF6,?,?,00000008,00000000,00000000,0042DE23), ref: 0042DDF0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseEnumOpen
                                                                                      • String ID:
                                                                                      • API String ID: 1332880857-0
                                                                                      • Opcode ID: b395eec5d444746d883dbbe68a26dc186a8be4d3543415a8a9a06ae4829f6fc1
                                                                                      • Instruction ID: 4db75c3f0003ee77c81ad7234f2e5e1b513bc4eba3d2eee43a500da64a91fe5e
                                                                                      • Opcode Fuzzy Hash: b395eec5d444746d883dbbe68a26dc186a8be4d3543415a8a9a06ae4829f6fc1
                                                                                      • Instruction Fuzzy Hash: 4931B270F04649AFDB14DFA6DC52BAFBBB9EB48304F90407BE400F7281D6785A01CA29
                                                                                      APIs
                                                                                      • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AF52
                                                                                      • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B0AF,00000000,0040B0C7,?,?,?,00000000), ref: 0040AF63
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Resource$FindFree
                                                                                      • String ID:
                                                                                      • API String ID: 4097029671-0
                                                                                      • Opcode ID: 495ed283f31991be558d7aaf91bbf96f1b13b17f58e3dd61e94c2b353b9623af
                                                                                      • Instruction ID: d0e6d2b3de5701a5b01f0c314f0e154d100cb3f2f79c9d4e2e087994511e300e
                                                                                      • Opcode Fuzzy Hash: 495ed283f31991be558d7aaf91bbf96f1b13b17f58e3dd61e94c2b353b9623af
                                                                                      • Instruction Fuzzy Hash: 7701F7B1704300AFD700EF69DC92E1A77EDDB897187128076F500EB3D0DA799C119669
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                                                      • 73EA5940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042E908,?,00000001), ref: 0041EE69
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: A5940CurrentThread
                                                                                      • String ID:
                                                                                      • API String ID: 2589350566-0
                                                                                      • Opcode ID: b328251ae0892c8a3b7f185b32438ae157af80a37aa78e1151a8addd2e42d252
                                                                                      • Instruction ID: 6dec67758a4febc774e22da3091525d30ea0c4d8bfc57ce8b44416be19a69247
                                                                                      • Opcode Fuzzy Hash: b328251ae0892c8a3b7f185b32438ae157af80a37aa78e1151a8addd2e42d252
                                                                                      • Instruction Fuzzy Hash: C3015B74A04704AFD701CFA6EC11956BBE8E789720B22887BE904D37A0EA385811DE18
                                                                                      APIs
                                                                                      • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00000000,00004003,00401973), ref: 00401766
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeVirtual
                                                                                      • String ID: 1[
                                                                                      • API String ID: 1263568516-3738508114
                                                                                      • Opcode ID: 09cabece21cf584f7b8116981dfbad3f8653d6c5a4f55eb454a10d9661d4edbc
                                                                                      • Instruction ID: dd39995c24d96b1f0cd65365fb3acc738aa13d81c460f04ccbda7f03c85f078f
                                                                                      • Opcode Fuzzy Hash: 09cabece21cf584f7b8116981dfbad3f8653d6c5a4f55eb454a10d9661d4edbc
                                                                                      • Instruction Fuzzy Hash: 6D01FC766442148FC3109F69DCC0E2677E8D794378F16453EDA85673A1D37A6C018BDC
                                                                                      APIs
                                                                                      • MoveFileA.KERNEL32(00000000,00000000), ref: 004518CA
                                                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,004518F0), ref: 004518D2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastMove
                                                                                      • String ID:
                                                                                      • API String ID: 55378915-0
                                                                                      • Opcode ID: 10a17b5f55d8132d355b2be22579e48721c0d02d21db4419b0f25e12a06febb5
                                                                                      • Instruction ID: 4a908479c274ede1fa612a67027dcf523005e30280c6ec4e7261d6cc76548501
                                                                                      • Opcode Fuzzy Hash: 10a17b5f55d8132d355b2be22579e48721c0d02d21db4419b0f25e12a06febb5
                                                                                      • Instruction Fuzzy Hash: B9014971B00304AF9B10FFB99C4259EB7ECDB8832171045BBFC08E3652EA384E048558
                                                                                      APIs
                                                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004513D7), ref: 004513B1
                                                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,004513D7), ref: 004513B9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1375471231-0
                                                                                      • Opcode ID: 7fd9e911900e9a06a0dfd278701c74cc3c46c37c0458817335f085c5dd111093
                                                                                      • Instruction ID: 9b23b03b90933790c580962e112c838e42041695dbfb4577ddf6274ef4a18e8c
                                                                                      • Opcode Fuzzy Hash: 7fd9e911900e9a06a0dfd278701c74cc3c46c37c0458817335f085c5dd111093
                                                                                      • Instruction Fuzzy Hash: 2EF0C871A04708BBEB00EFB5AC516AEB7E8EB09315F5045B7FC04E3A52E6794E148698
                                                                                      APIs
                                                                                      • SetErrorMode.KERNEL32(00008000), ref: 0042E1FA
                                                                                      • LoadLibraryA.KERNEL32(00000000,00000000,0042E244,?,00000000,0042E262,?,00008000), ref: 0042E229
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLibraryLoadMode
                                                                                      • String ID:
                                                                                      • API String ID: 2987862817-0
                                                                                      • Opcode ID: 0102d987cd0908c49357e23cdbf7a47517641d04aa5dfc05fc1f8898bd46d34f
                                                                                      • Instruction ID: 2bd629673230950b16c4bb4544665cc4d3578012b9e0763c9fae70ecea85f9d4
                                                                                      • Opcode Fuzzy Hash: 0102d987cd0908c49357e23cdbf7a47517641d04aa5dfc05fc1f8898bd46d34f
                                                                                      • Instruction Fuzzy Hash: 31F08270714744FEDF019F779C6282BBBECE74DB1479249B6F800A2691E63C5810C939
                                                                                      APIs
                                                                                      • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,0046C065,?,00000000), ref: 0045006A
                                                                                      • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,0046C065,?,00000000), ref: 00450072
                                                                                        • Part of subcall function 0044FE10: GetLastError.KERNEL32(0044FC2C,0044FED2,?,00000000,?,00492588,00000001,00000000,00000002,00000000,004926E9,?,?,00000005,00000000,0049271D), ref: 0044FE13
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$FilePointer
                                                                                      • String ID:
                                                                                      • API String ID: 1156039329-0
                                                                                      • Opcode ID: f7b6d91780900016932261e5b31036d83abc2770e31421f62e2bd79437fa69ba
                                                                                      • Instruction ID: 619d70630f7d728e19568b0c26e44efacd411b086580920acadf97a9c9154113
                                                                                      • Opcode Fuzzy Hash: f7b6d91780900016932261e5b31036d83abc2770e31421f62e2bd79437fa69ba
                                                                                      • Instruction Fuzzy Hash: F9E012B53042016BEB10EAA5A9C1F3B23DCEF44715F10447EB944CF183D674CC054B69
                                                                                      APIs
                                                                                      • SendNotifyMessageA.USER32(000203EC,00000496,00002711,00000000), ref: 0047912C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageNotifySend
                                                                                      • String ID:
                                                                                      • API String ID: 3556456075-0
                                                                                      • Opcode ID: 1bf78a2a4972fbb2a73e3495687c09ee27ad1c961f8a5cc689fdc3f33d66a45c
                                                                                      • Instruction ID: 7d22008d7a83e2500ddd5853d1c98629ae082a9ef6797e0e4edc72868eccde80
                                                                                      • Opcode Fuzzy Hash: 1bf78a2a4972fbb2a73e3495687c09ee27ad1c961f8a5cc689fdc3f33d66a45c
                                                                                      • Instruction Fuzzy Hash: 884142343240009BCB10FF26D88598A7BA5EB50309B65C5BBB8049F3A7CA3DDD46DB9D
                                                                                      APIs
                                                                                      • 7715E550.OLE32(00494B14,00000000,00000001,00494B24,00497054), ref: 0046A2B9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: 7715E550
                                                                                      • String ID:
                                                                                      • API String ID: 730562625-0
                                                                                      • Opcode ID: 1a96fdbb3e90de8797b7c34e8fd7761ef28502cc93813c311678e4427fcc9a8f
                                                                                      • Instruction ID: 28ea0cda059d87ed8d6f055d3f11cf2141d1ab261bbca5563b99c48b31e217e3
                                                                                      • Opcode Fuzzy Hash: 1a96fdbb3e90de8797b7c34e8fd7761ef28502cc93813c311678e4427fcc9a8f
                                                                                      • Instruction Fuzzy Hash: 1731BC303686008FD750DB19D895B6A73E1EB95314F6082BBF8489B3A1E779EC41CB4E
                                                                                      APIs
                                                                                      • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FBA9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoScroll
                                                                                      • String ID:
                                                                                      • API String ID: 629608716-0
                                                                                      • Opcode ID: 50e1310ba0544b59a0555e2be0f3aefd4cf1699031129a7841ddf0d9dd467a2f
                                                                                      • Instruction ID: 884c2cb002146e47c45dd1875db58eae66db6a4caaf859e9ca4b80fd75174b4c
                                                                                      • Opcode Fuzzy Hash: 50e1310ba0544b59a0555e2be0f3aefd4cf1699031129a7841ddf0d9dd467a2f
                                                                                      • Instruction Fuzzy Hash: DD2130716087456FC340DF39D840696BBE4BB48344F148A3EA098C3341D774E99ACBD6
                                                                                      APIs
                                                                                        • Part of subcall function 0041EE14: GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                                                        • Part of subcall function 0041EE14: 73EA5940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042E908,?,00000001), ref: 0041EE69
                                                                                      • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,004683C6,?,00000000,?,?,004685D3,?,00000000,00468612), ref: 004683AA
                                                                                        • Part of subcall function 0041EEC8: IsWindow.USER32(8BF0EBFF), ref: 0041EED6
                                                                                        • Part of subcall function 0041EEC8: EnableWindow.USER32(8BF0EBFF,00000001), ref: 0041EEE5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$A5940CurrentEnablePathPrepareThreadWrite
                                                                                      • String ID:
                                                                                      • API String ID: 3104224314-0
                                                                                      • Opcode ID: 467ce9893c8a2b941d671877d34955771c88eccab2483bb784be52c54abd03e3
                                                                                      • Instruction ID: 1e6c9ee491f26ebb38a393fd70065da3d13cda2054ea28a361ce8fb2712a9f85
                                                                                      • Opcode Fuzzy Hash: 467ce9893c8a2b941d671877d34955771c88eccab2483bb784be52c54abd03e3
                                                                                      • Instruction Fuzzy Hash: F0F0E9B1258300BFE7159B72EC56B1677E8E314B15F51447FF804C66D0EA7A5890C62D
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite
                                                                                      • String ID:
                                                                                      • API String ID: 3934441357-0
                                                                                      • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                      • Instruction ID: f885d1546c0ddadd170268c7727831953bb7ef74118cb9c1630738a499be6481
                                                                                      • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                      • Instruction Fuzzy Hash: E3F06D70504109EFAF0CCF58D0658AF77A1EF48300B2084AFE60797790D638AE30E798
                                                                                      APIs
                                                                                      • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 004164F5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateWindow
                                                                                      • String ID:
                                                                                      • API String ID: 716092398-0
                                                                                      • Opcode ID: cdcc0148ce654954751abbafc01dffb42bdee5d1888213000ee0bb92e9214fa3
                                                                                      • Instruction ID: a44329a4cc8b06b024a2b0eee2fd8d89e642962040674eee811c3e7967e458ca
                                                                                      • Opcode Fuzzy Hash: cdcc0148ce654954751abbafc01dffb42bdee5d1888213000ee0bb92e9214fa3
                                                                                      • Instruction Fuzzy Hash: F5F025B2200510AFDB84CF9CD9C0F9373ECEB0C210B0981A6FA08CF24AD220EC108BB0
                                                                                      APIs
                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0041495F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallbackDispatcherUser
                                                                                      • String ID:
                                                                                      • API String ID: 2492992576-0
                                                                                      • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                      • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                      • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                      • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                      APIs
                                                                                      • GetFileAttributesA.KERNEL32(00000000,00000000,0042CBF0,?,00000001,?,?,00000000,?,0042CC42,00000000,0045162D,00000000,0045164E,?,00000000), ref: 0042CBD3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile
                                                                                      • String ID:
                                                                                      • API String ID: 3188754299-0
                                                                                      • Opcode ID: fb728ae1967c572744be537d183b1c2397660519459ab9e6793d4da77068addf
                                                                                      • Instruction ID: dfed850972a7f4cfed0b3d6ce6ead54829112a593105f6481b619d55be1254e6
                                                                                      • Opcode Fuzzy Hash: fb728ae1967c572744be537d183b1c2397660519459ab9e6793d4da77068addf
                                                                                      • Instruction Fuzzy Hash: 1AE06571304708BFD701EB62AC93E5EBBACD745714B914876B400A7651D5B8AE00845C
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0044FF60
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: a92cf0aa8bb23f57ccdc9442b6704fbd4576b7ac5b6e0326e42d432a692528ee
                                                                                      • Instruction ID: 45ed5e217c844315310d89a20c49d2eff003bfa8467b370b0955f01a950c20be
                                                                                      • Opcode Fuzzy Hash: a92cf0aa8bb23f57ccdc9442b6704fbd4576b7ac5b6e0326e42d432a692528ee
                                                                                      • Instruction Fuzzy Hash: 39E0EDA53541583ED240AABCBC52F9767DC9759754F008033B998D7241D4619A158BA8
                                                                                      APIs
                                                                                      • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451E7B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E68F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FormatMessage
                                                                                      • String ID:
                                                                                      • API String ID: 1306739567-0
                                                                                      • Opcode ID: 860b655ccada46b5013a8742cf2038536e52ba062f8b3e277fa769ce81e13b95
                                                                                      • Instruction ID: 7c82c80d86496392c3130c3e7de8882f0dfcc9e316fc406f93a4df2216b263d5
                                                                                      • Opcode Fuzzy Hash: 860b655ccada46b5013a8742cf2038536e52ba062f8b3e277fa769ce81e13b95
                                                                                      • Instruction Fuzzy Hash: 21E026617843112AF23514567C83B7F1A4E83C0B04FE4842B7B00DE3C3DAAEAD09429E
                                                                                      APIs
                                                                                      • CreateWindowExA.USER32(00000000,004235EC,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 00406329
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateWindow
                                                                                      • String ID:
                                                                                      • API String ID: 716092398-0
                                                                                      • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                      • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                                                      • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                      • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                                                      APIs
                                                                                      • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DC48
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Create
                                                                                      • String ID:
                                                                                      • API String ID: 2289755597-0
                                                                                      • Opcode ID: 4676b834bccda8ccd94f8a4f379db04665fbdc7bc7b85aab9c145464b6c6dbba
                                                                                      • Instruction ID: 5aa87c08ff8936fcaaa84cf50ff31e6a06e3de0a8084b04fc6442f63f77fe161
                                                                                      • Opcode Fuzzy Hash: 4676b834bccda8ccd94f8a4f379db04665fbdc7bc7b85aab9c145464b6c6dbba
                                                                                      • Instruction Fuzzy Hash: BDE07EB2600129AF9B40DE8DDC81EEB37ADAB1D350F404016FA08D7200C2B4EC519BB4
                                                                                      APIs
                                                                                      • FindClose.KERNEL32(00000000,000000FF,0046C888,00000000,0046D681,?,00000000,0046D6CA,?,00000000,0046D803,?,00000000,?,00000000), ref: 004536D2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseFind
                                                                                      • String ID:
                                                                                      • API String ID: 1863332320-0
                                                                                      • Opcode ID: 7d5519857b665cbbf82b8b35f439f608cfeada5da546942c6fbe9b0196f0527a
                                                                                      • Instruction ID: eca53ef0c4505d94b6e963a585f564cfd6265b0c9c03d819447d58a966c2af15
                                                                                      • Opcode Fuzzy Hash: 7d5519857b665cbbf82b8b35f439f608cfeada5da546942c6fbe9b0196f0527a
                                                                                      • Instruction Fuzzy Hash: 49E065705047004BCB24DF3A848121A7AD15F84321F08C56AAC58CB396E63DC4199616
                                                                                      APIs
                                                                                      • KiUserCallbackDispatcher.NTDLL(00490192,?,004901B4,?,?,00000000,00490192,?,?), ref: 0041460B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallbackDispatcherUser
                                                                                      • String ID:
                                                                                      • API String ID: 2492992576-0
                                                                                      • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                      • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                      • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                      • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                      APIs
                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406E8C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite
                                                                                      • String ID:
                                                                                      • API String ID: 3934441357-0
                                                                                      • Opcode ID: a86332fa630e211a890a26f820a456cfae7ee7da2a92b38f798d74d6102b1500
                                                                                      • Instruction ID: 5e9ef0cb41ef517b54198f539e7e4457f1ce254f1207c5e451c0fee893fabf4d
                                                                                      • Opcode Fuzzy Hash: a86332fa630e211a890a26f820a456cfae7ee7da2a92b38f798d74d6102b1500
                                                                                      • Instruction Fuzzy Hash: 3DD05B763082107AD620A55BAC44DA76BDCCFC5770F11063EB558C71C1D6309C01C675
                                                                                      APIs
                                                                                        • Part of subcall function 00423568: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042357D
                                                                                      • ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                                                        • Part of subcall function 00423598: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 004235B4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoParametersSystem$ShowWindow
                                                                                      • String ID:
                                                                                      • API String ID: 3202724764-0
                                                                                      • Opcode ID: 05b12f49588f72d468172bd8f1b82f2cb8bfea04f415fe28581d7e625a87d56b
                                                                                      • Instruction ID: 6e8deb3ed7ffb4c54c7bf11bddd21d475954711d807402a63cfbe74293682e9f
                                                                                      • Opcode Fuzzy Hash: 05b12f49588f72d468172bd8f1b82f2cb8bfea04f415fe28581d7e625a87d56b
                                                                                      • Instruction Fuzzy Hash: 03D05E123812743102107ABB280998B42A84D862AB388043BB54CDB202E91E8A81A1AC
                                                                                      APIs
                                                                                      • SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: TextWindow
                                                                                      • String ID:
                                                                                      • API String ID: 530164218-0
                                                                                      • Opcode ID: c34688b727229efcedc1f2997f44e421d28f5fd8d0fc977b3f59e8ef08dab085
                                                                                      • Instruction ID: a3b20f4c882213fa23ff33249cd178fa67041ba6f44abe22b1f00704e939aabb
                                                                                      • Opcode Fuzzy Hash: c34688b727229efcedc1f2997f44e421d28f5fd8d0fc977b3f59e8ef08dab085
                                                                                      • Instruction Fuzzy Hash: 4CD05EE27011702BCB01BBED54C4AC667CC8B8829AB1940BBF918EF257C638CE448398
                                                                                      APIs
                                                                                      • GetFileAttributesA.KERNEL32(00000000,00000000,00450CD7,00000000), ref: 0042CC0B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile
                                                                                      • String ID:
                                                                                      • API String ID: 3188754299-0
                                                                                      • Opcode ID: 696c079d1e659a807bafa968d47e5a3e4cea9be412662ea6c9d5bc89f686c2e0
                                                                                      • Instruction ID: 3d474633da5dc292dd1e9b08acfa0ea7ef8e6560f0837aa6ac70ccb6d2902417
                                                                                      • Opcode Fuzzy Hash: 696c079d1e659a807bafa968d47e5a3e4cea9be412662ea6c9d5bc89f686c2e0
                                                                                      • Instruction Fuzzy Hash: 42C08CE03022001A9A1465BF2CC511F42C8891827A3A41F37F53CE32D2D27E88A72428
                                                                                      APIs
                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00464010,00000000,00000000,00000000,0000000C,00000000), ref: 004633BC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallbackDispatcherUser
                                                                                      • String ID:
                                                                                      • API String ID: 2492992576-0
                                                                                      • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                      • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                      • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                      • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A834,0040CDE0,?,00000000,?), ref: 00406E45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: 4583f237df22b439ee34a1a79ec62ce4162a2c4c0b032f6043df3341da82d5c7
                                                                                      • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                                      • Opcode Fuzzy Hash: 4583f237df22b439ee34a1a79ec62ce4162a2c4c0b032f6043df3341da82d5c7
                                                                                      • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                                      APIs
                                                                                      • SetEndOfFile.KERNEL32(?,?,0045AA1E,00000000,0045ABA9,?,00000000,00000002,00000002), ref: 0045008F
                                                                                        • Part of subcall function 0044FE10: GetLastError.KERNEL32(0044FC2C,0044FED2,?,00000000,?,00492588,00000001,00000000,00000002,00000000,004926E9,?,?,00000005,00000000,0049271D), ref: 0044FE13
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLast
                                                                                      • String ID:
                                                                                      • API String ID: 734332943-0
                                                                                      • Opcode ID: 857a2ef5c33fcabe859aa2781a1519cd0b5291b8658590954683ea0b80d8510a
                                                                                      • Instruction ID: 5fd336f37560a3562a1f9a64c462d12011a30875c45227d907a3aa1d5a9b5e2e
                                                                                      • Opcode Fuzzy Hash: 857a2ef5c33fcabe859aa2781a1519cd0b5291b8658590954683ea0b80d8510a
                                                                                      • Instruction Fuzzy Hash: 35C04C65300110479F00A6BE95C1A1763D95F083063104866BA04CF257D669D8544A18
                                                                                      APIs
                                                                                      • SetCurrentDirectoryA.KERNEL32(00000000,?,00492516,00000000,004926E9,?,?,00000005,00000000,0049271D,?,?,00000000), ref: 0040721B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentDirectory
                                                                                      • String ID:
                                                                                      • API String ID: 1611563598-0
                                                                                      • Opcode ID: 116f646fca034a371e6a5c157b9d4efecc0deabf7e2bcd6bcee3aaaef58023bf
                                                                                      • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                                      • Opcode Fuzzy Hash: 116f646fca034a371e6a5c157b9d4efecc0deabf7e2bcd6bcee3aaaef58023bf
                                                                                      • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                                      APIs
                                                                                      • SetErrorMode.KERNEL32(?,0042E269), ref: 0042E25C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorMode
                                                                                      • String ID:
                                                                                      • API String ID: 2340568224-0
                                                                                      • Opcode ID: 7fad5ebe009d69c2099675b3e000f1c062c351dec5b4fb3cd432c824ae70c241
                                                                                      • Instruction ID: b0804e078831a813d9aa2463563e291fc03c9a68ee142e2bda9a21ea894dad8b
                                                                                      • Opcode Fuzzy Hash: 7fad5ebe009d69c2099675b3e000f1c062c351dec5b4fb3cd432c824ae70c241
                                                                                      • Instruction Fuzzy Hash: AFB09B7670C600DDB709D6D6745552D63D8D7C47207E145B7F001D2580D93C58004928
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 15102f7382d34fed751781a5022c55e4c44b9a191595ad2a6c0bef55f1a25186
                                                                                      • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                                                      • Opcode Fuzzy Hash: 15102f7382d34fed751781a5022c55e4c44b9a191595ad2a6c0bef55f1a25186
                                                                                      • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4ab2ea1812401c856e0cde9d0c05d2385f19664b13b8620937c6159cc733bb41
                                                                                      • Instruction ID: d201100ca80ec2f8cbfe3f56f823717f17ab321979d0d2a0415f45e630f29b9c
                                                                                      • Opcode Fuzzy Hash: 4ab2ea1812401c856e0cde9d0c05d2385f19664b13b8620937c6159cc733bb41
                                                                                      • Instruction Fuzzy Hash: CD518674E042459FDB00EFA9C482AAEBBF5EF49704F5041BEE500A7351DB789E41CB98
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0045C3D8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: 76fbdefa84b6e6646576d37aa534d5687847a51f5d406797e85eb89dfb11de70
                                                                                      • Instruction ID: 7994756c429da8fd341528b1115bd972bbd87915911d1c28c7d9b705713d9cd5
                                                                                      • Opcode Fuzzy Hash: 76fbdefa84b6e6646576d37aa534d5687847a51f5d406797e85eb89dfb11de70
                                                                                      • Instruction Fuzzy Hash: 641163716043089FD700AE55C8C1B4B3795AF8475AF05806AFD589B2C7DB38E848CB6A
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED14,?,004237FF,00423B7C,0041ED14), ref: 0041F352
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: fcc5bb2b52a6c868320fd556f825bdddd6823e0008dba192f27ebe0d5c6033d0
                                                                                      • Instruction ID: b4617262a153a49870252b9da37c83347ffd54b91452f412ea0f349906787434
                                                                                      • Opcode Fuzzy Hash: fcc5bb2b52a6c868320fd556f825bdddd6823e0008dba192f27ebe0d5c6033d0
                                                                                      • Instruction Fuzzy Hash: 361118742407099BC710DF59D881B86FBE5EB983A0B10C53BED688B385D378E945CBA9
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00000000,00451C35), ref: 00451C17
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1452528299-0
                                                                                      • Opcode ID: ab3637484c69f1e3a9289275503d70efe7f0fad7bd619f5ef2b617ba719f0b94
                                                                                      • Instruction ID: 9b046278fcf2f54c8895181bb84fa4e67d3ca0abe95595291a9aaadc5344c142
                                                                                      • Opcode Fuzzy Hash: ab3637484c69f1e3a9289275503d70efe7f0fad7bd619f5ef2b617ba719f0b94
                                                                                      • Instruction Fuzzy Hash: 7B017036604248AF8B11DF69AC105EEF7E8EB4932072082B7FC64C3352D7754D05D694
                                                                                      APIs
                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,0045C3CE), ref: 0045C307
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 1263568516-0
                                                                                      • Opcode ID: 1db0cbd719025b65296d728f72a94704870e37dd70070be8469bdcaf82232f5c
                                                                                      • Instruction ID: 3bb3114e2640d79ee9d1f6c6c170ec04299b672b50bb43f7844af23f30410e64
                                                                                      • Opcode Fuzzy Hash: 1db0cbd719025b65296d728f72a94704870e37dd70070be8469bdcaf82232f5c
                                                                                      • Instruction Fuzzy Hash: 6CD0E9B17557045FDF90EE798CC1B0237D8BB48741F5044666D04DB286E674E8048A18
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandle
                                                                                      • String ID:
                                                                                      • API String ID: 2962429428-0
                                                                                      • Opcode ID: ce9819a0c299784ac39983e171dfc3d0d3373cd0e3bd5e96c40e619c76bc7acf
                                                                                      • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                                      • Opcode Fuzzy Hash: ce9819a0c299784ac39983e171dfc3d0d3373cd0e3bd5e96c40e619c76bc7acf
                                                                                      • Instruction Fuzzy Hash:
                                                                                      APIs
                                                                                        • Part of subcall function 0044B038: GetVersionExA.KERNEL32(00000094), ref: 0044B055
                                                                                      • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F1A9,00493215), ref: 0044B0B3
                                                                                      • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B0CB
                                                                                      • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B0DD
                                                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B0EF
                                                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B101
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B113
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B125
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B137
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B149
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B15B
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B16D
                                                                                      • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B17F
                                                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B191
                                                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B1A3
                                                                                      • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B1B5
                                                                                      • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B1C7
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B1D9
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B1EB
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B1FD
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B20F
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B221
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B233
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B245
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B257
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B269
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B27B
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B28D
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B29F
                                                                                      • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B2B1
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B2C3
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B2D5
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B2E7
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B2F9
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B30B
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B31D
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B32F
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B341
                                                                                      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B353
                                                                                      • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B365
                                                                                      • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B377
                                                                                      • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B389
                                                                                      • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B39B
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B3AD
                                                                                      • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B3BF
                                                                                      • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B3D1
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B3E3
                                                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B3F5
                                                                                      • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B407
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoadVersion
                                                                                      • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                      • API String ID: 1968650500-2910565190
                                                                                      • Opcode ID: c0b6a7321769edc8054774f6e1a4a7cc645fbf4eca71de10d65dcd89c53b7c41
                                                                                      • Instruction ID: fe7ec38607b22d39bed663b2d58cef56837bfbcccade8a066643eb3a06087c6f
                                                                                      • Opcode Fuzzy Hash: c0b6a7321769edc8054774f6e1a4a7cc645fbf4eca71de10d65dcd89c53b7c41
                                                                                      • Instruction Fuzzy Hash: 3B91E3B0A40B50EFEF00EBF598C6A2636A8EB15B18B15457BB444EF296C778D804CF5D
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 00456DF3
                                                                                      • QueryPerformanceCounter.KERNEL32(02113858,00000000,00457086,?,?,02113858,00000000,?,00457782,?,02113858,00000000), ref: 00456DFC
                                                                                      • GetSystemTimeAsFileTime.KERNEL32(02113858,02113858), ref: 00456E06
                                                                                      • GetCurrentProcessId.KERNEL32(?,02113858,00000000,00457086,?,?,02113858,00000000,?,00457782,?,02113858,00000000), ref: 00456E0F
                                                                                      • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00456E85
                                                                                      • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02113858,02113858), ref: 00456E93
                                                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000000,00494AB0,00000003,00000000,00000000,00000000,00457042), ref: 00456EDB
                                                                                      • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00457031,?,00000000,C0000000,00000000,00494AB0,00000003,00000000,00000000,00000000,00457042), ref: 00456F14
                                                                                        • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                                                      • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00456FBD
                                                                                      • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00456FF3
                                                                                      • CloseHandle.KERNEL32(000000FF,00457038,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 0045702B
                                                                                        • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492A61,00000000), ref: 004520A7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                      • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                      • API String ID: 770386003-3271284199
                                                                                      • Opcode ID: 53890445295be3d3d31e52727ea490adc7ccb43dce6168ff118a2784991df1db
                                                                                      • Instruction ID: f6538b9f74412226b669bfece35f7f8b6dba794c0ca87bd4e30d5109fc12bfbf
                                                                                      • Opcode Fuzzy Hash: 53890445295be3d3d31e52727ea490adc7ccb43dce6168ff118a2784991df1db
                                                                                      • Instruction Fuzzy Hash: 49716470A04744AFDB20DB69DC41B5EBBF8AB05705F5084BAF908EB282D7785948CF69
                                                                                      APIs
                                                                                      • GetVersion.KERNEL32 ref: 0045B2B6
                                                                                      • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045B2D6
                                                                                      • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045B2E3
                                                                                      • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045B2F0
                                                                                      • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045B2FE
                                                                                        • Part of subcall function 0045B1A4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045B243,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045B21D
                                                                                      • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045B4F1,?,?,00000000), ref: 0045B3B7
                                                                                      • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045B4F1,?,?,00000000), ref: 0045B3C0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                      • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                      • API String ID: 59345061-4263478283
                                                                                      • Opcode ID: 1d806d9dda6068bb291ca6d6d76056618574950846b2f0729205e6ddb2b5ae31
                                                                                      • Instruction ID: c7fa785e835f4f31fbb174cc3c8bee0aea38d4a0e272f0ec20846287379b14aa
                                                                                      • Opcode Fuzzy Hash: 1d806d9dda6068bb291ca6d6d76056618574950846b2f0729205e6ddb2b5ae31
                                                                                      • Instruction Fuzzy Hash: 455174B1900608EFDB10DF99C845BEEB7B8EB49315F14806AF904B7382D7789945CFA9
                                                                                      APIs
                                                                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00473A17
                                                                                      • GetLastError.KERNEL32(?,?), ref: 00473A20
                                                                                      • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00473A6D
                                                                                      • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00473A91
                                                                                      • CloseHandle.KERNEL32(00000000,00473AC2,00000000,00000000,000000FF,000000FF,00000000,00473ABB,?,?,?), ref: 00473AB5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCodeErrorExecuteExitHandleLastMultipleObjectsProcessShellWait
                                                                                      • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                      • API String ID: 171997614-221126205
                                                                                      • Opcode ID: bdd79b2e264e3947b3271ce07b307c804a443899bf148872aca85f54ba098470
                                                                                      • Instruction ID: fd51c6fdc7ef3a5c4723c7cab516b72f55abc6f577cd61f87c3a1e5de1d1d72d
                                                                                      • Opcode Fuzzy Hash: bdd79b2e264e3947b3271ce07b307c804a443899bf148872aca85f54ba098470
                                                                                      • Instruction Fuzzy Hash: C92167B0A00204ABDB14EFA98943ADD76E8EF05709F50843BF548F62C2DB7C9A04975D
                                                                                      APIs
                                                                                      • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422964
                                                                                      • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422B2E), ref: 00422974
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSendShowWindow
                                                                                      • String ID:
                                                                                      • API String ID: 1631623395-0
                                                                                      • Opcode ID: fa9062f2f8c7c292f6ba47f23b62071bd1c02060dccc7d557ee2b61b6739a24d
                                                                                      • Instruction ID: 22a298226f26ad5282d2b06c056c5494fcfa573f7ff451a3aba74327ab4f92ef
                                                                                      • Opcode Fuzzy Hash: fa9062f2f8c7c292f6ba47f23b62071bd1c02060dccc7d557ee2b61b6739a24d
                                                                                      • Instruction Fuzzy Hash: A6917271B04214FFD710EBA9DA86F9D77F4AB09314F5104BAF504AB3A2C778AE409B58
                                                                                      APIs
                                                                                      • IsIconic.USER32(?), ref: 00418303
                                                                                      • GetWindowPlacement.USER32(?,0000002C), ref: 00418320
                                                                                      • GetWindowRect.USER32(?), ref: 0041833C
                                                                                      • GetWindowLongA.USER32(?,000000F0), ref: 0041834A
                                                                                      • GetWindowLongA.USER32(?,000000F8), ref: 0041835F
                                                                                      • ScreenToClient.USER32(00000000), ref: 00418368
                                                                                      • ScreenToClient.USER32(00000000,?), ref: 00418373
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                      • String ID: ,
                                                                                      • API String ID: 2266315723-3772416878
                                                                                      • Opcode ID: 76ed797ea6865fddbc3593e7458191c6aaa261637689223d055d8f073444f388
                                                                                      • Instruction ID: 9cf88c6662a8b54f2d940af1896da5675c8924d24fa9a5d7825e36bf04e718ba
                                                                                      • Opcode Fuzzy Hash: 76ed797ea6865fddbc3593e7458191c6aaa261637689223d055d8f073444f388
                                                                                      • Instruction Fuzzy Hash: 40112B71505201AFDB00DF69C885F9B77E8AF49314F18067EBD58DB286C739D900CB69
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00000028), ref: 00453FDF
                                                                                      • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00453FE5
                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00453FFE
                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00454025
                                                                                      • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045402A
                                                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 0045403B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                      • String ID: SeShutdownPrivilege
                                                                                      • API String ID: 107509674-3733053543
                                                                                      • Opcode ID: 38b00b688662a0d9bbbecbe7d33395a35eb7a17cbac0a46106fc5b3172d15a50
                                                                                      • Instruction ID: fefb7ae41868014354d83cb3ae28757c4cdc7dcc71e7b198ec4e0078f4c74e40
                                                                                      • Opcode Fuzzy Hash: 38b00b688662a0d9bbbecbe7d33395a35eb7a17cbac0a46106fc5b3172d15a50
                                                                                      • Instruction Fuzzy Hash: 06F06270694702B5E620AA758C07F6B25989B80F8DF60492ABE45EF1C3D6BCC54C4A2A
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045B86D
                                                                                      • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045B87D
                                                                                      • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045B88D
                                                                                      • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047A5DB,00000000,0047A604), ref: 0045B8B2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$CryptVersion
                                                                                      • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                      • API String ID: 1951258720-508647305
                                                                                      • Opcode ID: c3c7ec0b1ce4a4f9ebe2d8e394cd6736047279cae241cd1696ff5e4f0e7e87a0
                                                                                      • Instruction ID: 302474af057a75e6aa59db1b8817eaeab706bde5883f342fd947c8368cb819cc
                                                                                      • Opcode Fuzzy Hash: c3c7ec0b1ce4a4f9ebe2d8e394cd6736047279cae241cd1696ff5e4f0e7e87a0
                                                                                      • Instruction Fuzzy Hash: BFF0F9B0529700DEEB06EF76AC866623699E79032AF14D43BE408961A2D77C0448CF1C
                                                                                      APIs
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,0049289E,?,?,00000000,00496628,?,00492A28,00000000,00492A7C,?,?,00000000,00496628), ref: 004927B7
                                                                                      • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049283A
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,00492876,?,00000000,?,00000000,0049289E,?,?,00000000,00496628,?,00492A28,00000000), ref: 00492852
                                                                                      • FindClose.KERNEL32(000000FF,0049287D,00492876,?,00000000,?,00000000,0049289E,?,?,00000000,00496628,?,00492A28,00000000,00492A7C), ref: 00492870
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFind$AttributesCloseFirstNext
                                                                                      • String ID: isRS-$isRS-???.tmp
                                                                                      • API String ID: 134685335-3422211394
                                                                                      • Opcode ID: 70fea279a0487c66a379aa7ff36a45d08903b4abdbe9169b97591ec596f32377
                                                                                      • Instruction ID: 6f3af90e7e4d79464d1657adb4957f5333b5dfcd3ed3f620ee887a0d658b233a
                                                                                      • Opcode Fuzzy Hash: 70fea279a0487c66a379aa7ff36a45d08903b4abdbe9169b97591ec596f32377
                                                                                      • Instruction Fuzzy Hash: A5319471900618BFDF10EF66CD41ACEBBBCDB49304F5085F7A808A32A1D7789E458E58
                                                                                      APIs
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,?,?,?,00000000,00478B12,?,00000000,?,00000000,?,00478C56,00000000,00000000), ref: 004788AD
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,004789BD,?,00000000,?,?,?,?,00000000,00478B12,?,00000000,?,00000000), ref: 00478999
                                                                                      • FindClose.KERNEL32(000000FF,004789C4,004789BD,?,00000000,?,?,?,?,00000000,00478B12,?,00000000,?,00000000), ref: 004789B7
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,?,00000000,00478B12,?,00000000,?,00000000,?,00478C56,00000000), ref: 00478A10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$File$First$CloseNext
                                                                                      • String ID:
                                                                                      • API String ID: 2001080981-0
                                                                                      • Opcode ID: bf4e0802f79d6ecb0b26fe8947a890451376e871c9cd550310497b4db5b6158c
                                                                                      • Instruction ID: c53e02efa538cd00ed8c6064e36d24adcac4933ff0a83cd0056e21b928a08691
                                                                                      • Opcode Fuzzy Hash: bf4e0802f79d6ecb0b26fe8947a890451376e871c9cd550310497b4db5b6158c
                                                                                      • Instruction Fuzzy Hash: CD71607090020DAFCF11EFA5CC45ADFBBB9EF49304F5084AAE508A7291DB399A45CF59
                                                                                      APIs
                                                                                      • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 0045587D
                                                                                      • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004558A4
                                                                                      • SetForegroundWindow.USER32(?), ref: 004558B5
                                                                                      • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00455B8F,?,00000000,00455BCB), ref: 00455B7A
                                                                                      Strings
                                                                                      • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004559FA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                      • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                      • API String ID: 2236967946-3182603685
                                                                                      • Opcode ID: aba927f1f309b32fe38766258577f601f314c8aed9c78afadeeb596dcf30424a
                                                                                      • Instruction ID: 78b58341f63533b3ae22fdc0b35f2ff7933112878ccc3eccec269f40d3d6be6d
                                                                                      • Opcode Fuzzy Hash: aba927f1f309b32fe38766258577f601f314c8aed9c78afadeeb596dcf30424a
                                                                                      • Instruction Fuzzy Hash: 0291C234604604EFD715CF65D965F6ABBF9EB48714F2180BAEC0497792C739AE04CB18
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,0045492C), ref: 00454828
                                                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045482E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                      • API String ID: 1646373207-3712701948
                                                                                      • Opcode ID: eac562a1060f7fadf38ecb16a1882514189a9ad3f183d6e31b82e056aa49acf1
                                                                                      • Instruction ID: 4ed4d427c84f2e0797dfbcbbf1775a844099e9a297d380e2836bd8fb6971dfff
                                                                                      • Opcode Fuzzy Hash: eac562a1060f7fadf38ecb16a1882514189a9ad3f183d6e31b82e056aa49acf1
                                                                                      • Instruction Fuzzy Hash: DA316275A04249AFCF01EFA5C8829EFB7B8EF89704F504567E800F7252D6385D098B68
                                                                                      APIs
                                                                                      • IsIconic.USER32(?), ref: 00417C7F
                                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417C9D
                                                                                      • GetWindowPlacement.USER32(?,0000002C), ref: 00417CD3
                                                                                      • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417CFA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Placement$Iconic
                                                                                      • String ID: ,
                                                                                      • API String ID: 568898626-3772416878
                                                                                      • Opcode ID: 81a48e547fa398d3f0e332d3c5732c978cb07eabcf612ef17b70e18ae1a1ab95
                                                                                      • Instruction ID: c7e48a005123f112bfb3c773aae920d88014dc0855fb7fe4f04d55f6c4297c8c
                                                                                      • Opcode Fuzzy Hash: 81a48e547fa398d3f0e332d3c5732c978cb07eabcf612ef17b70e18ae1a1ab95
                                                                                      • Instruction Fuzzy Hash: 92213E71604204ABCF00EF69D8C4ADA77B8AF48314F11456AFD18DF346D678E984CBA8
                                                                                      APIs
                                                                                      • SetErrorMode.KERNEL32(00000001,00000000,00460751), ref: 004605C5
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,00460724,?,00000001,00000000,00460751), ref: 00460654
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,00460706,?,00000000,?,00000000,00460724,?,00000001,00000000,00460751), ref: 004606E6
                                                                                      • FindClose.KERNEL32(000000FF,0046070D,00460706,?,00000000,?,00000000,00460724,?,00000001,00000000,00460751), ref: 00460700
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$File$CloseErrorFirstModeNext
                                                                                      • String ID:
                                                                                      • API String ID: 4011626565-0
                                                                                      • Opcode ID: 8e5f21022fae35bd05caf680941799b374ea027a06ecb90817f05a91b3dc2be9
                                                                                      • Instruction ID: f78dcee57c625dac1728093300786459247b71741faca452f92d1a4d7efbbe15
                                                                                      • Opcode Fuzzy Hash: 8e5f21022fae35bd05caf680941799b374ea027a06ecb90817f05a91b3dc2be9
                                                                                      • Instruction Fuzzy Hash: D941B970A006189FDB11EF65DC85ADFB7B8EB88705F5044BAF804E7391D63C9E488E59
                                                                                      APIs
                                                                                      • SetErrorMode.KERNEL32(00000001,00000000,00460BF7), ref: 00460A85
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,00460BC2,?,00000001,00000000,00460BF7), ref: 00460ACB
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,00460BA4,?,00000000,?,00000000,00460BC2,?,00000001,00000000,00460BF7), ref: 00460B80
                                                                                      • FindClose.KERNEL32(000000FF,00460BAB,00460BA4,?,00000000,?,00000000,00460BC2,?,00000001,00000000,00460BF7), ref: 00460B9E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$File$CloseErrorFirstModeNext
                                                                                      • String ID:
                                                                                      • API String ID: 4011626565-0
                                                                                      • Opcode ID: 49e9851897b8f681d322c96bb90846bd68f017f54ff683acd975a5c922cbe8b7
                                                                                      • Instruction ID: c4fca8719043302f1557867009f5b54629f0d04ae6016422a46977757255b98a
                                                                                      • Opcode Fuzzy Hash: 49e9851897b8f681d322c96bb90846bd68f017f54ff683acd975a5c922cbe8b7
                                                                                      • Instruction Fuzzy Hash: D7417631A00618DFCB10EFA5DC859DFB7B8EB88709F5085A6F804A7341E7789E448E59
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451B47,00000000,00451B68), ref: 0042E6FE
                                                                                      • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E729
                                                                                      • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451B47,00000000,00451B68), ref: 0042E736
                                                                                      • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451B47,00000000,00451B68), ref: 0042E73E
                                                                                      • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451B47,00000000,00451B68), ref: 0042E744
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                      • String ID:
                                                                                      • API String ID: 1177325624-0
                                                                                      • Opcode ID: b398f5f594d3ce364fdf5cd670d1d6f1cfc7debce29cf4bfe02d4251d0372630
                                                                                      • Instruction ID: 405047736e0f3db58adf1e262a5124b738154ad7abc3b976f47152011cf6baa3
                                                                                      • Opcode Fuzzy Hash: b398f5f594d3ce364fdf5cd670d1d6f1cfc7debce29cf4bfe02d4251d0372630
                                                                                      • Instruction Fuzzy Hash: 12F0F0713917207AF620B1BA6CC6F7B018CC7C5B68F10823ABB04FF1C1D9A84C06056D
                                                                                      APIs
                                                                                      • IsIconic.USER32(?), ref: 0047E0E6
                                                                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 0047E104
                                                                                      • ShowWindow.USER32(00000000,00000005,00000000,000000F0,00497030,0047D932,0047D966,00000000,0047D986,?,?,00000001,00497030), ref: 0047E126
                                                                                      • ShowWindow.USER32(00000000,00000000,00000000,000000F0,00497030,0047D932,0047D966,00000000,0047D986,?,?,00000001,00497030), ref: 0047E13A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Show$IconicLong
                                                                                      • String ID:
                                                                                      • API String ID: 2754861897-0
                                                                                      • Opcode ID: f6c937e62bd4f7f33b8cff1129e0ff9e0c9ea1576419266ffb873d417130a402
                                                                                      • Instruction ID: c92ae80fdea3dbb9ecd522712915d334841aed4b7b9fd6eda1dbd96f1c302fca
                                                                                      • Opcode Fuzzy Hash: f6c937e62bd4f7f33b8cff1129e0ff9e0c9ea1576419266ffb873d417130a402
                                                                                      • Instruction Fuzzy Hash: 910171702252509ADB00B776CC46BDB2396AB19344F4486BBF8489B3A3CA7D9C61974C
                                                                                      APIs
                                                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,0045F0DC), ref: 0045F060
                                                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,0045F0BC,?,00000000,?,00000000,0045F0DC), ref: 0045F09C
                                                                                      • FindClose.KERNEL32(000000FF,0045F0C3,0045F0BC,?,00000000,?,00000000,0045F0DC), ref: 0045F0B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$File$CloseFirstNext
                                                                                      • String ID:
                                                                                      • API String ID: 3541575487-0
                                                                                      • Opcode ID: 28630f636b04da4fcdbc8bf603e3cd822730a77496e846d3c01d6dea91b4df37
                                                                                      • Instruction ID: 68591aebe15be66c02bfe18b1190825c6ab69d9b7e21385b208dddf45066949f
                                                                                      • Opcode Fuzzy Hash: 28630f636b04da4fcdbc8bf603e3cd822730a77496e846d3c01d6dea91b4df37
                                                                                      • Instruction Fuzzy Hash: 6D21DB315047086EDB11EB65CC41ADEBBACDB49714F5484F7BC08D35E3E6389E4C895A
                                                                                      APIs
                                                                                      • IsIconic.USER32(?), ref: 00424154
                                                                                      • SetActiveWindow.USER32(?,?,?,00468BB4), ref: 00424161
                                                                                        • Part of subcall function 004235BC: ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                                                        • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021125AC,0042417A,?,?,?,00468BB4), ref: 00423ABF
                                                                                      • SetFocus.USER32(00000000,?,?,?,00468BB4), ref: 0042418E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$ActiveFocusIconicShow
                                                                                      • String ID:
                                                                                      • API String ID: 649377781-0
                                                                                      • Opcode ID: bf39fc93c20dd362814a915e3816c2be519e9f0d9e4d58152530bfc1c9f789b4
                                                                                      • Instruction ID: 4136aac35a779e4733478972a6ab5bc4469f39141bd8f2cff661810d574da02b
                                                                                      • Opcode Fuzzy Hash: bf39fc93c20dd362814a915e3816c2be519e9f0d9e4d58152530bfc1c9f789b4
                                                                                      • Instruction Fuzzy Hash: 3EF03A717001208BDB40AFAA98C4B9633A8AF48304B55017BBD09EF34BCA7CDC5187A8
                                                                                      APIs
                                                                                      • IsIconic.USER32(?), ref: 00417C7F
                                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417C9D
                                                                                      • GetWindowPlacement.USER32(?,0000002C), ref: 00417CD3
                                                                                      • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417CFA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Placement$Iconic
                                                                                      • String ID:
                                                                                      • API String ID: 568898626-0
                                                                                      • Opcode ID: b8fbe12c44fb062a6cac749eb6b5fd61645d1f9f5889301bfb76636b936bc9d1
                                                                                      • Instruction ID: f0313cfea0d4087130c3a657ee055cc65a4736f61d4b278e94d42609036002a6
                                                                                      • Opcode Fuzzy Hash: b8fbe12c44fb062a6cac749eb6b5fd61645d1f9f5889301bfb76636b936bc9d1
                                                                                      • Instruction Fuzzy Hash: 31015A31204104ABDF10EE6A98C5EEA73A8AF44324F114166FD08CF342E638EC8086A8
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CaptureIconic
                                                                                      • String ID:
                                                                                      • API String ID: 2277910766-0
                                                                                      • Opcode ID: af1c5b43412e2fcaa88ec6dbe6a8b705b794b180b560b7f19973f3177c796014
                                                                                      • Instruction ID: 516534a0d685a41b5289b303ed97122a4deaa6af678778b669afb1f0a2bf06d6
                                                                                      • Opcode Fuzzy Hash: af1c5b43412e2fcaa88ec6dbe6a8b705b794b180b560b7f19973f3177c796014
                                                                                      • Instruction Fuzzy Hash: 80F04471B04602A7DB20E72EC8C5AA762F69F44394B54443FF415C7B96EA7CDCC48758
                                                                                      APIs
                                                                                      • IsIconic.USER32(?), ref: 0042410B
                                                                                        • Part of subcall function 004239F4: EnumWindows.USER32(0042398C), ref: 00423A18
                                                                                        • Part of subcall function 004239F4: GetWindow.USER32(?,00000003), ref: 00423A2D
                                                                                        • Part of subcall function 004239F4: GetWindowLongA.USER32(?,000000EC), ref: 00423A3C
                                                                                        • Part of subcall function 004239F4: SetWindowPos.USER32(00000000,004240CC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042411B,?,?,00423CE3), ref: 00423A72
                                                                                      • SetActiveWindow.USER32(?,?,?,00423CE3,00000000,004240CC), ref: 0042411F
                                                                                        • Part of subcall function 004235BC: ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                      • String ID:
                                                                                      • API String ID: 2671590913-0
                                                                                      • Opcode ID: 42e4936c4a6647b65b5ab24117e0ac4ae5d8008d356746b3415a205c164669c5
                                                                                      • Instruction ID: b8e4b42960b6b3797255afb6d30997fccd36cf0c86298b6f3b138aeb4614201e
                                                                                      • Opcode Fuzzy Hash: 42e4936c4a6647b65b5ab24117e0ac4ae5d8008d356746b3415a205c164669c5
                                                                                      • Instruction Fuzzy Hash: 76E0E5A0300100C7EB00AFAAD8C9B9672A9BB48304F5501BABC08CF24BD6B8C8948724
                                                                                      APIs
                                                                                      • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,00412745), ref: 00412733
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: NtdllProc_Window
                                                                                      • String ID:
                                                                                      • API String ID: 4255912815-0
                                                                                      • Opcode ID: ccb3f07b2fee23e1b7d0b9fe211690240d667b5ade3c407fcf90e85793529408
                                                                                      • Instruction ID: 7676943622bfa1b87a175b7a8473920ed7b4936c8d574fb73453cf2521b2b913
                                                                                      • Opcode Fuzzy Hash: ccb3f07b2fee23e1b7d0b9fe211690240d667b5ade3c407fcf90e85793529408
                                                                                      • Instruction Fuzzy Hash: 5751D3356042059FC710DF5AD681A9BF3E5FF98304B3582ABE814C73A5D6B8AD92874C
                                                                                      APIs
                                                                                      • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00474076
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: NtdllProc_Window
                                                                                      • String ID:
                                                                                      • API String ID: 4255912815-0
                                                                                      • Opcode ID: 25d2fed37fc004c0ef9d7e1e532679906a7dfcc26d9c4c4e0f977566c6f286e0
                                                                                      • Instruction ID: 893271b3bcd24fcb62a5a78660203d6d155b33e0871f9808868e069105ad9bad
                                                                                      • Opcode Fuzzy Hash: 25d2fed37fc004c0ef9d7e1e532679906a7dfcc26d9c4c4e0f977566c6f286e0
                                                                                      • Instruction Fuzzy Hash: E8415779A04144DFCB10CF99C2808AAB7F9EB88311B25C592E94CDB745D339EE41EB98
                                                                                      APIs
                                                                                      • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045B923
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CryptFour
                                                                                      • String ID:
                                                                                      • API String ID: 2153018856-0
                                                                                      • Opcode ID: 2fd5046d53dc597d3e4d98d458f148574003c2ec4f4f0757a2eee833ca150b3b
                                                                                      • Instruction ID: 2225761bf594105b04891f9a979b45a9a4731abcd3a6ed3030aefe2a2354edc5
                                                                                      • Opcode Fuzzy Hash: 2fd5046d53dc597d3e4d98d458f148574003c2ec4f4f0757a2eee833ca150b3b
                                                                                      • Instruction Fuzzy Hash: C7C09BF601420CBF65005795ECC9CB7F75CE6586647408126F6044210195716C108674
                                                                                      APIs
                                                                                      • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046994F), ref: 0045B936
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CryptFour
                                                                                      • String ID:
                                                                                      • API String ID: 2153018856-0
                                                                                      • Opcode ID: c27a93e1bdfdde7edc9fcc879cc72405f18f208b3af26568a1f388ef4ce3250e
                                                                                      • Instruction ID: 96b9a57d22d70392ad1d1cde2f2ee6f5b4e57433d8ae25836dc8224d98b85447
                                                                                      • Opcode Fuzzy Hash: c27a93e1bdfdde7edc9fcc879cc72405f18f208b3af26568a1f388ef4ce3250e
                                                                                      • Instruction Fuzzy Hash: A7A002B0A94300BAFD2157605D0EF67262C97D0F15F2084657201A91D085A46400C63C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3445483633.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3445437690.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3445513542.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_10000000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                      • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                      • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                      • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3445483633.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3445437690.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3445513542.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_10000000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                      • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                      • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                      • Instruction Fuzzy Hash:
                                                                                      APIs
                                                                                      • CreateMutexA.KERNEL32(00494AA4,00000001,00000000,00000000,004568ED,?,?,?,00000001,?,00456B07,00000000,00456B1D,?,00000000,00496628), ref: 00456605
                                                                                      • CreateFileMappingA.KERNEL32(000000FF,00494AA4,00000004,00000000,00002018,00000000), ref: 0045663D
                                                                                      • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,004568C3,?,00494AA4,00000001,00000000,00000000,004568ED,?,?,?), ref: 00456664
                                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456771
                                                                                      • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,004568C3,?,00494AA4,00000001,00000000,00000000,004568ED), ref: 004566C9
                                                                                        • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492A61,00000000), ref: 004520A7
                                                                                      • CloseHandle.KERNEL32(00456B07,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456788
                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00456B07,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004567C1
                                                                                      • GetLastError.KERNEL32(00000000,000000FF,00456B07,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004567D3
                                                                                      • UnmapViewOfFile.KERNEL32(00000000,004568CA,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004568A5
                                                                                      • CloseHandle.KERNEL32(00000000,004568CA,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004568B4
                                                                                      • CloseHandle.KERNEL32(00000000,004568CA,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004568BD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                                                      • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                                                      • API String ID: 4012871263-351310198
                                                                                      • Opcode ID: 2d7d41f1dc95c0e97e8351de386188b607b902f05f624e0ced809bd65a677759
                                                                                      • Instruction ID: 980461e75233d27168dbefb0458f3d7e1823a55311cdbdb2a0391f25a35d7111
                                                                                      • Opcode Fuzzy Hash: 2d7d41f1dc95c0e97e8351de386188b607b902f05f624e0ced809bd65a677759
                                                                                      • Instruction Fuzzy Hash: 32918170E002159FDB10EBA9C845B9EB7B4EF48305F91856BF914EB382DB789908CF59
                                                                                      APIs
                                                                                      • GetVersion.KERNEL32(?,00418F60,00000000,?,?,?,00000001), ref: 0041F096
                                                                                      • SetErrorMode.KERNEL32(00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0B2
                                                                                      • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0BE
                                                                                      • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0CC
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F0FC
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F125
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F13A
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F14F
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F164
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F179
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F18E
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1A3
                                                                                      • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1B8
                                                                                      • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F1CD
                                                                                      • FreeLibrary.KERNEL32(00000001,?,00418F60,00000000,?,?,?,00000001), ref: 0041F1DF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                      • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                      • API String ID: 2323315520-3614243559
                                                                                      • Opcode ID: 3ee75083f87a6e9960b975f8ce9b4bab73ebc8e6f4ff35a6c1ea5a687f8926a0
                                                                                      • Instruction ID: da08133687b7634b50b6c6a847516dd753fa1eb4508864759417a9d87976edef
                                                                                      • Opcode Fuzzy Hash: 3ee75083f87a6e9960b975f8ce9b4bab73ebc8e6f4ff35a6c1ea5a687f8926a0
                                                                                      • Instruction Fuzzy Hash: 3531F0B1640740EBDB00EBF5EC86E653654F768B28756093BB608DB162D77D488ACB1C
                                                                                      Strings
                                                                                      • Setup version: Inno Setup version 5.3.5 (a), xrefs: 00491898
                                                                                      • DeinitializeUninstall, xrefs: 00491F3A
                                                                                      • Removed all? %s, xrefs: 00491CFA
                                                                                      • Uninstall, xrefs: 0049184B
                                                                                      • Will restart because UninstallNeedRestart returned True., xrefs: 00491D80
                                                                                      • Need to restart Windows? %s, xrefs: 00491DD1
                                                                                      • Cannot find utCompiledCode record for this version of the uninstaller, xrefs: 00491A36
                                                                                      • utCompiledCode[1] is invalid, xrefs: 00491A71
                                                                                      • Not calling UninstallNeedRestart because a restart has already been deemed necessary., xrefs: 00491DAF
                                                                                      • Install was done in 64-bit mode but not running 64-bit Windows now, xrefs: 00491AAB
                                                                                      • InitializeUninstall, xrefs: 00491BF0
                                                                                      • UninstallNeedRestart, xrefs: 00491D30, 00491D69
                                                                                      • Original Uninstall EXE: , xrefs: 004918A2
                                                                                      • Uninstall DAT: , xrefs: 004918C5
                                                                                      • InitializeUninstall returned False; aborting., xrefs: 00491C28
                                                                                      • Will not restart Windows automatically., xrefs: 00491EA4
                                                                                      • Uninstall command line: , xrefs: 004918E8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Long$Show
                                                                                      • String ID: Cannot find utCompiledCode record for this version of the uninstaller$DeinitializeUninstall$InitializeUninstall$InitializeUninstall returned False; aborting.$Install was done in 64-bit mode but not running 64-bit Windows now$Need to restart Windows? %s$Not calling UninstallNeedRestart because a restart has already been deemed necessary.$Original Uninstall EXE: $Removed all? %s$Setup version: Inno Setup version 5.3.5 (a)$Uninstall$Uninstall DAT: $Uninstall command line: $UninstallNeedRestart$Will not restart Windows automatically.$Will restart because UninstallNeedRestart returned True.$utCompiledCode[1] is invalid
                                                                                      • API String ID: 3609083571-1972832509
                                                                                      • Opcode ID: 564fb5d3747994d23ef970b5a2b0d3f85f6acd01b6bbcc9d08c4d2da2b19c3a8
                                                                                      • Instruction ID: 6596ef0c965ed04d70404abd425b2fb86aee653cd75455762a8c83b1d9d07689
                                                                                      • Opcode Fuzzy Hash: 564fb5d3747994d23ef970b5a2b0d3f85f6acd01b6bbcc9d08c4d2da2b19c3a8
                                                                                      • Instruction Fuzzy Hash: CE12AC34A54245AFDF11EB65EC42B9E7FA5AB19308F10807BF800A73B2CB789845CB5D
                                                                                      APIs
                                                                                      • 73E9A570.USER32(00000000,?,0041A8B4,?), ref: 0041C9B0
                                                                                      • 73EA4C40.GDI32(?,00000000,?,0041A8B4,?), ref: 0041C9BC
                                                                                      • 73EA6180.GDI32(0041A8B4,?,00000001,00000001,00000000,00000000,0041CBD2,?,?,00000000,?,0041A8B4,?), ref: 0041C9E0
                                                                                      • 73EA4C00.GDI32(?,0041A8B4,?,00000000,0041CBD2,?,?,00000000,?,0041A8B4,?), ref: 0041C9F0
                                                                                      • SelectObject.GDI32(0041CDAC,00000000), ref: 0041CA0B
                                                                                      • FillRect.USER32(0041CDAC,?,?), ref: 0041CA46
                                                                                      • SetTextColor.GDI32(0041CDAC,00000000), ref: 0041CA5B
                                                                                      • SetBkColor.GDI32(0041CDAC,00000000), ref: 0041CA72
                                                                                      • PatBlt.GDI32(0041CDAC,00000000,00000000,0041A8B4,?,00FF0062), ref: 0041CA88
                                                                                      • 73EA4C40.GDI32(?,00000000,0041CB8B,?,0041CDAC,00000000,?,0041A8B4,?,00000000,0041CBD2,?,?,00000000,?,0041A8B4), ref: 0041CA9B
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 0041CACC
                                                                                      • 73E98830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B,?,0041CDAC,00000000,?,0041A8B4), ref: 0041CAE4
                                                                                      • 73E922A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B,?,0041CDAC,00000000,?), ref: 0041CAED
                                                                                      • 73E98830.GDI32(0041CDAC,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B), ref: 0041CAFC
                                                                                      • 73E922A0.GDI32(0041CDAC,0041CDAC,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B), ref: 0041CB05
                                                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0041CB1E
                                                                                      • SetBkColor.GDI32(00000000,00000000), ref: 0041CB35
                                                                                      • 73EA4D40.GDI32(0041CDAC,00000000,00000000,0041A8B4,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CB7A,?,?,00000000), ref: 0041CB51
                                                                                      • SelectObject.GDI32(00000000,?), ref: 0041CB5E
                                                                                      • DeleteDC.GDI32(00000000), ref: 0041CB74
                                                                                        • Part of subcall function 00419FC8: GetSysColor.USER32(?), ref: 00419FD2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$ObjectSelect$E922E98830Text$A570A6180DeleteFillRect
                                                                                      • String ID:
                                                                                      • API String ID: 1952589944-0
                                                                                      • Opcode ID: d7b92da64cecfd48f0a2b1e7f5bec81e0b40094dab39069241f93e3b0f0d639f
                                                                                      • Instruction ID: 7128b10ae0d2f5501f58bad1f60f679124a592cf14607d549707b49f1954e982
                                                                                      • Opcode Fuzzy Hash: d7b92da64cecfd48f0a2b1e7f5bec81e0b40094dab39069241f93e3b0f0d639f
                                                                                      • Instruction Fuzzy Hash: 5961FC71A44609ABDF10EBE5DC86FAFB7B8EF48704F10446AF504E7281C67CA9418B69
                                                                                      APIs
                                                                                      • AllocateAndInitializeSid.ADVAPI32(00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DEF6
                                                                                      • GetVersion.KERNEL32(00000000,0042E0A0,?,00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF13
                                                                                      • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E0A0,?,00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF2C
                                                                                      • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DF32
                                                                                      • FreeSid.ADVAPI32(00000000,0042E0A7,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E09A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressAllocateFreeHandleInitializeModuleProcVersion
                                                                                      • String ID: CheckTokenMembership$advapi32.dll
                                                                                      • API String ID: 1717332306-1888249752
                                                                                      • Opcode ID: 59bbf30f185a9ae2ec61c265cb76b637c59ffee8dc596189c0408cef68f3f34f
                                                                                      • Instruction ID: 5045d4bdae095839e21654112f0de3b8f2816e6eca6f617d5415efb28b53f152
                                                                                      • Opcode Fuzzy Hash: 59bbf30f185a9ae2ec61c265cb76b637c59ffee8dc596189c0408cef68f3f34f
                                                                                      • Instruction Fuzzy Hash: 6151C571B44629AEDB10EAE69C42F7F77ECEB09304F94447BB500F7282C5BC9806866D
                                                                                      APIs
                                                                                      • ShowWindow.USER32(?,00000005,00000000,00492E24,?,?,00000000,?,00000000,00000000,?,00493165,00000000,0049316F,?,00000000), ref: 00492B0F
                                                                                      • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00492E24,?,?,00000000,?,00000000,00000000,?,00493165,00000000), ref: 00492B22
                                                                                      • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00492E24,?,?,00000000,?,00000000,00000000), ref: 00492B32
                                                                                      • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00492B53
                                                                                      • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00492E24,?,?,00000000,?,00000000), ref: 00492B63
                                                                                        • Part of subcall function 0042D328: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3B6,?,?,00000000,?,?,00492520,00000000,004926E9,?,?,00000005), ref: 0042D35D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                      • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup$e1I$o1I
                                                                                      • API String ID: 2000705611-221793176
                                                                                      • Opcode ID: 93f4319d652df31d1491f7e58c9920bd5a7ef255fec07566d47bc37a90253f49
                                                                                      • Instruction ID: 4be49199d801b1cb5a3f4bb92d7f292d3e3738ea6ecad4381c70a4705d363757
                                                                                      • Opcode Fuzzy Hash: 93f4319d652df31d1491f7e58c9920bd5a7ef255fec07566d47bc37a90253f49
                                                                                      • Instruction Fuzzy Hash: 3891D434A04205AFDF11EBA5D956BAF7FB4EB09304F918477F400AB692C6BD9C05CB19
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00000000,0045907E,?,?,?,?,?,00000006,?,00000000,00491FBA,?,00000000,0049205D), ref: 00458F30
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast
                                                                                      • String ID: .chm$.chw$.fts$.gid$.hlp$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                      • API String ID: 1452528299-1593206319
                                                                                      • Opcode ID: 5d7b9d7c30f83f3247b130719882f36e307d81f231b67c3dd7c11efa3abf157e
                                                                                      • Instruction ID: e4eb3b4405a0979e1a2c77286c885a36d1837fd04eb9654633cb4fd66a7308d3
                                                                                      • Opcode Fuzzy Hash: 5d7b9d7c30f83f3247b130719882f36e307d81f231b67c3dd7c11efa3abf157e
                                                                                      • Instruction Fuzzy Hash: 7B618E30B042549BDB10EB69C8827AE77A9AB48715F50486FF801EB383CB789D49C799
                                                                                      APIs
                                                                                      • 73EA4C40.GDI32(00000000,?,00000000,?), ref: 0041B333
                                                                                      • 73EA4C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B33D
                                                                                      • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B34F
                                                                                      • 73EA6180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B366
                                                                                      • 73E9A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B372
                                                                                      • 73EA4C00.GDI32(00000000,0000000B,?,00000000,0041B3CB,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B39F
                                                                                      • 73E9A480.USER32(00000000,00000000,0041B3D2,00000000,0041B3CB,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3C5
                                                                                      • SelectObject.GDI32(00000000,?), ref: 0041B3E0
                                                                                      • SelectObject.GDI32(?,00000000), ref: 0041B3EF
                                                                                      • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B41B
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 0041B429
                                                                                      • SelectObject.GDI32(?,00000000), ref: 0041B437
                                                                                      • DeleteDC.GDI32(00000000), ref: 0041B440
                                                                                      • DeleteDC.GDI32(?), ref: 0041B449
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Object$Select$Delete$A480A570A6180Stretch
                                                                                      • String ID:
                                                                                      • API String ID: 1888863034-0
                                                                                      • Opcode ID: e420a80018f5a27581da0c94fb8e2332c520fd2d58b05de39de388c6394c4d5d
                                                                                      • Instruction ID: ef99a8f9a6f00624a9096b2aeeb37702e3b70ceb3a8cbf3cb68c8f3869cb2bd7
                                                                                      • Opcode Fuzzy Hash: e420a80018f5a27581da0c94fb8e2332c520fd2d58b05de39de388c6394c4d5d
                                                                                      • Instruction Fuzzy Hash: 1541D071E40619AFDF10DAE9D846FEFB7BCEF08704F104466B614FB281C67869408BA4
                                                                                      APIs
                                                                                        • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                                                      • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0046EA4F
                                                                                      • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046EB46
                                                                                      • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0046EB5C
                                                                                      • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046EB81
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                      • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                                      • API String ID: 971782779-3668018701
                                                                                      • Opcode ID: f899328f81346ceb28187c7e053454cefd689a42d0f673cda6a499a0fcfe0b0b
                                                                                      • Instruction ID: 9b3c0a2ebe02865d096d3d92589461d85e8d30d772736a84054ea4ba39fb763a
                                                                                      • Opcode Fuzzy Hash: f899328f81346ceb28187c7e053454cefd689a42d0f673cda6a499a0fcfe0b0b
                                                                                      • Instruction Fuzzy Hash: FBD12274A00249AFDB01DF95D885FDEBBF5AF08314F54402AF900B7392D678AE45CB69
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegQueryValueExA.ADVAPI32(00459246,00000000,00000000,?,00000000,?,00000000,004535D1,?,00459246,00000003,00000000,00000000,00453608), ref: 00453451
                                                                                        • Part of subcall function 0042E670: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451E7B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E68F
                                                                                      • RegQueryValueExA.ADVAPI32(00459246,00000000,00000000,00000000,?,00000004,00000000,0045351B,?,00459246,00000000,00000000,?,00000000,?,00000000), ref: 004534D5
                                                                                      • RegQueryValueExA.ADVAPI32(00459246,00000000,00000000,00000000,?,00000004,00000000,0045351B,?,00459246,00000000,00000000,?,00000000,?,00000000), ref: 00453504
                                                                                      Strings
                                                                                      • , xrefs: 004533C2
                                                                                      • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045336F
                                                                                      • RegOpenKeyEx, xrefs: 004533D4
                                                                                      • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004533A8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: QueryValue$FormatMessageOpen
                                                                                      • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                      • API String ID: 2812809588-1577016196
                                                                                      • Opcode ID: d547f96382ddb47af51d9cc29b1b85abbfcd8a0dd46a61b3a596026ad2d6d4ad
                                                                                      • Instruction ID: 553864e69fa8df29f0895cd1651d22ce7dcdc08a544756bbeb7b66468d6216b8
                                                                                      • Opcode Fuzzy Hash: d547f96382ddb47af51d9cc29b1b85abbfcd8a0dd46a61b3a596026ad2d6d4ad
                                                                                      • Instruction Fuzzy Hash: DF912371A04208BBDB11DF95C942BDEB7F9EB08346F10446BF900F7282D6789F098B69
                                                                                      APIs
                                                                                      • CloseHandle.KERNEL32(?), ref: 0045723F
                                                                                      • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 0045725B
                                                                                      • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00457269
                                                                                      • GetExitCodeProcess.KERNEL32(?), ref: 0045727A
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 004572C1
                                                                                      • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 004572DD
                                                                                      Strings
                                                                                      • Helper isn't responding; killing it., xrefs: 0045724B
                                                                                      • Helper process exited, but failed to get exit code., xrefs: 004572B3
                                                                                      • Stopping 64-bit helper process. (PID: %u), xrefs: 00457231
                                                                                      • Helper process exited with failure code: 0x%x, xrefs: 004572A7
                                                                                      • Helper process exited., xrefs: 00457289
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                      • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                      • API String ID: 3355656108-1243109208
                                                                                      • Opcode ID: 6b2201595befcdbf0454e25f3f98579558f6d853a158eaa6821fe7e437e0bd5b
                                                                                      • Instruction ID: cbbbea6dedd0d273467075bf502e8a2b7be663cd85a1a49bef8c8f37b48c8077
                                                                                      • Opcode Fuzzy Hash: 6b2201595befcdbf0454e25f3f98579558f6d853a158eaa6821fe7e437e0bd5b
                                                                                      • Instruction Fuzzy Hash: 89215C70608B009AC720E779D441B5BB7D4AF08305F04897FBC9ACB283D678E8489B6A
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC1C: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DC48
                                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004531C3,?,00000000,00453287), ref: 00453113
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004531C3,?,00000000,00453287), ref: 0045324F
                                                                                        • Part of subcall function 0042E670: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451E7B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E68F
                                                                                      Strings
                                                                                      • RegCreateKeyEx, xrefs: 00453087
                                                                                      • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045302B
                                                                                      • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045305B
                                                                                      • , xrefs: 00453075
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateFormatMessageQueryValue
                                                                                      • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                      • API String ID: 2481121983-1280779767
                                                                                      • Opcode ID: 758553f8d2e594071fe37aa958d85f9a645975654b76cf36553100ddb6c8e864
                                                                                      • Instruction ID: 2c0c5fe921886f73e21521b3bff8a538c4309916fb6f6cfb0a6381ca684f6e5a
                                                                                      • Opcode Fuzzy Hash: 758553f8d2e594071fe37aa958d85f9a645975654b76cf36553100ddb6c8e864
                                                                                      • Instruction Fuzzy Hash: C5812171A00609AFDB00DFE5C941BDEB7B9EB08345F54446AF901F7282D778AA09CB69
                                                                                      APIs
                                                                                        • Part of subcall function 004524C4: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004915B5,_iu,?,00000000,004525FE), ref: 004525B3
                                                                                        • Part of subcall function 004524C4: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004915B5,_iu,?,00000000,004525FE), ref: 004525C3
                                                                                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00491461
                                                                                      • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004915B5), ref: 00491482
                                                                                      • CreateWindowExA.USER32(00000000,STATIC,004915C4,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004914A9
                                                                                      • SetWindowLongA.USER32(?,000000FC,00490C3C), ref: 004914BC
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491588,?,?,000000FC,00490C3C,00000000,STATIC,004915C4), ref: 004914EC
                                                                                      • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00491560
                                                                                      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491588,?,?,000000FC,00490C3C,00000000), ref: 0049156C
                                                                                        • Part of subcall function 00452814: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004528FB
                                                                                      • 73EA5CF0.USER32(?,0049158F,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491588,?,?,000000FC,00490C3C,00000000,STATIC), ref: 00491582
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                      • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                      • API String ID: 170458502-2312673372
                                                                                      • Opcode ID: 5955ee03ed027167db5067d7769f0f2e7a3333a957f84736b9c043bd00e9a10a
                                                                                      • Instruction ID: 8fdd4e63cd422c3942ebc1833423ec4bc75e2ea9b26886e4930e7115e52d1235
                                                                                      • Opcode Fuzzy Hash: 5955ee03ed027167db5067d7769f0f2e7a3333a957f84736b9c043bd00e9a10a
                                                                                      • Instruction Fuzzy Hash: 10415270A04209AEDF00EBA5CD42F9E7BF8EB49714F51457AF500F72D2D6799E008BA8
                                                                                      APIs
                                                                                      • GetActiveWindow.USER32 ref: 0042EBEC
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042EC00
                                                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042EC0D
                                                                                      • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042EC1A
                                                                                      • GetWindowRect.USER32(?,00000000), ref: 0042EC66
                                                                                      • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042ECA4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                      • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                      • API String ID: 2610873146-3407710046
                                                                                      • Opcode ID: ab635a9dbd45ec810e9935963670e5bdc3844d9f2a3901bc6b7a360ecf31759e
                                                                                      • Instruction ID: 4a37ecb70f16d0e534201d00fe1897e1a246a2af0c0267f068437e20043e9251
                                                                                      • Opcode Fuzzy Hash: ab635a9dbd45ec810e9935963670e5bdc3844d9f2a3901bc6b7a360ecf31759e
                                                                                      • Instruction Fuzzy Hash: 1221CF72301624AFD300DAAADC81F3B3698EB84B10F09452EF944EB382DA78DC048A59
                                                                                      APIs
                                                                                      • GetActiveWindow.USER32 ref: 0045F2B4
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll), ref: 0045F2C8
                                                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0045F2D5
                                                                                      • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0045F2E2
                                                                                      • GetWindowRect.USER32(?,00000000), ref: 0045F32E
                                                                                      • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 0045F36C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                      • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                      • API String ID: 2610873146-3407710046
                                                                                      • Opcode ID: 0759357e475281c3d178149a1403ff3b79648049ae6c1278b3f2bdc8cf34fbc7
                                                                                      • Instruction ID: 95483c6525a53468b4ec8186bc606c8502f0d91924da71a6d47f5662d43c45fd
                                                                                      • Opcode Fuzzy Hash: 0759357e475281c3d178149a1403ff3b79648049ae6c1278b3f2bdc8cf34fbc7
                                                                                      • Instruction Fuzzy Hash: 112192757456046BE3109A68CC81F3F3799DB88715F09453EFD84DB382DA78ED0C8A9A
                                                                                      APIs
                                                                                      • SysFreeString.OLEAUT32(?), ref: 00454E69
                                                                                      • 7715E550.OLE32(00494A58,00000000,00000001,00494774,?,00000000,00454F64), ref: 00454CDA
                                                                                        • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                        • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                      • 7715E550.OLE32(00494764,00000000,00000001,00494774,?,00000000,00454F64), ref: 00454D00
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: 7715E550String$AllocByteCharFreeMultiWide
                                                                                      • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue$IShellLink::QueryInterface
                                                                                      • API String ID: 21690954-2052886881
                                                                                      • Opcode ID: 5948eefd91c64643e410a8502d34ef97e64b0715af901c2b07599baa63df0646
                                                                                      • Instruction ID: 0b21da03975bca805d8248ee8d2b37e628922fffcf98328ca7261b0fae796446
                                                                                      • Opcode Fuzzy Hash: 5948eefd91c64643e410a8502d34ef97e64b0715af901c2b07599baa63df0646
                                                                                      • Instruction Fuzzy Hash: AA915071A00104AFDB50DFA9C885F9E77F8AF89709F50406AF904EB262DB78DD48CB59
                                                                                      APIs
                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004575BF,?,00000000,00457622,?,?,02113858,00000000), ref: 0045743D
                                                                                      • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,00457554,?,00000000,00000001,00000000,00000000,00000000,004575BF), ref: 0045749A
                                                                                      • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,00457554,?,00000000,00000001,00000000,00000000,00000000,004575BF), ref: 004574A7
                                                                                      • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004574F3
                                                                                      • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,0045752D,?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,00457554,?,00000000), ref: 00457519
                                                                                      • GetLastError.KERNEL32(?,?,00000000,00000001,0045752D,?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,00457554,?,00000000), ref: 00457520
                                                                                        • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492A61,00000000), ref: 004520A7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                      • String ID: CreateEvent$TransactNamedPipe
                                                                                      • API String ID: 2182916169-3012584893
                                                                                      • Opcode ID: c1a3a8f9ea1166c106d188104454f7bffd3a84fcc42e4e20bcaa0ea938d488a9
                                                                                      • Instruction ID: 79c6e3806f75cd6c2156c397a36c552c7ebc7e0cdca09418cd540dcb18b715b5
                                                                                      • Opcode Fuzzy Hash: c1a3a8f9ea1166c106d188104454f7bffd3a84fcc42e4e20bcaa0ea938d488a9
                                                                                      • Instruction Fuzzy Hash: 98418E70A04608BFDB15DF99D981F9EBBF8EB09710F5040B6F904E7792D6789E44CA28
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,0045529D,?,?,00000031,?), ref: 00455160
                                                                                      • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00455166
                                                                                      • LoadTypeLib.OLEAUT32(00000000,?), ref: 004551B3
                                                                                        • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492A61,00000000), ref: 004520A7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                      • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                      • API String ID: 1914119943-2711329623
                                                                                      • Opcode ID: 1ed3e8c5a2aa991d601313e4c083ed3eccbaf9bc08da749f5376dbd3bf59aa27
                                                                                      • Instruction ID: fb038adfd684185714a4e58cf340431a6a295a782a22b6c655451b98c415bd11
                                                                                      • Opcode Fuzzy Hash: 1ed3e8c5a2aa991d601313e4c083ed3eccbaf9bc08da749f5376dbd3bf59aa27
                                                                                      • Instruction Fuzzy Hash: DD31A571A00A04AFC711EFAACC61D6F77B9EB89B41B5044A6FD04D7352DA38D904CB29
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E379,?,?,00000001,00000000,?,?,00000001,00000000,00000002,00000000,0047BE41), ref: 0042E29D
                                                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E2A3
                                                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E379,?,?,00000001,00000000,?,?,00000001), ref: 0042E2F1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressCloseHandleModuleProc
                                                                                      • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                      • API String ID: 4190037839-2401316094
                                                                                      • Opcode ID: 45ed28070ffb47697e526778f64ff79688c24bec5b2b36becef891b4b1b2b151
                                                                                      • Instruction ID: d6249f7fc2f92a5c557ffc1224eecf0a88ec9f0d2c320431a8896816ae334499
                                                                                      • Opcode Fuzzy Hash: 45ed28070ffb47697e526778f64ff79688c24bec5b2b36becef891b4b1b2b151
                                                                                      • Instruction Fuzzy Hash: 80212670B00215EBDB00EAA7DC55B9F77A9EB44315FD04477A900E7281DB7C9E05DB58
                                                                                      APIs
                                                                                      • RectVisible.GDI32(?,?), ref: 00416D83
                                                                                      • SaveDC.GDI32(?), ref: 00416D97
                                                                                      • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416DBA
                                                                                      • RestoreDC.GDI32(?,?), ref: 00416DD5
                                                                                      • CreateSolidBrush.GDI32(00000000), ref: 00416E55
                                                                                      • FrameRect.USER32(?,?,?), ref: 00416E88
                                                                                      • DeleteObject.GDI32(?), ref: 00416E92
                                                                                      • CreateSolidBrush.GDI32(00000000), ref: 00416EA2
                                                                                      • FrameRect.USER32(?,?,?), ref: 00416ED5
                                                                                      • DeleteObject.GDI32(?), ref: 00416EDF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                      • String ID:
                                                                                      • API String ID: 375863564-0
                                                                                      • Opcode ID: 2d5a952dda77e96b055630d762204063f474f2b74445c94d99100d457d81a94c
                                                                                      • Instruction ID: 01d81588b69ff1f480347e903aed9c185fc6c29f227380d1fa6610f1b9ad60dd
                                                                                      • Opcode Fuzzy Hash: 2d5a952dda77e96b055630d762204063f474f2b74445c94d99100d457d81a94c
                                                                                      • Instruction Fuzzy Hash: A8513C712086449BDB50EF69C8C0B9B77E8EF48314F15566AFD48CB286C738EC81CB99
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                      • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                      • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                      • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                      • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                      • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                      • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                      • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                      • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                      • String ID:
                                                                                      • API String ID: 1694776339-0
                                                                                      • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                      • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                      • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                      • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                      APIs
                                                                                      • GetSystemMenu.USER32(00000000,00000000), ref: 004221A3
                                                                                      • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004221C1
                                                                                      • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221CE
                                                                                      • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221DB
                                                                                      • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221E8
                                                                                      • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004221F5
                                                                                      • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422202
                                                                                      • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042220F
                                                                                      • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0042222D
                                                                                      • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422249
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$Delete$EnableItem$System
                                                                                      • String ID:
                                                                                      • API String ID: 3985193851-0
                                                                                      • Opcode ID: 05b40914ec909e1c9740d8afeb2cf42751dc2338b7eead5136cc8733da9e1836
                                                                                      • Instruction ID: e98f5eede000e984507cfb68b46ad6efe0a5c83d9602cc3651cf502f29ecaa29
                                                                                      • Opcode Fuzzy Hash: 05b40914ec909e1c9740d8afeb2cf42751dc2338b7eead5136cc8733da9e1836
                                                                                      • Instruction Fuzzy Hash: 23213370380744BAE720D725DD8BF9B7BD89B04708F0444A5BA487F2D7C6F9AE40869C
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(10000000), ref: 0047C4F4
                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 0047C508
                                                                                      • SendNotifyMessageA.USER32(000203EC,00000496,00002710,00000000), ref: 0047C57A
                                                                                      Strings
                                                                                      • DeinitializeSetup, xrefs: 0047C405
                                                                                      • Not restarting Windows because Setup is being run from the debugger., xrefs: 0047C529
                                                                                      • Restarting Windows., xrefs: 0047C555
                                                                                      • Deinitializing Setup., xrefs: 0047C36A
                                                                                      • GetCustomSetupExitCode, xrefs: 0047C3A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary$MessageNotifySend
                                                                                      • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                      • API String ID: 3817813901-1884538726
                                                                                      • Opcode ID: efad5fb6bae037c2cf07564e1a1779af0bcde21ed03e767c6d92b2780cbdc405
                                                                                      • Instruction ID: 90f5f2579ebd2cd042589c700d0c35de107af6cb7106057c8f5cc839c7e64824
                                                                                      • Opcode Fuzzy Hash: efad5fb6bae037c2cf07564e1a1779af0bcde21ed03e767c6d92b2780cbdc405
                                                                                      • Instruction Fuzzy Hash: 5851B130614200AFD721DB79DC95BAA7BE4EB59314F50C57BEC08C72A2DB38A845CB5D
                                                                                      APIs
                                                                                        • Part of subcall function 00457B28: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00457C5A,00000000,00457DA7,?,00000000,00000000,00000000), ref: 00457B75
                                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00457DA7,?,00000000,00000000,00000000), ref: 00457CB6
                                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00457DA7,?,00000000,00000000,00000000), ref: 00457D1C
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      Strings
                                                                                      • v2.0.50727, xrefs: 00457CA8
                                                                                      • .NET Framework version %s not found, xrefs: 00457D56
                                                                                      • v1.1.4322, xrefs: 00457D0E
                                                                                      • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00457C6A
                                                                                      • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00457CD0
                                                                                      • .NET Framework not found, xrefs: 00457D6A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Close$Open
                                                                                      • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$v1.1.4322$v2.0.50727
                                                                                      • API String ID: 2976201327-1070292914
                                                                                      • Opcode ID: 38dafa01eb145cd46e344ec0d302f40d6a4ca12a07449fb32f1c0fadfb05638c
                                                                                      • Instruction ID: 1181c51870a89a76828bf4cdafa164266e6ab86bcafa1da5c5d87414d128b815
                                                                                      • Opcode Fuzzy Hash: 38dafa01eb145cd46e344ec0d302f40d6a4ca12a07449fb32f1c0fadfb05638c
                                                                                      • Instruction Fuzzy Hash: 5F41C730A081495FCB00DF65E851BEE77B6EF49309F5544BBE840DB292D739AA0ECB58
                                                                                      APIs
                                                                                        • Part of subcall function 004732C8: GetWindowThreadProcessId.USER32(00000000), ref: 004732D0
                                                                                        • Part of subcall function 004732C8: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004733C7,0pI,00000000), ref: 004732E3
                                                                                        • Part of subcall function 004732C8: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 004732E9
                                                                                      • SendMessageA.USER32(00000000,0000004A,00000000,Z7G), ref: 004733D5
                                                                                      • GetTickCount.KERNEL32 ref: 0047341A
                                                                                      • GetTickCount.KERNEL32 ref: 00473424
                                                                                      • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00473479
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                      • String ID: 0pI$CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d$Z7G
                                                                                      • API String ID: 613034392-2401662188
                                                                                      • Opcode ID: 8feb52f6250f747c5a664b1527b2b5cd8d32300bfcf5c1eaa96ed0b76df53d0f
                                                                                      • Instruction ID: 8dd7748eb102d70c53ef4d50441e40eca7a6ef9e476b6454bb3470e68b985026
                                                                                      • Opcode Fuzzy Hash: 8feb52f6250f747c5a664b1527b2b5cd8d32300bfcf5c1eaa96ed0b76df53d0f
                                                                                      • Instruction Fuzzy Hash: 6F31C434F002259ADB10EFB999467EEB2E09F04305F50813BB548EB382DA7C8E01979D
                                                                                      APIs
                                                                                      • SHGetMalloc.SHELL32(?), ref: 0045E013
                                                                                      • GetActiveWindow.USER32 ref: 0045E077
                                                                                      • CoInitialize.OLE32(00000000), ref: 0045E08B
                                                                                      • SHBrowseForFolder.SHELL32(?), ref: 0045E0A2
                                                                                      • 7712D120.OLE32(0045E0E3,00000000,?,?,?,?,?,00000000,0045E167), ref: 0045E0B7
                                                                                      • SetActiveWindow.USER32(?,0045E0E3,00000000,?,?,?,?,?,00000000,0045E167), ref: 0045E0CD
                                                                                      • SetActiveWindow.USER32(?,?,0045E0E3,00000000,?,?,?,?,?,00000000,0045E167), ref: 0045E0D6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ActiveWindow$7712BrowseD120FolderInitializeMalloc
                                                                                      • String ID: A
                                                                                      • API String ID: 3129831556-3554254475
                                                                                      • Opcode ID: 4c93aed7974da8df2999b89a302ce796433789b5a6ec67c560a89b0d32607bd6
                                                                                      • Instruction ID: 6bfd7eabbe9e682b3dde037a987c9ea474e9b057d6f32f0a8e83a6328ca7ae7b
                                                                                      • Opcode Fuzzy Hash: 4c93aed7974da8df2999b89a302ce796433789b5a6ec67c560a89b0d32607bd6
                                                                                      • Instruction Fuzzy Hash: D0314471D00218AFDB04EFA6E886A9EBBF8EF09704F51447AF804E7252D7785A04CF59
                                                                                      APIs
                                                                                      • GetSystemMetrics.USER32(0000000E), ref: 00418BE0
                                                                                      • GetSystemMetrics.USER32(0000000D), ref: 00418BE8
                                                                                      • 6F9C2980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418BEE
                                                                                        • Part of subcall function 00409920: 6F9BC400.COMCTL32((fI,000000FF,00000000,00418C1C,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00409924
                                                                                      • 6FA2CB00.COMCTL32((fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C3E
                                                                                      • 6FA2C740.COMCTL32(00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418C49
                                                                                      • 6FA2CB00.COMCTL32((fI,00000001,?,?,00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000), ref: 00418C5C
                                                                                      • 6F9C0860.COMCTL32((fI,00418C7F,?,00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E), ref: 00418C72
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem$C0860C2980C400C740
                                                                                      • String ID: (fI
                                                                                      • API String ID: 624341609-4122540895
                                                                                      • Opcode ID: 65e0913070e1a46d1e4049ee6121461fcfbb365fe4eb4b9520eb625876ba3720
                                                                                      • Instruction ID: ebdf7d90a3a22d50ab8fd643d9f8c48181b88e499e337cf830e96f2c39c8652b
                                                                                      • Opcode Fuzzy Hash: 65e0913070e1a46d1e4049ee6121461fcfbb365fe4eb4b9520eb625876ba3720
                                                                                      • Instruction Fuzzy Hash: 19113675744204BADB50EBF5DC82F5E77B8DB48704F50406AB604E72D2E6799D408768
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045B999
                                                                                      • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045B9A9
                                                                                      • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045B9B9
                                                                                      • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045B9C9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                      • API String ID: 190572456-3516654456
                                                                                      • Opcode ID: cdec3d2289940290433f74bcfb90cd33ccdd8b1be43608ea6e51ef040730019a
                                                                                      • Instruction ID: 02f39ce5c28d2ed3ade6aba6a28faafd9b0cc1bc692c698d2602f952355582ec
                                                                                      • Opcode Fuzzy Hash: cdec3d2289940290433f74bcfb90cd33ccdd8b1be43608ea6e51ef040730019a
                                                                                      • Instruction Fuzzy Hash: 020121B0518300DADB24DF379C81B263695E764356F14893BA944552A2D77C0549EBDC
                                                                                      APIs
                                                                                      • SetBkColor.GDI32(?,00000000), ref: 0041A929
                                                                                      • 73EA4D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041A963
                                                                                      • SetBkColor.GDI32(?,?), ref: 0041A978
                                                                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041A9C2
                                                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0041A9CD
                                                                                      • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041A9DD
                                                                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AA1C
                                                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0041AA26
                                                                                      • SetBkColor.GDI32(00000000,?), ref: 0041AA33
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$StretchText
                                                                                      • String ID:
                                                                                      • API String ID: 2984075790-0
                                                                                      • Opcode ID: 70494902a934abd88d8421d1aeec792968b072de73e514355a54ff46ed356d3f
                                                                                      • Instruction ID: 69ae49bf6c4e82acacdff2fe07525d2a8d99776db7c40e28fbb8516f53671917
                                                                                      • Opcode Fuzzy Hash: 70494902a934abd88d8421d1aeec792968b072de73e514355a54ff46ed356d3f
                                                                                      • Instruction Fuzzy Hash: B461D6B5A00505EFCB40EFA9D985E9AB7F8EF48314B14816AF518DB252C734ED41CF58
                                                                                      APIs
                                                                                        • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                                                      • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,004564E8,?, /s ",?,regsvr32.exe",?,004564E8), ref: 0045645A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseDirectoryHandleSystem
                                                                                      • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                      • API String ID: 2051275411-1862435767
                                                                                      • Opcode ID: edf60017c2564d3275548d2cadab5662920130db2b9ae15ca25aa1c268591cd9
                                                                                      • Instruction ID: 0727363c7f1249558044398805bdccd0d7d16a74982410126c53be3864fdc62d
                                                                                      • Opcode Fuzzy Hash: edf60017c2564d3275548d2cadab5662920130db2b9ae15ca25aa1c268591cd9
                                                                                      • Instruction Fuzzy Hash: 1B41E570E403086BDB10EFD5D881B9DB7F9AF49305F91407BA904BB296D7789A09CB1D
                                                                                      APIs
                                                                                      • OffsetRect.USER32(?,00000001,00000001), ref: 0044CBDD
                                                                                      • GetSysColor.USER32(00000014), ref: 0044CBE4
                                                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0044CBFC
                                                                                      • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CC25
                                                                                      • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044CC2F
                                                                                      • GetSysColor.USER32(00000010), ref: 0044CC36
                                                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0044CC4E
                                                                                      • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CC77
                                                                                      • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CCA2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Text$Color$Draw$OffsetRect
                                                                                      • String ID:
                                                                                      • API String ID: 1005981011-0
                                                                                      • Opcode ID: 123d1c78d96388b48013e2d686bd4fbc3c46f036129ba804cfc4942d94a5bc27
                                                                                      • Instruction ID: 1caa52e0a57a24b19c6a51c3cca57839e66ec70a0d40fc0ec19372c69ab55c34
                                                                                      • Opcode Fuzzy Hash: 123d1c78d96388b48013e2d686bd4fbc3c46f036129ba804cfc4942d94a5bc27
                                                                                      • Instruction Fuzzy Hash: 1D21CFB42015007FC710FB2ACD8AE9BBBECDF19319B05457A7958EB3A3C678DD408669
                                                                                      APIs
                                                                                      • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004528FB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileStringWrite
                                                                                      • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]$o1I
                                                                                      • API String ID: 390214022-2878587892
                                                                                      • Opcode ID: 180da5cb8003d792c816aeea415edf5bd33e2b8e779ba911190ea486055d5340
                                                                                      • Instruction ID: cc9533ecac0167aba3f68936dda73933724a2a20dcf6fda83704f45a3cd3408f
                                                                                      • Opcode Fuzzy Hash: 180da5cb8003d792c816aeea415edf5bd33e2b8e779ba911190ea486055d5340
                                                                                      • Instruction Fuzzy Hash: C1912274A002099BDB11EFA5D982BDEB7B5EF49305F508067E800B7392D7B86E09CB59
                                                                                      APIs
                                                                                        • Part of subcall function 00450088: SetEndOfFile.KERNEL32(?,?,0045AA1E,00000000,0045ABA9,?,00000000,00000002,00000002), ref: 0045008F
                                                                                        • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,00492DAD,00000000,00492E02,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 00490D19
                                                                                      • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00490D2D
                                                                                      • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00490D47
                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00490D53
                                                                                      • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00490D59
                                                                                      • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00490D6C
                                                                                      Strings
                                                                                      • Deleting Uninstall data files., xrefs: 00490C8F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                      • String ID: Deleting Uninstall data files.
                                                                                      • API String ID: 1570157960-2568741658
                                                                                      • Opcode ID: f2578554030a24c7267b533a633fac1857f9ff088767cb74f3f53633749f6caa
                                                                                      • Instruction ID: fe893ce7c7fc4f02ce2c16f04c74f522583f7d0dd1eba0bd56840a119b19c503
                                                                                      • Opcode Fuzzy Hash: f2578554030a24c7267b533a633fac1857f9ff088767cb74f3f53633749f6caa
                                                                                      • Instruction Fuzzy Hash: 2A217371358240AEEB10A7A6EC42B273B9CDB54318F50063BF5049B2E3DA7CAC44D76D
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046C215,?,?,?,?,00000000), ref: 0046C17F
                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046C215), ref: 0046C196
                                                                                      • AddFontResourceA.GDI32(00000000), ref: 0046C1B3
                                                                                      • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0046C1C7
                                                                                      Strings
                                                                                      • Failed to set value in Fonts registry key., xrefs: 0046C188
                                                                                      • Failed to open Fonts registry key., xrefs: 0046C19D
                                                                                      • AddFontResource, xrefs: 0046C1D1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                      • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                      • API String ID: 955540645-649663873
                                                                                      • Opcode ID: d0cfe69457fce7bbbc28504f119b2d4c3be8b6de6538d31fc16afe2da0dcfddb
                                                                                      • Instruction ID: 8ea992291a1dd30632b8682880332e8f2f5ba9678f4ac26e890d70cee17ca1cd
                                                                                      • Opcode Fuzzy Hash: d0cfe69457fce7bbbc28504f119b2d4c3be8b6de6538d31fc16afe2da0dcfddb
                                                                                      • Instruction Fuzzy Hash: 8221E570B402047AE710EAA68C92F7A639CDB45748F504477BD40EB2C2E67C9D05966E
                                                                                      APIs
                                                                                        • Part of subcall function 00416380: GetClassInfoA.USER32(00400000,?,?), ref: 004163EF
                                                                                        • Part of subcall function 00416380: UnregisterClassA.USER32(?,00400000), ref: 0041641B
                                                                                        • Part of subcall function 00416380: RegisterClassA.USER32(?), ref: 0041643E
                                                                                      • GetVersion.KERNEL32 ref: 0045F718
                                                                                      • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0045F756
                                                                                      • SHGetFileInfo.SHELL32(0045F7F4,00000000,?,00000160,00004011), ref: 0045F773
                                                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 0045F791
                                                                                      • SetCursor.USER32(00000000,00000000,00007F02,0045F7F4,00000000,?,00000160,00004011), ref: 0045F797
                                                                                      • SetCursor.USER32(?,0045F7D7,00007F02,0045F7F4,00000000,?,00000160,00004011), ref: 0045F7CA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                      • String ID: Explorer
                                                                                      • API String ID: 2594429197-512347832
                                                                                      • Opcode ID: e3239e46c257503266597b56140d29e20775804faaf584886ec342b17592225d
                                                                                      • Instruction ID: 7ff7faf5247c26d25335c70635a1860a407a0e5f323aeaa6378cd2fc5b7ea516
                                                                                      • Opcode Fuzzy Hash: e3239e46c257503266597b56140d29e20775804faaf584886ec342b17592225d
                                                                                      • Instruction Fuzzy Hash: B121E7317403046BE710BBB98C47F9A76989B09709F4144BFBB05EA6C3DA7C9C09866D
                                                                                      APIs
                                                                                      • RtlEnterCriticalSection.KERNEL32(00496420,00000000,00401B68), ref: 00401ABD
                                                                                      • LocalFree.KERNEL32(005B49D0,00000000,00401B68), ref: 00401ACF
                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000,005B49D0,00000000,00401B68), ref: 00401AEE
                                                                                      • LocalFree.KERNEL32(005B2BB8,?,00000000,00008000,005B49D0,00000000,00401B68), ref: 00401B2D
                                                                                      • RtlLeaveCriticalSection.KERNEL32(00496420,00401B6F), ref: 00401B58
                                                                                      • RtlDeleteCriticalSection.KERNEL32(00496420,00401B6F), ref: 00401B62
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                      • String ID: 1[
                                                                                      • API String ID: 3782394904-3738508114
                                                                                      • Opcode ID: d7983087b8bcbabcafc2c9d8a305f4a93e6fa46b606c4ef3e584c6169f95cf8d
                                                                                      • Instruction ID: bf2c7a4256457c5f50c71aa29f18f829c6f6e2c919ab822836d088e606c14c70
                                                                                      • Opcode Fuzzy Hash: d7983087b8bcbabcafc2c9d8a305f4a93e6fa46b606c4ef3e584c6169f95cf8d
                                                                                      • Instruction Fuzzy Hash: 5D118F30A403405EEB15ABE99D82F263BE59761B4CF56407BF80067AF1D77C9850C76E
                                                                                      APIs
                                                                                      • RtlInitializeCriticalSection.KERNEL32(00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                      • RtlEnterCriticalSection.KERNEL32(00496420,00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                      • LocalAlloc.KERNEL32(00000000,00000FF8,00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                      • RtlLeaveCriticalSection.KERNEL32(00496420,00401A89,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                      • String ID: `dI$`dI$1[
                                                                                      • API String ID: 730355536-2633759563
                                                                                      • Opcode ID: f176e8b5bc4d8de55a84342bec8c86950c68c795945543f3ab918003abf5a290
                                                                                      • Instruction ID: 5e78e1d922e44001d172df758a9733a16a6df98b74bc9f0da5c534ca1700ba01
                                                                                      • Opcode Fuzzy Hash: f176e8b5bc4d8de55a84342bec8c86950c68c795945543f3ab918003abf5a290
                                                                                      • Instruction Fuzzy Hash: EC01C0706442405EFB19ABE99802B253ED4D795B88F13803FF440A6AF1C67C4840CB2D
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00000000,0045869A,?,00000000,00000000,00000000,?,00000006,?,00000000,00491FBA,?,00000000,0049205D), ref: 004585DE
                                                                                        • Part of subcall function 00452EB8: FindClose.KERNEL32(000000FF,00452FAE), ref: 00452F9D
                                                                                      Strings
                                                                                      • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 004585B8
                                                                                      • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00458653
                                                                                      • Failed to delete directory (%d)., xrefs: 00458674
                                                                                      • Stripped read-only attribute., xrefs: 004585A0
                                                                                      • Failed to delete directory (%d). Will retry later., xrefs: 004585F7
                                                                                      • Deleting directory: %s, xrefs: 00458567
                                                                                      • Failed to strip read-only attribute., xrefs: 004585AC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseErrorFindLast
                                                                                      • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                      • API String ID: 754982922-1448842058
                                                                                      • Opcode ID: d02289ac0552954b959a3ec27135d6527882d3cbb7a983ba8985732d5b1c3507
                                                                                      • Instruction ID: dd70d7a7e9406b9190765920557ab5b8ad56b684bc2d1b190e3df41212a100e3
                                                                                      • Opcode Fuzzy Hash: d02289ac0552954b959a3ec27135d6527882d3cbb7a983ba8985732d5b1c3507
                                                                                      • Instruction Fuzzy Hash: 3B418630B042489BCB10DB6988427AE76E59B8930AF55857FAC05B7393DF7C890D8B5A
                                                                                      APIs
                                                                                      • GetCapture.USER32 ref: 00422E14
                                                                                      • GetCapture.USER32 ref: 00422E23
                                                                                      • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422E29
                                                                                      • ReleaseCapture.USER32 ref: 00422E2E
                                                                                      • GetActiveWindow.USER32 ref: 00422E3D
                                                                                      • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422EBC
                                                                                      • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422F20
                                                                                      • GetActiveWindow.USER32 ref: 00422F2F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                      • String ID:
                                                                                      • API String ID: 862346643-0
                                                                                      • Opcode ID: 8d225d8a55f9a88f292a2c30a551b716c13a14df50b62869e123561c13ee422b
                                                                                      • Instruction ID: 3dc7d5c5dffcbd9cfc95175fcc265abaf37585ce791e678acf2218af3f88607c
                                                                                      • Opcode Fuzzy Hash: 8d225d8a55f9a88f292a2c30a551b716c13a14df50b62869e123561c13ee422b
                                                                                      • Instruction Fuzzy Hash: 19416270B00244AFDB50EBA9DA42B9E77F1EF04304F5540BAF404AB3A2D7B99E40DB18
                                                                                      APIs
                                                                                      • 73E9A570.USER32(00000000), ref: 004293FA
                                                                                      • GetTextMetricsA.GDI32(00000000), ref: 00429403
                                                                                        • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00429412
                                                                                      • GetTextMetricsA.GDI32(00000000,?), ref: 0042941F
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00429426
                                                                                      • 73E9A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0042942E
                                                                                      • GetSystemMetrics.USER32(00000006), ref: 00429453
                                                                                      • GetSystemMetrics.USER32(00000006), ref: 0042946D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                                                      • String ID:
                                                                                      • API String ID: 361401722-0
                                                                                      • Opcode ID: aa0e22ae2bb85fef1fe3d4d4a9dea72362df36d5d975f8d53732e0b8776d61f5
                                                                                      • Instruction ID: 6143225b0a8ca3b977d6363335e7cd80f7f8ea5cda66b8f0fa851fdc2eb08b32
                                                                                      • Opcode Fuzzy Hash: aa0e22ae2bb85fef1fe3d4d4a9dea72362df36d5d975f8d53732e0b8776d61f5
                                                                                      • Instruction Fuzzy Hash: 360104917087103BF710B2769CC2F6B6188DB9435CF44003FFA469A3D3D56C8C45866A
                                                                                      APIs
                                                                                      • 73E9A570.USER32(00000000,?,00418FC9,00493201), ref: 0041DD97
                                                                                      • 73EA4620.GDI32(00000000,0000005A,00000000,?,00418FC9,00493201), ref: 0041DDA1
                                                                                      • 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00418FC9,00493201), ref: 0041DDAE
                                                                                      • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DDBD
                                                                                      • GetStockObject.GDI32(00000007), ref: 0041DDCB
                                                                                      • GetStockObject.GDI32(00000005), ref: 0041DDD7
                                                                                      • GetStockObject.GDI32(0000000D), ref: 0041DDE3
                                                                                      • LoadIconA.USER32(00000000,00007F00), ref: 0041DDF4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ObjectStock$A4620A480A570IconLoad
                                                                                      • String ID:
                                                                                      • API String ID: 2905290459-0
                                                                                      • Opcode ID: 79ba34301ffdcd870fce82e69020cd4fb5d8953881da513776c9bfc891f1925d
                                                                                      • Instruction ID: bf46a9fe5e63f1af167cdf0a983a4ac464f15f0dd566559e746e50b59b955e29
                                                                                      • Opcode Fuzzy Hash: 79ba34301ffdcd870fce82e69020cd4fb5d8953881da513776c9bfc891f1925d
                                                                                      • Instruction Fuzzy Hash: A11130706453419AE740BF655992BA63690DB64748F01813FF609AF2D2DB7A0C448B5E
                                                                                      APIs
                                                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 0045FBFC
                                                                                      • SetCursor.USER32(00000000,00000000,00007F02,00000000,0045FC91), ref: 0045FC02
                                                                                      • SetCursor.USER32(?,0045FC79,00007F02,00000000,0045FC91), ref: 0045FC6C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cursor$Load
                                                                                      • String ID: $ $Internal error: Item already expanding
                                                                                      • API String ID: 1675784387-1948079669
                                                                                      • Opcode ID: 2a5e59fbc60391709db9e707cfb1b81175e986b7537cdf1dfc64ada719463c73
                                                                                      • Instruction ID: 7a834110d2e8282c1345bf2880c47fa17af2e43f078088a6ac64f542608522eb
                                                                                      • Opcode Fuzzy Hash: 2a5e59fbc60391709db9e707cfb1b81175e986b7537cdf1dfc64ada719463c73
                                                                                      • Instruction Fuzzy Hash: 81B14B30600604DFD711EF69C586B9ABBF1AF05305F1485BAE845AB7A3C778AD4CCB1A
                                                                                      APIs
                                                                                      • GetSystemDefaultLCID.KERNEL32(00000000,004088D0,?,?,?,?,00000000,00000000,00000000,?,004098D7,00000000,004098EA), ref: 004086A2
                                                                                        • Part of subcall function 004084D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                                                        • Part of subcall function 0040851C: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040871E,?,?,?,00000000,004088D0), ref: 0040852F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale$DefaultSystem
                                                                                      • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                      • API String ID: 1044490935-665933166
                                                                                      • Opcode ID: d28892a32a3756e591db26ccf56d4423c4b5dcf68a3e55eb2d1216e614db25d0
                                                                                      • Instruction ID: f7723302c3cbbcbb01f246a146743d61dec29c667e41bc47a3323a0acc4546db
                                                                                      • Opcode Fuzzy Hash: d28892a32a3756e591db26ccf56d4423c4b5dcf68a3e55eb2d1216e614db25d0
                                                                                      • Instruction Fuzzy Hash: CB514A35B00248ABDB01FBAA8941A9F7769DB98308F50D47FA141BB3C6DE3DDA05871D
                                                                                      APIs
                                                                                      • GetVersion.KERNEL32(00000000,00411869), ref: 004116FC
                                                                                      • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 004117BA
                                                                                        • Part of subcall function 00411A1C: CreatePopupMenu.USER32 ref: 00411A36
                                                                                      • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 00411846
                                                                                        • Part of subcall function 00411A1C: CreateMenu.USER32 ref: 00411A40
                                                                                      • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 0041182D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                      • String ID: ,$?
                                                                                      • API String ID: 2359071979-2308483597
                                                                                      • Opcode ID: 81cf1368c6a983362ffd0b97e47859e0159252f4e06a36b3365d64b72bbd56ad
                                                                                      • Instruction ID: 3f3527f43cca8a4f6c45e7f3696c032b38f9f6d147acb0657ff8a7652be0e8fd
                                                                                      • Opcode Fuzzy Hash: 81cf1368c6a983362ffd0b97e47859e0159252f4e06a36b3365d64b72bbd56ad
                                                                                      • Instruction Fuzzy Hash: CC511774A001409BDB10EF6ADC81ADA7BF9BF49304B1585BBF904E73A6D738C942CB58
                                                                                      APIs
                                                                                      • GetObjectA.GDI32(?,00000018,?), ref: 0041BE98
                                                                                      • GetObjectA.GDI32(?,00000018,?), ref: 0041BEA7
                                                                                      • GetBitmapBits.GDI32(?,?,?), ref: 0041BEF8
                                                                                      • GetBitmapBits.GDI32(?,?,?), ref: 0041BF06
                                                                                      • DeleteObject.GDI32(?), ref: 0041BF0F
                                                                                      • DeleteObject.GDI32(?), ref: 0041BF18
                                                                                      • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BF35
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                      • String ID:
                                                                                      • API String ID: 1030595962-0
                                                                                      • Opcode ID: c7b0e75b457b54f40c973da1b74c3022c367d96584a0130cfc4ac672875a8614
                                                                                      • Instruction ID: 2920a3410ecffe373541ee6f53742fd475180ef7da711f6faed1b6e94a947089
                                                                                      • Opcode Fuzzy Hash: c7b0e75b457b54f40c973da1b74c3022c367d96584a0130cfc4ac672875a8614
                                                                                      • Instruction Fuzzy Hash: 0C510571E00219AFCB14DFA9D8819EEB7F9EF48314B11446AF914E7391D738AD81CB64
                                                                                      APIs
                                                                                      • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CE6E
                                                                                      • 73EA4620.GDI32(00000000,00000026), ref: 0041CE8D
                                                                                      • 73E98830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CEF3
                                                                                      • 73E922A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CF02
                                                                                      • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CF6C
                                                                                      • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041CFAA
                                                                                      • 73E98830.GDI32(?,?,00000001,0041CFDC,00000000,00000026), ref: 0041CFCF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Stretch$E98830$A4620BitsE922Mode
                                                                                      • String ID:
                                                                                      • API String ID: 4209919087-0
                                                                                      • Opcode ID: 132354002ca2fdf89728bebe702e6aaf01ac2d906efdfd832a76dcf97bd27496
                                                                                      • Instruction ID: 0295d75a013be80ecc2d975aeb153abe1d20fbb24d7cab5e263b7fb8805ed029
                                                                                      • Opcode Fuzzy Hash: 132354002ca2fdf89728bebe702e6aaf01ac2d906efdfd832a76dcf97bd27496
                                                                                      • Instruction Fuzzy Hash: 6A512970644600AFDB14DFA8C985FABBBF9AF08304F10459AF544DB292C778ED80CB58
                                                                                      APIs
                                                                                      • SendMessageA.USER32(00000000,?,?), ref: 0045559A
                                                                                        • Part of subcall function 004241EC: GetWindowTextA.USER32(?,?,00000100), ref: 0042420C
                                                                                        • Part of subcall function 0041EE14: GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                                                        • Part of subcall function 0041EE14: 73EA5940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042E908,?,00000001), ref: 0041EE69
                                                                                        • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00455601
                                                                                      • TranslateMessage.USER32(?), ref: 0045561F
                                                                                      • DispatchMessageA.USER32(?), ref: 00455628
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$TextWindow$A5940CurrentDispatchSendThreadTranslate
                                                                                      • String ID: [Paused]
                                                                                      • API String ID: 1715333840-4230553315
                                                                                      • Opcode ID: 3a95339d3b00b4d4c014ba20a0af633e860cba05bef6b97c8997cd6cdd85c36c
                                                                                      • Instruction ID: 1ea6cdf9f8c4d0006da5c53b80d4ab4df920001bdb03266b2b95788fb80fd04e
                                                                                      • Opcode Fuzzy Hash: 3a95339d3b00b4d4c014ba20a0af633e860cba05bef6b97c8997cd6cdd85c36c
                                                                                      • Instruction Fuzzy Hash: AA31E6309046886ECB11DBB5DC51BEEBBB8EB49314F91447BE804E7292D73C9909CB2D
                                                                                      APIs
                                                                                      • GetCursor.USER32(00000000,004676D3), ref: 00467650
                                                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 0046765E
                                                                                      • SetCursor.USER32(00000000,00000000,00007F02,00000000,004676D3), ref: 00467664
                                                                                      • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,004676D3), ref: 0046766E
                                                                                      • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,004676D3), ref: 00467674
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cursor$LoadSleep
                                                                                      • String ID: CheckPassword
                                                                                      • API String ID: 4023313301-1302249611
                                                                                      • Opcode ID: a0f55fa05c8be1d69f749fc9697138d56db45261ab8bfaff53ea542b656ce6f5
                                                                                      • Instruction ID: 0acf26c21a080d5da0313e65daee1c9aa77075bbb7fadc865c3b9f3c1b589fde
                                                                                      • Opcode Fuzzy Hash: a0f55fa05c8be1d69f749fc9697138d56db45261ab8bfaff53ea542b656ce6f5
                                                                                      • Instruction Fuzzy Hash: 2131B334648744AFD711EB79C88AF9A7BE4AF05318F1580B6B8049F3A2D7789E40CB4D
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00457F4B
                                                                                      Strings
                                                                                      • Failed to load .NET Framework DLL "%s", xrefs: 00457F30
                                                                                      • .NET Framework CreateAssemblyCache function failed, xrefs: 00457F6E
                                                                                      • Fusion.dll, xrefs: 00457EEB
                                                                                      • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00457F56
                                                                                      • CreateAssemblyCache, xrefs: 00457F42
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                      • API String ID: 190572456-3990135632
                                                                                      • Opcode ID: 6892959eac5292d5a5ac2a2cadbd2d0bd37bbeac1c13b492763255e4aa9e87a2
                                                                                      • Instruction ID: a43b4c24682a544c2646696e4a275acb35fc84741e5fc719d5cb135cb267c29f
                                                                                      • Opcode Fuzzy Hash: 6892959eac5292d5a5ac2a2cadbd2d0bd37bbeac1c13b492763255e4aa9e87a2
                                                                                      • Instruction Fuzzy Hash: 5331A771E046096FCB11EFA5D881A9FB7B4AF04715F50857AF814A7382DB3899088799
                                                                                      APIs
                                                                                        • Part of subcall function 0041BFB8: GetObjectA.GDI32(?,00000018), ref: 0041BFC5
                                                                                      • GetFocus.USER32 ref: 0041C0D8
                                                                                      • 73E9A570.USER32(?), ref: 0041C0E4
                                                                                      • 73E98830.GDI32(?,?,00000000,00000000,0041C163,?,?), ref: 0041C105
                                                                                      • 73E922A0.GDI32(?,?,?,00000000,00000000,0041C163,?,?), ref: 0041C111
                                                                                      • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C128
                                                                                      • 73E98830.GDI32(?,00000000,00000000,0041C16A,?,?), ref: 0041C150
                                                                                      • 73E9A480.USER32(?,?,0041C16A,?,?), ref: 0041C15D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: E98830$A480A570BitsE922FocusObject
                                                                                      • String ID:
                                                                                      • API String ID: 2688936647-0
                                                                                      • Opcode ID: b5ec816d879f7673cf2204928d24ade75243476a1e646848f60b5da6794254d2
                                                                                      • Instruction ID: be6d8328aec04e85a436dd0cf8ae2147a44d9b66c6d411dca3268b31211d8f12
                                                                                      • Opcode Fuzzy Hash: b5ec816d879f7673cf2204928d24ade75243476a1e646848f60b5da6794254d2
                                                                                      • Instruction Fuzzy Hash: B2116A71A40618BFDB10DBA9CC86FAFB7FCEF48700F54446AB514E7281D6789D008B68
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0047E490), ref: 0047E475
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen
                                                                                      • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                      • API String ID: 47109696-2530820420
                                                                                      • Opcode ID: 3fe8207b4309967a2eec740b8de24a374655ee6a60c09589a25f0ee3bbab2cf7
                                                                                      • Instruction ID: 46a45326e1d9b5ff3e072bf084057b1a8ce9b2520be3d98a23739a38d90d80f2
                                                                                      • Opcode Fuzzy Hash: 3fe8207b4309967a2eec740b8de24a374655ee6a60c09589a25f0ee3bbab2cf7
                                                                                      • Instruction Fuzzy Hash: 8F11BB30714204AADB10DA778806BDA3AA8EB09358F51C5B7A908E7392EB7C9901C75C
                                                                                      APIs
                                                                                      • SelectObject.GDI32(00000000,?), ref: 0041B3E0
                                                                                      • SelectObject.GDI32(?,00000000), ref: 0041B3EF
                                                                                      • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B41B
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 0041B429
                                                                                      • SelectObject.GDI32(?,00000000), ref: 0041B437
                                                                                      • DeleteDC.GDI32(00000000), ref: 0041B440
                                                                                      • DeleteDC.GDI32(?), ref: 0041B449
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ObjectSelect$Delete$Stretch
                                                                                      • String ID:
                                                                                      • API String ID: 1458357782-0
                                                                                      • Opcode ID: 5d8119482a24acdf9dbc4f71c87d898742faec31f652e860e6f74a5bb4e0366a
                                                                                      • Instruction ID: 073f11bba2386bee955988a390c3df6f0cbda7ed7a331810ab0cae2060ca734e
                                                                                      • Opcode Fuzzy Hash: 5d8119482a24acdf9dbc4f71c87d898742faec31f652e860e6f74a5bb4e0366a
                                                                                      • Instruction Fuzzy Hash: F9114C72E40659ABDF10D6D9D985FAFB3BCEF08704F048456B614FB242C678A8418B54
                                                                                      APIs
                                                                                      • 73E9A570.USER32(00000000,?,?,00000000), ref: 0048FCC5
                                                                                        • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 0048FCE7
                                                                                      • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,0049023D), ref: 0048FCFB
                                                                                      • GetTextMetricsA.GDI32(00000000,?), ref: 0048FD1D
                                                                                      • 73E9A480.USER32(00000000,00000000,0048FD47,0048FD40,?,00000000,?,?,00000000), ref: 0048FD3A
                                                                                      Strings
                                                                                      • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 0048FCF2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                                                      • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                      • API String ID: 1435929781-222967699
                                                                                      • Opcode ID: 3db6766931fef7b11a742d2f2d9c48b6603b492ecea0d86a82d8ef65d75c1a51
                                                                                      • Instruction ID: be2ae6e373cd916ce709c39e3fbc403556832e2453e100614d5f9d9249756fbf
                                                                                      • Opcode Fuzzy Hash: 3db6766931fef7b11a742d2f2d9c48b6603b492ecea0d86a82d8ef65d75c1a51
                                                                                      • Instruction Fuzzy Hash: BE018876604604BFEB01EBA5CC45F5FB3ECDB49704F510476B604E7281D678AD008B68
                                                                                      APIs
                                                                                      • GetCursorPos.USER32 ref: 0042331F
                                                                                      • WindowFromPoint.USER32(?,?), ref: 0042332C
                                                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0042333A
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00423341
                                                                                      • SendMessageA.USER32(00000000,00000084,?,?), ref: 0042335A
                                                                                      • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423371
                                                                                      • SetCursor.USER32(00000000), ref: 00423383
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                      • String ID:
                                                                                      • API String ID: 1770779139-0
                                                                                      • Opcode ID: 60706cbef7e7fd969e6117079794ea181f59045882c2055e97c618c29bc945ad
                                                                                      • Instruction ID: 4e500bdd1cb7c406dcecfc45487f359b17b305850d12e3c552a5b3a09f906ed3
                                                                                      • Opcode Fuzzy Hash: 60706cbef7e7fd969e6117079794ea181f59045882c2055e97c618c29bc945ad
                                                                                      • Instruction Fuzzy Hash: EC01D4223043103AD620BB795C86E3F26A8CFC5B55F50417FB909BE283DA3D8D0163AD
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll), ref: 0048FAE8
                                                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 0048FAF5
                                                                                      • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0048FB02
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                      • API String ID: 667068680-2254406584
                                                                                      • Opcode ID: 06817d94493c4b11f4ceaf649244f67311709392a4fb54af9b6a7fbece0388f4
                                                                                      • Instruction ID: 57668858e8c0b0289ac4f884962ff5c073460ec000cf1e14312be6c8289e998d
                                                                                      • Opcode Fuzzy Hash: 06817d94493c4b11f4ceaf649244f67311709392a4fb54af9b6a7fbece0388f4
                                                                                      • Instruction Fuzzy Hash: 1BF0F652B41B1466D620357A8CA2E7FA1CDCB95770F140937BE04A7382E95DAC0E43BD
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045BD6D
                                                                                      • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045BD7D
                                                                                      • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045BD8D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                      • API String ID: 190572456-212574377
                                                                                      • Opcode ID: e6e2d7970eb20b2f2d3a2813d8870e9f0062fcf45f3e9ec5bea086149b4b188d
                                                                                      • Instruction ID: 56c68a15e36e3577f8296096390340765d2f33f8892a2948cb77f36bf455d425
                                                                                      • Opcode Fuzzy Hash: e6e2d7970eb20b2f2d3a2813d8870e9f0062fcf45f3e9ec5bea086149b4b188d
                                                                                      • Instruction Fuzzy Hash: 55F01DB2D18700DADB04DF32AC8176236A5E768316F14803BAA45562A2D77C084CCB5C
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(oleacc.dll,?,0044EABD), ref: 0044C21F
                                                                                      • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C230
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C240
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad
                                                                                      • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                      • API String ID: 2238633743-1050967733
                                                                                      • Opcode ID: 070ab4bd4afa3ae6b6d67b7cdbce7e38f91889c9ccd0faa5c964c3c5c3461b15
                                                                                      • Instruction ID: 433fed67622e38403ad12c2b69c23a269c66bc576510ece0f105dc57e33200d4
                                                                                      • Opcode Fuzzy Hash: 070ab4bd4afa3ae6b6d67b7cdbce7e38f91889c9ccd0faa5c964c3c5c3461b15
                                                                                      • Instruction Fuzzy Hash: 76F0FEB0A427018AEB50ABF5DDC57123294F32070CF1951BBA001561A1C7FE5588CA2D
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0049036E,QueryCancelAutoPlay,0049324C), ref: 0042E76A
                                                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E770
                                                                                      • InterlockedExchange.KERNEL32(00496660,00000001), ref: 0042E781
                                                                                      • ChangeWindowMessageFilter.USER32(0000C1D7,00000001), ref: 0042E792
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressChangeExchangeFilterHandleInterlockedMessageModuleProcWindow
                                                                                      • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                      • API String ID: 1365377179-2498399450
                                                                                      • Opcode ID: fa00e12cc4cdf4861ecf6d36c6a3bf7660c016f9e535c548e0154396b519efb6
                                                                                      • Instruction ID: 0b0503ffc39751afc322a6ee3a4e58809baba8ea613a81ff3af562a8b1a90306
                                                                                      • Opcode Fuzzy Hash: fa00e12cc4cdf4861ecf6d36c6a3bf7660c016f9e535c548e0154396b519efb6
                                                                                      • Instruction Fuzzy Hash: 7FE0ECA1741310EAEA207BA27D8AF5A39949764715F51403BF104651E2C6BD0C40C91C
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,00493242), ref: 0047408E
                                                                                      • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047409B
                                                                                      • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 004740AB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                      • API String ID: 667068680-222143506
                                                                                      • Opcode ID: 5eed5f223692949adde618fed31680a65b1dac78b626770854a6ad78c0fe1b78
                                                                                      • Instruction ID: 0d19a0d9c31f114b981f83037a23f21ddb5836e87f543a540fedd059151603c0
                                                                                      • Opcode Fuzzy Hash: 5eed5f223692949adde618fed31680a65b1dac78b626770854a6ad78c0fe1b78
                                                                                      • Instruction Fuzzy Hash: B0C0C9E1285780EDAA00A7B11CC29B72548C590B29720813B7148792D2D67C0808CF2C
                                                                                      APIs
                                                                                      • GetFocus.USER32 ref: 0041B6B5
                                                                                      • 73E9A570.USER32(?), ref: 0041B6C1
                                                                                      • 73E98830.GDI32(00000000,?,00000000,00000000,0041B78C,?,?), ref: 0041B6F6
                                                                                      • 73E922A0.GDI32(00000000,00000000,?,00000000,00000000,0041B78C,?,?), ref: 0041B702
                                                                                      • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B76A,?,00000000,0041B78C,?,?), ref: 0041B730
                                                                                      • 73E98830.GDI32(00000000,00000000,00000000,0041B771,?,?,00000000,00000000,0041B76A,?,00000000,0041B78C,?,?), ref: 0041B764
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: E98830$A570A6310E922Focus
                                                                                      • String ID:
                                                                                      • API String ID: 184897721-0
                                                                                      • Opcode ID: 07ef95a0fb610648cfd8636f7bb4d0994a53704ba577931f4d82accc70482d19
                                                                                      • Instruction ID: 06dd750ffd38faa4806619bbf82afcbb6c92213719a6bc319da55d16d67b79f4
                                                                                      • Opcode Fuzzy Hash: 07ef95a0fb610648cfd8636f7bb4d0994a53704ba577931f4d82accc70482d19
                                                                                      • Instruction Fuzzy Hash: 8E512C70A00609AFDF11DFA9C895AEEBBB8FF49704F104466F510A7390D7789981CBA9
                                                                                      APIs
                                                                                      • GetFocus.USER32 ref: 0041B987
                                                                                      • 73E9A570.USER32(?), ref: 0041B993
                                                                                      • 73E98830.GDI32(00000000,?,00000000,00000000,0041BA59,?,?), ref: 0041B9CD
                                                                                      • 73E922A0.GDI32(00000000,00000000,?,00000000,00000000,0041BA59,?,?), ref: 0041B9D9
                                                                                      • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BA37,?,00000000,0041BA59,?,?), ref: 0041B9FD
                                                                                      • 73E98830.GDI32(00000000,00000000,00000000,0041BA3E,?,?,00000000,00000000,0041BA37,?,00000000,0041BA59,?,?), ref: 0041BA31
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: E98830$A570A6310E922Focus
                                                                                      • String ID:
                                                                                      • API String ID: 184897721-0
                                                                                      • Opcode ID: 6e3cb66e1f03a8473b81b7a24d1d9b736a83310d04235b0cfb06a94d2ee0ce24
                                                                                      • Instruction ID: 49b1e422d63778e1935042bf56866254f806bc58ba08b8974fd4ee1451f7b7cb
                                                                                      • Opcode Fuzzy Hash: 6e3cb66e1f03a8473b81b7a24d1d9b736a83310d04235b0cfb06a94d2ee0ce24
                                                                                      • Instruction Fuzzy Hash: 4F512B74A006089FCB11DFA9C895AAEBBF9FF48700F118066F904EB750D7389D40CBA8
                                                                                      APIs
                                                                                      • GetFocus.USER32 ref: 0041B4EE
                                                                                      • 73E9A570.USER32(?,00000000,0041B5C8,?,?,?,?), ref: 0041B4FA
                                                                                      • 73EA4620.GDI32(?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8,?,?,?,?), ref: 0041B516
                                                                                      • 73ECE680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8,?,?,?,?), ref: 0041B533
                                                                                      • 73ECE680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8), ref: 0041B54A
                                                                                      • 73E9A480.USER32(?,?,0041B5A3,?,?), ref: 0041B596
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: E680$A4620A480A570Focus
                                                                                      • String ID:
                                                                                      • API String ID: 2226671993-0
                                                                                      • Opcode ID: dffe9a4686f16107f5e26edd6f51779d739af283e940a3615cd9a04b614b528f
                                                                                      • Instruction ID: a6e4b16520c9e4bc630ca31e265eea6a5194191570467489af8bdb357d288b52
                                                                                      • Opcode Fuzzy Hash: dffe9a4686f16107f5e26edd6f51779d739af283e940a3615cd9a04b614b528f
                                                                                      • Instruction Fuzzy Hash: 2D41C571A04254AFDF10DFA9C885AAFBBB5EF49704F1484AAE900E7351D2389D10CBA5
                                                                                      APIs
                                                                                      • SetLastError.KERNEL32(00000057,00000000,0045B7F4,?,?,?,?,00000000), ref: 0045B793
                                                                                      • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045B860,?,00000000,0045B7F4,?,?,?,?,00000000), ref: 0045B7D2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast
                                                                                      • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                      • API String ID: 1452528299-1580325520
                                                                                      • Opcode ID: c7af221143c3757ba6277ed71e4eb1831b258c6f2836e0d3f8732b0bdbf4d2ee
                                                                                      • Instruction ID: e717c2d1a7dc230ecc2a2e6fa1343dbc2c1f959998bf22c76ea0b4b3804cf210
                                                                                      • Opcode Fuzzy Hash: c7af221143c3757ba6277ed71e4eb1831b258c6f2836e0d3f8732b0bdbf4d2ee
                                                                                      • Instruction Fuzzy Hash: 59117835204608AFDB11EAA2C941B6A76ADD788306F608077AD0456783D77C5F0A959D
                                                                                      APIs
                                                                                      • GetSystemMetrics.USER32(0000000B), ref: 0041BD45
                                                                                      • GetSystemMetrics.USER32(0000000C), ref: 0041BD4F
                                                                                      • 73E9A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD59
                                                                                      • 73EA4620.GDI32(00000000,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD80
                                                                                      • 73EA4620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD8D
                                                                                      • 73E9A480.USER32(00000000,00000000,0041BDD3,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDC6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: A4620MetricsSystem$A480A570
                                                                                      • String ID:
                                                                                      • API String ID: 4120540252-0
                                                                                      • Opcode ID: 1c903c0536bb10720712021bcda66a401c12054db1b22576e6386974878fa910
                                                                                      • Instruction ID: 8181195c8b7ace5e518c23098daf85fccaa127339f370ed271397b7e8efdaee2
                                                                                      • Opcode Fuzzy Hash: 1c903c0536bb10720712021bcda66a401c12054db1b22576e6386974878fa910
                                                                                      • Instruction Fuzzy Hash: 1F212C74E046499FEB04EFA9C941BEEB7B4EB48714F10402AF514B7680D7785940CFA9
                                                                                      APIs
                                                                                      • GetWindowLongA.USER32(?,000000EC), ref: 0047927E
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,00468BAA), ref: 004792A4
                                                                                      • GetWindowLongA.USER32(?,000000EC), ref: 004792B4
                                                                                      • SetWindowLongA.USER32(?,000000EC,00000000), ref: 004792D5
                                                                                      • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 004792E9
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 00479305
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Long$Show
                                                                                      • String ID:
                                                                                      • API String ID: 3609083571-0
                                                                                      • Opcode ID: 037c1e32dd2642cc50d0277f9f736c0c320296323ac053b412311dd49e28eafc
                                                                                      • Instruction ID: 4d45455b4d1dd4b2c508ae6452d3c78deeda3d3e7450a597efbdbc1d096824fd
                                                                                      • Opcode Fuzzy Hash: 037c1e32dd2642cc50d0277f9f736c0c320296323ac053b412311dd49e28eafc
                                                                                      • Instruction Fuzzy Hash: B9015EB5641310ABD700E768DD81F263B98AB1E330F0606AAB959DF3E7C639DC048B18
                                                                                      APIs
                                                                                        • Part of subcall function 0041A650: CreateBrushIndirect.GDI32 ref: 0041A6BB
                                                                                      • UnrealizeObject.GDI32(00000000), ref: 0041B1EC
                                                                                      • SelectObject.GDI32(?,00000000), ref: 0041B1FE
                                                                                      • SetBkColor.GDI32(?,00000000), ref: 0041B221
                                                                                      • SetBkMode.GDI32(?,00000002), ref: 0041B22C
                                                                                      • SetBkColor.GDI32(?,00000000), ref: 0041B247
                                                                                      • SetBkMode.GDI32(?,00000001), ref: 0041B252
                                                                                        • Part of subcall function 00419FC8: GetSysColor.USER32(?), ref: 00419FD2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                      • String ID:
                                                                                      • API String ID: 3527656728-0
                                                                                      • Opcode ID: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                                                                      • Instruction ID: 2be34f36c4bf399c8fa5e8a938e63ded300dcfd20fe04f8c9e05bbd916d2a40e
                                                                                      • Opcode Fuzzy Hash: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                                                                      • Instruction Fuzzy Hash: 84F0BFB1511101ABCE00FFBAD9CAE4B27A89F443097048057B944DF19BC63CDC504B3E
                                                                                      APIs
                                                                                      • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 004724B6
                                                                                      • 73EA59E0.USER32(00000000,000000FC,00472414,00000000,00472646,?,00000000,0047266B), ref: 004724DD
                                                                                      • GetACP.KERNEL32(00000000,00472646,?,00000000,0047266B), ref: 0047251A
                                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00472560
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClassInfoMessageSend
                                                                                      • String ID: COMBOBOX
                                                                                      • API String ID: 1455646776-1136563877
                                                                                      • Opcode ID: 2494eb77be1e0edaf4ac2089fb308deb96536dac66c833c5e7946f84bffa6ab9
                                                                                      • Instruction ID: cb5c9aae2de1f6f31ba47a78a2c89e9f0e2bb96aecd870e4ce07d9e094be5fb6
                                                                                      • Opcode Fuzzy Hash: 2494eb77be1e0edaf4ac2089fb308deb96536dac66c833c5e7946f84bffa6ab9
                                                                                      • Instruction Fuzzy Hash: F4514F74A04205AFC710DF65DA85EDAB7F5EB49304F1581BBF808AB3A2C778AD41CB58
                                                                                      APIs
                                                                                        • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                                      • ShowWindow.USER32(?,00000005,00000000,0049271D,?,?,00000000), ref: 004924EE
                                                                                        • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                                                        • Part of subcall function 00407210: SetCurrentDirectoryA.KERNEL32(00000000,?,00492516,00000000,004926E9,?,?,00000005,00000000,0049271D,?,?,00000000), ref: 0040721B
                                                                                        • Part of subcall function 0042D328: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3B6,?,?,00000000,?,?,00492520,00000000,004926E9,?,?,00000005), ref: 0042D35D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                      • String ID: .dat$.msg$IMsg$Uninstall
                                                                                      • API String ID: 3312786188-1660910688
                                                                                      • Opcode ID: d8b767a4e34b569ce73df8f101cabac2d674949f6b0fce57bb6887b20208c213
                                                                                      • Instruction ID: 355638249edcb87860175999b9826d121cd81d9e81ad854bfd2fce74e3c3dc59
                                                                                      • Opcode Fuzzy Hash: d8b767a4e34b569ce73df8f101cabac2d674949f6b0fce57bb6887b20208c213
                                                                                      • Instruction Fuzzy Hash: 08317534A10204AFCB01FFA5DD5299E7FB5EB49304F91847AF400A7752CB78AD01CB98
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegCloseKey.ADVAPI32(?,0048D7DE,?,?,00000001,00000000,00000000,0048D7F9), ref: 0048D7C7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen
                                                                                      • String ID: PI$%s\%s_is1$Inno Setup CodeFile: $Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                      • API String ID: 47109696-2023862778
                                                                                      • Opcode ID: 631d1d32ed976d7a2296184d5c0d2f3cf8c369661ad41bfb37e5f76fcf4f9ba7
                                                                                      • Instruction ID: 2fcff84c3ae67162e3ffacf77063da78f15bdb16a6a8b48b49f63a94f6242022
                                                                                      • Opcode Fuzzy Hash: 631d1d32ed976d7a2296184d5c0d2f3cf8c369661ad41bfb37e5f76fcf4f9ba7
                                                                                      • Instruction Fuzzy Hash: 96314174E042089FDB11EFAADC51A9EBBF8EB48704F90487BE414E7391D7789A058B58
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042E802
                                                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E808
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042E831
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                      • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                      • API String ID: 828529508-2866557904
                                                                                      • Opcode ID: a8508c04b9d2f5bfbb96bb821981feec28a03bb8c83af4d38bd3e4f3c08e389f
                                                                                      • Instruction ID: ad48e71c188330483611c0ccbf5126987ea3f08380f38d7ba2466a98a55f956a
                                                                                      • Opcode Fuzzy Hash: a8508c04b9d2f5bfbb96bb821981feec28a03bb8c83af4d38bd3e4f3c08e389f
                                                                                      • Instruction Fuzzy Hash: 35F0C2D138066176E620B2BBAC82F6B158C8F94765F540036F148EB2C2EA6CC905426E
                                                                                      APIs
                                                                                      • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00456298
                                                                                      • GetExitCodeProcess.KERNEL32(?,00492E02), ref: 004562B9
                                                                                      • CloseHandle.KERNEL32(?,004562EC,?,?,00456B07,00000000,00000000), ref: 004562DF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                      • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                      • API String ID: 2573145106-3235461205
                                                                                      • Opcode ID: b905d95b21eb16817882d878bed5eaf33046abd5eff07b3401a45a878f64f984
                                                                                      • Instruction ID: 30010b37e156efe240ce284c3751ee9f3f87d85e2b6a261707359958cd490efa
                                                                                      • Opcode Fuzzy Hash: b905d95b21eb16817882d878bed5eaf33046abd5eff07b3401a45a878f64f984
                                                                                      • Instruction Fuzzy Hash: 9801A234604204AFDB10FBA98D12A2A77E8EB49710F9104B7F910E73D3DA7D9D08861C
                                                                                      APIs
                                                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 004732D0
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004733C7,0pI,00000000), ref: 004732E3
                                                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 004732E9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                      • String ID: AllowSetForegroundWindow$user32.dll
                                                                                      • API String ID: 1782028327-3855017861
                                                                                      • Opcode ID: d3186cc3dc794e7465d39709d056f6715875b1f20938bb44e2ef386321cd694c
                                                                                      • Instruction ID: 249699eff17dbda02fe1af5a7c4854b1352fabbd495b9b7335dc6b3b1f0a0c65
                                                                                      • Opcode Fuzzy Hash: d3186cc3dc794e7465d39709d056f6715875b1f20938bb44e2ef386321cd694c
                                                                                      • Instruction Fuzzy Hash: DBD05E9020070275D9107AF54D47D5B224C8984712710857B3414F6183CD3CDA006A6D
                                                                                      APIs
                                                                                      • BeginPaint.USER32(00000000,?), ref: 00416BC2
                                                                                      • SaveDC.GDI32(?), ref: 00416BF3
                                                                                      • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416CB5), ref: 00416C54
                                                                                      • RestoreDC.GDI32(?,?), ref: 00416C7B
                                                                                      • EndPaint.USER32(00000000,?,00416CBC,00000000,00416CB5), ref: 00416CAF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                      • String ID:
                                                                                      • API String ID: 3808407030-0
                                                                                      • Opcode ID: c06abe95da4831753d63b9634986ca39a884699dacb8f14d7531f4240f3d7fe3
                                                                                      • Instruction ID: 41fb8ea60d97978a9acdf236596d3a8a0d8a1996066437b2b943a95edf1585a8
                                                                                      • Opcode Fuzzy Hash: c06abe95da4831753d63b9634986ca39a884699dacb8f14d7531f4240f3d7fe3
                                                                                      • Instruction Fuzzy Hash: BF414E70A042049FDB14DB99C989FAA77F9EB48304F1580AEE4459B362D778DD40CB58
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 50d6a748b1b1338860e82f27f8761871ff193d734180217a0f8d82b491afa6e7
                                                                                      • Instruction ID: 41a7722d09b35ce9ade17cd18fdec9692d257bae8bd1aa266952c484067d5cda
                                                                                      • Opcode Fuzzy Hash: 50d6a748b1b1338860e82f27f8761871ff193d734180217a0f8d82b491afa6e7
                                                                                      • Instruction Fuzzy Hash: D3311F746047409FC320EB69C584BABB7E8AF89714F04991EF9E5C7791D738EC818B19
                                                                                      APIs
                                                                                      • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429778
                                                                                      • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004297A7
                                                                                      • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 004297C3
                                                                                      • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 004297EE
                                                                                      • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042980C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend
                                                                                      • String ID:
                                                                                      • API String ID: 3850602802-0
                                                                                      • Opcode ID: fe9210cf49636514123fe8028928f87ce2f158866a525e02be5b173165c2f537
                                                                                      • Instruction ID: 5c059f72bad19c8464015bcf3ba3f3fa2ba546ca9f5ab3c2e37583cf1b766786
                                                                                      • Opcode Fuzzy Hash: fe9210cf49636514123fe8028928f87ce2f158866a525e02be5b173165c2f537
                                                                                      • Instruction Fuzzy Hash: 2E217F70710714BAE710ABA6DC82F5B77ACEB46708F90443EB501BB3D2DB78AD41865C
                                                                                      APIs
                                                                                      • GetSystemMetrics.USER32(0000000B), ref: 0041BB3A
                                                                                      • GetSystemMetrics.USER32(0000000C), ref: 0041BB44
                                                                                      • 73E9A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BB82
                                                                                      • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BCED,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BBC9
                                                                                      • DeleteObject.GDI32(00000000), ref: 0041BC0A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem$A570A6310DeleteObject
                                                                                      • String ID:
                                                                                      • API String ID: 3435189566-0
                                                                                      • Opcode ID: cb0e2adf6529593e89f90c831e9305c3e05f521d232314fc64d16b3fc11dbc77
                                                                                      • Instruction ID: e64c8cfb77975bfe1c5019289902123c5e37d94f13133d85ba8c481b6df62587
                                                                                      • Opcode Fuzzy Hash: cb0e2adf6529593e89f90c831e9305c3e05f521d232314fc64d16b3fc11dbc77
                                                                                      • Instruction Fuzzy Hash: 91316F74E00609EFDB00DFA5C941AAEB7F4EB48700F10846AF510AB781D7389E80DB98
                                                                                      APIs
                                                                                        • Part of subcall function 0045B728: SetLastError.KERNEL32(00000057,00000000,0045B7F4,?,?,?,?,00000000), ref: 0045B793
                                                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,0046F3D8,?,?,00000001,00497154), ref: 0046F391
                                                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,0046F3D8,?,?,00000001,00497154), ref: 0046F3A7
                                                                                      Strings
                                                                                      • Setting permissions on registry key: %s\%s, xrefs: 0046F356
                                                                                      • Could not set permissions on the registry key because it currently does not exist., xrefs: 0046F39B
                                                                                      • Failed to set permissions on registry key (%d)., xrefs: 0046F3B8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast
                                                                                      • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                      • API String ID: 1452528299-4018462623
                                                                                      • Opcode ID: 788c315b7af78b705df02674c92daeb7f44be0388b74eefc3bf89a14f2c9356d
                                                                                      • Instruction ID: ef7c6c74ecef8c5dcb146dfdc27ea61306564732d519a6a89d10c305d013d1cf
                                                                                      • Opcode Fuzzy Hash: 788c315b7af78b705df02674c92daeb7f44be0388b74eefc3bf89a14f2c9356d
                                                                                      • Instruction Fuzzy Hash: B421AA70A046445FCB00DBA9D8816AEBBE8EF49314F50417FE844E7392E7785D49876A
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                      • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                      • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$AllocString
                                                                                      • String ID:
                                                                                      • API String ID: 262959230-0
                                                                                      • Opcode ID: bbd83879051bbb61c82a419d540aea94b1d83442c47b8cdfd9cb13069dd9a881
                                                                                      • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                      • Opcode Fuzzy Hash: bbd83879051bbb61c82a419d540aea94b1d83442c47b8cdfd9cb13069dd9a881
                                                                                      • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                      APIs
                                                                                      • 73E98830.GDI32(00000000,00000000,00000000), ref: 00414389
                                                                                      • 73E922A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414391
                                                                                      • 73E98830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143A5
                                                                                      • 73E922A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143AB
                                                                                      • 73E9A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: E922E98830$A480
                                                                                      • String ID:
                                                                                      • API String ID: 3692852386-0
                                                                                      • Opcode ID: 194e3fff164acdd9274630c615ac113e6c237e1a8584744cad8ee02aea33715e
                                                                                      • Instruction ID: 94861c3129a932f854b236b0087f7367a4de39103189020794ca85cb03cdcc47
                                                                                      • Opcode Fuzzy Hash: 194e3fff164acdd9274630c615ac113e6c237e1a8584744cad8ee02aea33715e
                                                                                      • Instruction Fuzzy Hash: 6F01DF7121C3806AD200B63E8C85A9F6BED8FCA314F15556EF498DB382CA7ACC018765
                                                                                      APIs
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,00476DAD,?,00000000,00000000,00000001,00000000,00475851,?,00000000), ref: 00475815
                                                                                      Strings
                                                                                      • Failed to parse "reg" constant, xrefs: 0047581C
                                                                                      • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 00475689
                                                                                      • pUG, xrefs: 004756AE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Close
                                                                                      • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant$pUG
                                                                                      • API String ID: 3535843008-1176165611
                                                                                      • Opcode ID: 3642018d57e9592f06bab58574b61b62b6ca112a26629dc16a5ab29dcfff1776
                                                                                      • Instruction ID: a53c2b258f7a770121dbc7a1e713ee2373e0806090ae57177e88baa161e34d04
                                                                                      • Opcode Fuzzy Hash: 3642018d57e9592f06bab58574b61b62b6ca112a26629dc16a5ab29dcfff1776
                                                                                      • Instruction Fuzzy Hash: 93816274E00548AFCB10EF95D481ADEBBF9AF48314F50C16AE418BB391D778AE05CB99
                                                                                      APIs
                                                                                        • Part of subcall function 0041EFE4: GetActiveWindow.USER32 ref: 0041EFE7
                                                                                        • Part of subcall function 0041EFE4: GetCurrentThreadId.KERNEL32 ref: 0041EFFC
                                                                                        • Part of subcall function 0041EFE4: 73EA5940.USER32(00000000,Function_0001EFC0), ref: 0041F002
                                                                                        • Part of subcall function 00423118: GetSystemMetrics.USER32(00000000), ref: 0042311A
                                                                                      • OffsetRect.USER32(?,?,?), ref: 00424D39
                                                                                      • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424DFC
                                                                                      • OffsetRect.USER32(?,?,?), ref: 00424E0D
                                                                                        • Part of subcall function 004234D4: GetCurrentThreadId.KERNEL32 ref: 004234E9
                                                                                        • Part of subcall function 004234D4: SetWindowsHookExA.USER32(00000003,00423490,00000000,00000000), ref: 004234F9
                                                                                        • Part of subcall function 004234D4: CreateThread.KERNEL32(00000000,000003E8,00423440,00000000,00000000), ref: 0042351D
                                                                                        • Part of subcall function 00424A9C: SetTimer.USER32(00000000,00000001,?,00423424), ref: 00424AB7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Thread$CurrentOffsetRect$A5940ActiveCreateDrawHookMetricsSystemTextTimerWindowWindows
                                                                                      • String ID: KB
                                                                                      • API String ID: 1334498448-1869488878
                                                                                      • Opcode ID: fd017592340e6a7deae3be5c789b7c506f4553282bb9063ebaa9b04636988139
                                                                                      • Instruction ID: 8a1ca8d85bab54549b4d9d093631307a73357c8a1ef7de59c5480922928757da
                                                                                      • Opcode Fuzzy Hash: fd017592340e6a7deae3be5c789b7c506f4553282bb9063ebaa9b04636988139
                                                                                      • Instruction Fuzzy Hash: D6811771A002189FDB14DFA8D884ADEBBB5FF48314F5045AAE904AB296DB38AD45CF44
                                                                                      APIs
                                                                                      • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00406F6B
                                                                                      • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00406FE5
                                                                                      • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 0040703D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Enum$NameOpenResourceUniversal
                                                                                      • String ID: Z
                                                                                      • API String ID: 3604996873-1505515367
                                                                                      • Opcode ID: 92ba5960390d49c3d5abeb35786e3f2b2430fe15f73cbae2fbe59e8f9896e220
                                                                                      • Instruction ID: f15ffb13b1197877662b480f320dceb00dd84bb003a9336f5ebe52512d9587e7
                                                                                      • Opcode Fuzzy Hash: 92ba5960390d49c3d5abeb35786e3f2b2430fe15f73cbae2fbe59e8f9896e220
                                                                                      • Instruction Fuzzy Hash: B2515170E042099FDB11EF55C941A9EBBB9FB09304F5041BAE540BB3D1C778AE418F5A
                                                                                      APIs
                                                                                      • SetRectEmpty.USER32(?), ref: 0044CA82
                                                                                      • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044CAAD
                                                                                      • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044CB35
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: DrawText$EmptyRect
                                                                                      • String ID:
                                                                                      • API String ID: 182455014-2867612384
                                                                                      • Opcode ID: dec825a9aee2c6b09e518825b83954473c9bd52475d7aaf62d715cc4f9536ee8
                                                                                      • Instruction ID: f2b81961a5c9452665bafda12c1e8f4b26a8e6b06f7f6a997a3587ccb4a7b75e
                                                                                      • Opcode Fuzzy Hash: dec825a9aee2c6b09e518825b83954473c9bd52475d7aaf62d715cc4f9536ee8
                                                                                      • Instruction Fuzzy Hash: 6B516171900248AFDB50DFA5C8C5BDEBBF9EF49308F08447AE845EB251D778A944CB64
                                                                                      APIs
                                                                                      • 73E9A570.USER32(00000000,00000000,0042EB20,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042E9F6
                                                                                        • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                                                      • SelectObject.GDI32(?,00000000), ref: 0042EA19
                                                                                      • 73E9A480.USER32(00000000,?,0042EB05,00000000,0042EAFE,?,00000000,00000000,0042EB20,?,?,?,?,00000000,00000000,00000000), ref: 0042EAF8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: A480A570CreateFontIndirectObjectSelect
                                                                                      • String ID: ...\
                                                                                      • API String ID: 2998766281-983595016
                                                                                      • Opcode ID: b314a03392ad466b231ea2b72e8a3a9b21c4fc795225b8958865863d61eb2cce
                                                                                      • Instruction ID: f87e9a1f05be7c7dd371759d08ccf2a788e9820b1ab6f676742360811e2f955b
                                                                                      • Opcode Fuzzy Hash: b314a03392ad466b231ea2b72e8a3a9b21c4fc795225b8958865863d61eb2cce
                                                                                      • Instruction Fuzzy Hash: 66315270B00128ABDF11EB9AD841BAEBBB8FF48304F91447BF410A7291D7789E45CA59
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004915B5,_iu,?,00000000,004525FE), ref: 004525B3
                                                                                      • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004915B5,_iu,?,00000000,004525FE), ref: 004525C3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateFileHandle
                                                                                      • String ID: .tmp$_iu
                                                                                      • API String ID: 3498533004-10593223
                                                                                      • Opcode ID: 0390d67cb0cdb1cdfe7b265348a3f126b325b0e84e7214b7738f97ac8063fbc8
                                                                                      • Instruction ID: e65077276ccf3fce125a3b1cef4711b6e1a57cb68d75bf9d1e013844d831b580
                                                                                      • Opcode Fuzzy Hash: 0390d67cb0cdb1cdfe7b265348a3f126b325b0e84e7214b7738f97ac8063fbc8
                                                                                      • Instruction Fuzzy Hash: CF31B870A40209ABCB11EBA5C942B9EBBB5AF45309F60447BF804B73C2E7785F05876D
                                                                                      APIs
                                                                                      • GetClassInfoA.USER32(00400000,?,?), ref: 004163EF
                                                                                      • UnregisterClassA.USER32(?,00400000), ref: 0041641B
                                                                                      • RegisterClassA.USER32(?), ref: 0041643E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Class$InfoRegisterUnregister
                                                                                      • String ID: @
                                                                                      • API String ID: 3749476976-2766056989
                                                                                      • Opcode ID: 5cbec8acbea9e71dae0b2083da7465dc5d1b6b33c382e5651f178c5e9f182fd1
                                                                                      • Instruction ID: e8561198b81c08f142b3a544c89b4739d35f798691a26b07e42a1fbbf62ba06a
                                                                                      • Opcode Fuzzy Hash: 5cbec8acbea9e71dae0b2083da7465dc5d1b6b33c382e5651f178c5e9f182fd1
                                                                                      • Instruction Fuzzy Hash: 94316E706042058BD760EF68C981B9B77E5AB88308F04447FF985DB392DB39D9448B6E
                                                                                      APIs
                                                                                      • GetFileAttributesA.KERNEL32(00000000,00493199,00000000,004929C2,?,?,00000000,00496628), ref: 0049293C
                                                                                      • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00493199,00000000,004929C2,?,?,00000000,00496628), ref: 00492965
                                                                                      • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0049297E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Attributes$Move
                                                                                      • String ID: isRS-%.3u.tmp
                                                                                      • API String ID: 3839737484-3657609586
                                                                                      • Opcode ID: ca7de64efd1a81cfe0b197b1df468b3a71946ac3222c8e5426d60e2b27b10d4a
                                                                                      • Instruction ID: f317836663e3456f6962b38be5478bf9a68de7f196930fcf54a7ed662431e31d
                                                                                      • Opcode Fuzzy Hash: ca7de64efd1a81cfe0b197b1df468b3a71946ac3222c8e5426d60e2b27b10d4a
                                                                                      • Instruction Fuzzy Hash: 682175B1E00219BFCF01EFA9C981AAFBBB8EF44314F10453BB814B72D1D6785E018A59
                                                                                      APIs
                                                                                      • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                      • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExitMessageProcess
                                                                                      • String ID: Error$Runtime error at 00000000
                                                                                      • API String ID: 1220098344-2970929446
                                                                                      • Opcode ID: 8c8c0f2434a4a7f5450b7d1f87c82a5e4d49965682bc3ad0c70a84493f0d02f9
                                                                                      • Instruction ID: 7ca15834b35bf0f9f7e67f0c6f6a322a9a8b6c98d325c36795369cb21074e1e4
                                                                                      • Opcode Fuzzy Hash: 8c8c0f2434a4a7f5450b7d1f87c82a5e4d49965682bc3ad0c70a84493f0d02f9
                                                                                      • Instruction Fuzzy Hash: 9221B360A442418ADB11E7B9ECC1B163F919BE5348F06817BE700B73E6C67C884587AE
                                                                                      APIs
                                                                                        • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                                                        • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                        • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                      • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00455068
                                                                                      • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00455095
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                      • String ID: LoadTypeLib$RegisterTypeLib
                                                                                      • API String ID: 1312246647-2435364021
                                                                                      • Opcode ID: 10250a5388d3ee4e550ba31a3fe5ac1922547201747451197e41336d70963160
                                                                                      • Instruction ID: a0afcb3eee2e7d482a942a29ca59f5276f9681079562e2f4f26ed5ddc6a25d5d
                                                                                      • Opcode Fuzzy Hash: 10250a5388d3ee4e550ba31a3fe5ac1922547201747451197e41336d70963160
                                                                                      • Instruction Fuzzy Hash: B3119A30B00A04BFDB11DFA6DD61A5EBBBDDB49B05B108476FD00D3692DA399D04C654
                                                                                      APIs
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004912FB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window
                                                                                      • String ID: (PI$/INITPROCWND=$%x $@
                                                                                      • API String ID: 2353593579-723503215
                                                                                      • Opcode ID: 86e6223bfffcafd1a2f65b692b323bd489f5f98954c4b0d8703fa7141f283f5b
                                                                                      • Instruction ID: 1f11efd2ee19ddf28ed764c7ee5ed9f3dfbff071989b61bae05a2d8f1a94ab96
                                                                                      • Opcode Fuzzy Hash: 86e6223bfffcafd1a2f65b692b323bd489f5f98954c4b0d8703fa7141f283f5b
                                                                                      • Instruction Fuzzy Hash: 4611C071A082099FDB01EBA5D841BAEBFB8EB48304F50447BE804E7692D6789904CB58
                                                                                      APIs
                                                                                        • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                                      • GetFocus.USER32 ref: 00473BBF
                                                                                      • GetKeyState.USER32(0000007A), ref: 00473BD1
                                                                                      • WaitMessage.USER32(?,00000000,00473BF8,?,00000000,00473C1F,?,?,00000001,00000000,?,?,?,?,0047AFF7,00000000), ref: 00473BDB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: FocusMessageStateTextWaitWindow
                                                                                      • String ID: Wnd=$%x
                                                                                      • API String ID: 1381870634-2927251529
                                                                                      • Opcode ID: 148b3ddb7fb618247b6546acefc5128578639e1ec72ed586d201cbdf9417bc3e
                                                                                      • Instruction ID: 9b2db89c6fe012053fe9ee9db841d35393315fe18e075f30de14d411f09ec015
                                                                                      • Opcode Fuzzy Hash: 148b3ddb7fb618247b6546acefc5128578639e1ec72ed586d201cbdf9417bc3e
                                                                                      • Instruction Fuzzy Hash: A111A371604205AFC701FF65CC42ADEBBB8EB49704B51C4BAF408E7681D738AF00AA69
                                                                                      APIs
                                                                                      • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045540D
                                                                                      • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045549F
                                                                                      Strings
                                                                                      • 4II, xrefs: 00455454
                                                                                      • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00455439
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend
                                                                                      • String ID: 4II$Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)
                                                                                      • API String ID: 3850602802-2462613993
                                                                                      • Opcode ID: 21981b69b3b60292a9e34021e10eefbd607064df05416549cbbf09db8aab2aab
                                                                                      • Instruction ID: b78d32421564deef5ec6d5e0726a4814eb3dcf40a391e8832c227d70dedd3d0b
                                                                                      • Opcode Fuzzy Hash: 21981b69b3b60292a9e34021e10eefbd607064df05416549cbbf09db8aab2aab
                                                                                      • Instruction Fuzzy Hash: 7411E5B1204240AFD700AB29AC81B6F7A9C9791309F05403FF9859F393D3794804C76A
                                                                                      APIs
                                                                                      • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046A540
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046A54F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$File$LocalSystem
                                                                                      • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                      • API String ID: 1748579591-1013271723
                                                                                      • Opcode ID: 77c66de3cf485688cd8a454c74e7d13fa64a864e7151765c05c799678a767d6c
                                                                                      • Instruction ID: 3d329a02b99cf0ad1c2443f5a734abd9e2d9e95f88f8d85801cc299a54af140a
                                                                                      • Opcode Fuzzy Hash: 77c66de3cf485688cd8a454c74e7d13fa64a864e7151765c05c799678a767d6c
                                                                                      • Instruction Fuzzy Hash: 6111F8A040C3919ED340DF2AC44432BBAE4AB89704F04892FF9D8D6381E779C948DBB7
                                                                                      APIs
                                                                                      • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00452A67
                                                                                        • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,00492DAD,00000000,00492E02,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                                                      • MoveFileA.KERNEL32(00000000,00000000), ref: 00452A8C
                                                                                        • Part of subcall function 004520A4: GetLastError.KERNEL32(00000000,00452B15,00000005,00000000,00452B4A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00492A61,00000000), ref: 004520A7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AttributesDeleteErrorLastMove
                                                                                      • String ID: DeleteFile$MoveFile
                                                                                      • API String ID: 3024442154-139070271
                                                                                      • Opcode ID: cba485c4373cb9b3476474b8e686bddda4e38f58d72cb5e4c066a25f76e66c5c
                                                                                      • Instruction ID: f8b9d45963fbba9a2c353dd22a61e6c6557ef6b5226e77028bb226458c331aba
                                                                                      • Opcode Fuzzy Hash: cba485c4373cb9b3476474b8e686bddda4e38f58d72cb5e4c066a25f76e66c5c
                                                                                      • Instruction Fuzzy Hash: 32F036757141055BE704FFA6DA5266F63ECEF4530AFA0443BB800B76C3EA7C9E094929
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0047E371
                                                                                      • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0047E394
                                                                                      Strings
                                                                                      • CSDVersion, xrefs: 0047E368
                                                                                      • System\CurrentControlSet\Control\Windows, xrefs: 0047E33E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpenQueryValue
                                                                                      • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                      • API String ID: 3677997916-1910633163
                                                                                      • Opcode ID: 0901654d9ab6cc44d6c913291a9ded88af89d372fc2709b86358ce193460f02c
                                                                                      • Instruction ID: 8efd12000c89c59f245f9e1a1bb94511b09fbcc5fab7c17f0dd19fd863842872
                                                                                      • Opcode Fuzzy Hash: 0901654d9ab6cc44d6c913291a9ded88af89d372fc2709b86358ce193460f02c
                                                                                      • Instruction Fuzzy Hash: EFF03675A40209E6DF10D6E28C45BDF77BCAB08708F1086A7EE14E7280E7789A44CB59
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00457C5A,00000000,00457DA7,?,00000000,00000000,00000000), ref: 00457B75
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen
                                                                                      • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                      • API String ID: 47109696-2631785700
                                                                                      • Opcode ID: 23cb1f2033dc3865c53e7f2342fb28a5b001a15c0a0e235066296095a06ac94b
                                                                                      • Instruction ID: d0e0819fb55c8f1190b2a98828cf62c2b63c39478ea79f7c0b5f5cfc857af762
                                                                                      • Opcode Fuzzy Hash: 23cb1f2033dc3865c53e7f2342fb28a5b001a15c0a0e235066296095a06ac94b
                                                                                      • Instruction Fuzzy Hash: 0DF0AF317041205BC710EB1AF851B4A6689DB9131AF54403BF980D7256D77DEC0A875A
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00452762,00000000,00452805,?,?,00000000,00000000,00000000,00000000,00000000,?,00452AD1,00000000), ref: 0042D7E6
                                                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D7EC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                      • API String ID: 1646373207-4063490227
                                                                                      • Opcode ID: 159a61d3abceb67132d836cbc908e23cdc840a77e135d0af2cc19f2b4bcaaff8
                                                                                      • Instruction ID: 4db8f333c9a0d948aa4d288d669557f69a64c6eaa67e0ad6c3f7b03414b73d9c
                                                                                      • Opcode Fuzzy Hash: 159a61d3abceb67132d836cbc908e23cdc840a77e135d0af2cc19f2b4bcaaff8
                                                                                      • Instruction Fuzzy Hash: 23E04F61B44B1112D7107ABA9C83A5B10898B88724FA0843B79A5E72C7EDBCD94A1A7D
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042E7F8), ref: 0042E88A
                                                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E890
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                      • API String ID: 1646373207-260599015
                                                                                      • Opcode ID: 45ddc528c20c35e0718a7e9c00f94a1c84d7b78ddc924b0a461653c56359e4f8
                                                                                      • Instruction ID: 93babc8de609d28a759936f35cc35ab5444e0eee9e0897fa3c7a0f5d424eaefa
                                                                                      • Opcode Fuzzy Hash: 45ddc528c20c35e0718a7e9c00f94a1c84d7b78ddc924b0a461653c56359e4f8
                                                                                      • Instruction Fuzzy Hash: 5FD0C992352B726A6A1075FB3CD19EB02CCCE517B53A40077F684E7342EAADCC0535AD
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00493215), ref: 0044F1B3
                                                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F1B9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: NotifyWinEvent$user32.dll
                                                                                      • API String ID: 1646373207-597752486
                                                                                      • Opcode ID: 1b77f3625f350db58ab3348097a305bf1d639b9e1269e079a5da3a737ffde695
                                                                                      • Instruction ID: 84f0676aae26238d79669219dc5dd421ce8b9c86ef8cbad31698c6a02a110ee9
                                                                                      • Opcode Fuzzy Hash: 1b77f3625f350db58ab3348097a305bf1d639b9e1269e079a5da3a737ffde695
                                                                                      • Instruction Fuzzy Hash: 25E012E0A01740DDEB10FBB5D942B0B3EA0EB5475DB01017BB4006619AC77C4C088B1D
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00493266,00000001,00000000,0049328A), ref: 00492FEA
                                                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00492FF0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                      • API String ID: 1646373207-834958232
                                                                                      • Opcode ID: 7dd0ed140dce1b1c3cfbac4273f952859e09270a56939a23c95a62daeb5fa57b
                                                                                      • Instruction ID: 931628e3c560cbc195009d45a592bfebd759f3ec05311ed7f501d7576358ba43
                                                                                      • Opcode Fuzzy Hash: 7dd0ed140dce1b1c3cfbac4273f952859e09270a56939a23c95a62daeb5fa57b
                                                                                      • Instruction Fuzzy Hash: A1B09281281701A08C1076F20E42E5B0C18584072571400373400B10CBCEACCA00382D
                                                                                      APIs
                                                                                        • Part of subcall function 0044B08C: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F1A9,00493215), ref: 0044B0B3
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B0CB
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B0DD
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B0EF
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B101
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B113
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B125
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B137
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B149
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B15B
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B16D
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B17F
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B191
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B1A3
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B1B5
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B1C7
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B1D9
                                                                                        • Part of subcall function 0044B08C: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B1EB
                                                                                      • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00493238), ref: 00460EBB
                                                                                      • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00460EC1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad
                                                                                      • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                      • API String ID: 2238633743-2683653824
                                                                                      • Opcode ID: 93fe2c06cf711e01664fd138f27f9ab14834f9042b92f4705049898ce8c901dd
                                                                                      • Instruction ID: c6d074b57e85807914eec84ee8616fe1a8135e5451870e443c9658575dc96a53
                                                                                      • Opcode Fuzzy Hash: 93fe2c06cf711e01664fd138f27f9ab14834f9042b92f4705049898ce8c901dd
                                                                                      • Instruction Fuzzy Hash: 4EB092D0A51B11E48E10B7B39C4390B1814C544B0E710493BB0607A083EB7E40044E6E
                                                                                      APIs
                                                                                      • GetDesktopWindow.USER32 ref: 00413CB6
                                                                                      • GetDesktopWindow.USER32 ref: 00413D6E
                                                                                        • Part of subcall function 00418E30: 6FA2C6F0.COMCTL32(?,00000000,00413F33,00000000,00414043,?,?,00496628), ref: 00418E4C
                                                                                        • Part of subcall function 00418E30: ShowCursor.USER32(00000001,?,00000000,00413F33,00000000,00414043,?,?,00496628), ref: 00418E69
                                                                                      • SetCursor.USER32(00000000,?,?,?,?,00413A63,00000000,00413A76), ref: 00413DAC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CursorDesktopWindow$Show
                                                                                      • String ID:
                                                                                      • API String ID: 2074268717-0
                                                                                      • Opcode ID: 86f28fd5b8e67e4ed68fb8d3243ff4e40f6b005c19925ef4854e6769390e0e23
                                                                                      • Instruction ID: 370eb430aafb64f03e0c00a45e78fc31171da0b863367db60babd08861f95fe9
                                                                                      • Opcode Fuzzy Hash: 86f28fd5b8e67e4ed68fb8d3243ff4e40f6b005c19925ef4854e6769390e0e23
                                                                                      • Instruction Fuzzy Hash: 5C412A75600150AFCB10EF29F988B9677E1AB65325B17847FE404DB369DA38EC81CF58
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 004089DD
                                                                                      • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408A4C
                                                                                      • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408AE7
                                                                                      • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408B26
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: LoadString$FileMessageModuleName
                                                                                      • String ID:
                                                                                      • API String ID: 704749118-0
                                                                                      • Opcode ID: 3ad30de8adde06992adcb1243033629fda3c93d42ee346dc6366a67b7f75c718
                                                                                      • Instruction ID: d4d784650a0269eb12294142f4e6c1e51b8c8d651a7e98bb559ca79e8df8d1d5
                                                                                      • Opcode Fuzzy Hash: 3ad30de8adde06992adcb1243033629fda3c93d42ee346dc6366a67b7f75c718
                                                                                      • Instruction Fuzzy Hash: 8F3141706083809FD730EB65C945B9B77E89B86304F40483FB6C8EB2D1DB7999098B67
                                                                                      APIs
                                                                                      • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E341
                                                                                        • Part of subcall function 0044C984: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044C9B6
                                                                                      • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E3C5
                                                                                        • Part of subcall function 0042BB24: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BB38
                                                                                      • IsRectEmpty.USER32(?), ref: 0044E387
                                                                                      • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E3AA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                      • String ID:
                                                                                      • API String ID: 855768636-0
                                                                                      • Opcode ID: 3f1c9d4db00e826481b178ab64ea00970205f687122e4d4c1c485c0144d2d05a
                                                                                      • Instruction ID: f1327bf96be57b41a4daac13efecf4e5f8c8315b345326dd3a19bc45d13401f9
                                                                                      • Opcode Fuzzy Hash: 3f1c9d4db00e826481b178ab64ea00970205f687122e4d4c1c485c0144d2d05a
                                                                                      • Instruction Fuzzy Hash: 55115E72B0030027E210BA7E8C86B6B76C99B89748F04083FB646EB383DE7DDC054399
                                                                                      APIs
                                                                                      • OffsetRect.USER32(?,?,00000000), ref: 00490134
                                                                                      • OffsetRect.USER32(?,00000000,?), ref: 0049014F
                                                                                      • OffsetRect.USER32(?,?,00000000), ref: 00490169
                                                                                      • OffsetRect.USER32(?,00000000,?), ref: 00490184
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: OffsetRect
                                                                                      • String ID:
                                                                                      • API String ID: 177026234-0
                                                                                      • Opcode ID: d3f66989ff800960b4c0a82a6ffd76303d58a919d7c08028faeb7088e89b5ea7
                                                                                      • Instruction ID: 0e3da5e30cc057e3d74a4c16cf1607cb24db427b0c3e95cd5a18fc3dad4c20bc
                                                                                      • Opcode Fuzzy Hash: d3f66989ff800960b4c0a82a6ffd76303d58a919d7c08028faeb7088e89b5ea7
                                                                                      • Instruction Fuzzy Hash: 52217CB6700201AFD700DE69CC85E6BB7EEEBC4300F14CA2AF694C7249D635ED448796
                                                                                      APIs
                                                                                      • GetCursorPos.USER32 ref: 004171D0
                                                                                      • SetCursor.USER32(00000000), ref: 00417213
                                                                                      • GetLastActivePopup.USER32(?), ref: 0041723D
                                                                                      • GetForegroundWindow.USER32(?), ref: 00417244
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                      • String ID:
                                                                                      • API String ID: 1959210111-0
                                                                                      • Opcode ID: 5c878ef1f1aeb2db91bf3432714928a7f2f2769f3bd036598b9914e69cbbf5aa
                                                                                      • Instruction ID: 86e626badbabc243afb65fecb2564bdd41232683b3d9035b7095670fd5686afe
                                                                                      • Opcode Fuzzy Hash: 5c878ef1f1aeb2db91bf3432714928a7f2f2769f3bd036598b9914e69cbbf5aa
                                                                                      • Instruction Fuzzy Hash: BA2183313086018ACB20AB69D889AD737F1AF45714F0645ABF8589B392D73DDC86CB59
                                                                                      APIs
                                                                                      • MulDiv.KERNEL32(8B500000,00000008,?), ref: 0048FD9D
                                                                                      • MulDiv.KERNEL32(50142444,00000008,?), ref: 0048FDB1
                                                                                      • MulDiv.KERNEL32(F757C3E8,00000008,?), ref: 0048FDC5
                                                                                      • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 0048FDE3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6335ae3c13ddf35d91c6dca3ece5bfa36ba83b479f3d3f49975b0228b2d303f4
                                                                                      • Instruction ID: 0205f8053e5b888f5c8b1498a92a9aed559835e4432beced00229de2e9d93edf
                                                                                      • Opcode Fuzzy Hash: 6335ae3c13ddf35d91c6dca3ece5bfa36ba83b479f3d3f49975b0228b2d303f4
                                                                                      • Instruction Fuzzy Hash: 49112172604204ABCB40EEA9C8C4D9B77ECEF4D320B14416AF918DB246D634ED40CBA4
                                                                                      APIs
                                                                                      • GetClassInfoA.USER32(00400000,0041F3E0,?), ref: 0041F411
                                                                                      • UnregisterClassA.USER32(0041F3E0,00400000), ref: 0041F43A
                                                                                      • RegisterClassA.USER32(00494598), ref: 0041F444
                                                                                      • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F47F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                      • String ID:
                                                                                      • API String ID: 4025006896-0
                                                                                      • Opcode ID: d848210eac8fa203de2a57be4a09b5e70b2efef1fc89853c1c9f6bba622f69a5
                                                                                      • Instruction ID: 124ae18f6ccee6cd3f50944003dafe19b4a4e3b77e192b7b2acb4d1f887b2837
                                                                                      • Opcode Fuzzy Hash: d848210eac8fa203de2a57be4a09b5e70b2efef1fc89853c1c9f6bba622f69a5
                                                                                      • Instruction Fuzzy Hash: 390152712401047BCB10EBE8ED81E9B379CA769314B12413BBA05E72E1D6359C164BAD
                                                                                      APIs
                                                                                      • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D187
                                                                                      • LoadResource.KERNEL32(00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?,?,00477B64,0000000A,REGDLL_EXE), ref: 0040D1A1
                                                                                      • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?,?,00477B64), ref: 0040D1BB
                                                                                      • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?), ref: 0040D1C5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Resource$FindLoadLockSizeof
                                                                                      • String ID:
                                                                                      • API String ID: 3473537107-0
                                                                                      • Opcode ID: b3c15c4636e7b2139434bed422b55b0694fd43cf85b07dfc26612a38abd02691
                                                                                      • Instruction ID: a2e4909c1946fcd89949086e6ecb513f2c22862e5b7fa6f76d970aa484769738
                                                                                      • Opcode Fuzzy Hash: b3c15c4636e7b2139434bed422b55b0694fd43cf85b07dfc26612a38abd02691
                                                                                      • Instruction Fuzzy Hash: BEF0FF726056046F9754EE9DA881D5B76ECDE48264320416AF908EB246DE38DD118B78
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,00496450,?,?,?,004018B4), ref: 00401566
                                                                                      • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,00496450,?,?,?,004018B4), ref: 0040158B
                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,00496450,?,?,?,004018B4), ref: 004015B1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Virtual$Alloc$Free
                                                                                      • String ID: 1[
                                                                                      • API String ID: 3668210933-3738508114
                                                                                      • Opcode ID: d2517b2848a3e48debd733cbcc194f1d7450fe1c69e1d9f9fa61647bd21528fe
                                                                                      • Instruction ID: 5797ca947971a1fa5f0c07c4efe461a423a426aef50e25704ee96cdc5a06cd6d
                                                                                      • Opcode Fuzzy Hash: d2517b2848a3e48debd733cbcc194f1d7450fe1c69e1d9f9fa61647bd21528fe
                                                                                      • Instruction Fuzzy Hash: C5F0C8716403206AEB315A694C85F133AD4DBC5794F104075BE09FF3D9D6B8980082AC
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 0046C50D
                                                                                      Strings
                                                                                      • Failed to set NTFS compression state (%d)., xrefs: 0046C51E
                                                                                      • Unsetting NTFS compression on file: %s, xrefs: 0046C4F3
                                                                                      • Setting NTFS compression on file: %s, xrefs: 0046C4DB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast
                                                                                      • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                      • API String ID: 1452528299-3038984924
                                                                                      • Opcode ID: 86807cbfd2226bd454e4e46b74c8b92495b6acb580f029ac175535f9750d921d
                                                                                      • Instruction ID: 8a11723362a507f0333bc9965096a3e3adfce4be1f63418e8be67e25eb968b75
                                                                                      • Opcode Fuzzy Hash: 86807cbfd2226bd454e4e46b74c8b92495b6acb580f029ac175535f9750d921d
                                                                                      • Instruction Fuzzy Hash: E1016770E0825866CB04D7ED54812FDBBE49F4D314F84C1EFA499E7243EB791508879B
                                                                                      APIs
                                                                                        • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,OG,?,00000001,?,?,0047E34F,?,00000001,00000000), ref: 0042DC70
                                                                                      • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,00459E8A,?,?,?,?,?,00000000,00459EB1), ref: 004547C4
                                                                                      • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,00459E8A,?,?,?,?,?,00000000), ref: 004547CD
                                                                                      • RemoveFontResourceA.GDI32(00000000), ref: 004547DA
                                                                                      • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004547EE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                      • String ID:
                                                                                      • API String ID: 4283692357-0
                                                                                      • Opcode ID: 46c8cad0b261e60d48b1d3e67bfe7d27a1d7efb6af96d1f02519370c88f59435
                                                                                      • Instruction ID: 4674671b110c5257b68e85d971ffdb8cda5f86f627ed5b1345ff1e290f3286d1
                                                                                      • Opcode Fuzzy Hash: 46c8cad0b261e60d48b1d3e67bfe7d27a1d7efb6af96d1f02519370c88f59435
                                                                                      • Instruction Fuzzy Hash: A8F05EB575430136EA10B6B69C87F1B228C9F98749F10483BBA00EF2C3DA7CD805962D
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00000000,00000000), ref: 0046BC1D
                                                                                      Strings
                                                                                      • Unsetting NTFS compression on directory: %s, xrefs: 0046BC03
                                                                                      • Failed to set NTFS compression state (%d)., xrefs: 0046BC2E
                                                                                      • Setting NTFS compression on directory: %s, xrefs: 0046BBEB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast
                                                                                      • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                      • API String ID: 1452528299-1392080489
                                                                                      • Opcode ID: 9042e0bba0a45541bb3a6888451997e20af0478713a1f8326d793a8a88ac9600
                                                                                      • Instruction ID: 69529bc4e5d6d07a91d00c664886aea47b6ace433f8fc03d3f3948ef3290ac7a
                                                                                      • Opcode Fuzzy Hash: 9042e0bba0a45541bb3a6888451997e20af0478713a1f8326d793a8a88ac9600
                                                                                      • Instruction Fuzzy Hash: 7B016730D0424866CB04D7AD54416DDBBE4DF4D304F44C1EFA858E7247EB79064887DB
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$CountSleepTick
                                                                                      • String ID:
                                                                                      • API String ID: 2227064392-0
                                                                                      • Opcode ID: a2b42f5d817999fa87d8c8debf1c72a2dd1cd4bafa442c689adcebc18bd8fdf0
                                                                                      • Instruction ID: 455298f4415a448e3fa874f92f6781e0756abc36bce73f1148afe723a625cd3c
                                                                                      • Opcode Fuzzy Hash: a2b42f5d817999fa87d8c8debf1c72a2dd1cd4bafa442c689adcebc18bd8fdf0
                                                                                      • Instruction Fuzzy Hash: C3E06D7230DA4446DA3635BF2C866FB4AACCFC6364B28553FE08DD6282C8984C06956A
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00000008,?,0047B594,?,?,00000001,00000000,00000002,00000000,0047BE41,?,?,?,?,?,00493309), ref: 00473941
                                                                                      • OpenProcessToken.ADVAPI32(00000000,00000008,?,0047B594,?,?,00000001,00000000,00000002,00000000,0047BE41), ref: 00473947
                                                                                      • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,0047B594,?,?,00000001,00000000,00000002,00000000,0047BE41), ref: 00473969
                                                                                      • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,0047B594,?,?,00000001,00000000,00000002,00000000), ref: 0047397A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                      • String ID:
                                                                                      • API String ID: 215268677-0
                                                                                      • Opcode ID: edfe2e214aa3a75ba4a1892ea1e575a857d4468868b2aecbb613d029d339128d
                                                                                      • Instruction ID: bb68efe843bb787bbe1951a3fb92d0835bf9270be0aaf8c05fbae998de9023db
                                                                                      • Opcode Fuzzy Hash: edfe2e214aa3a75ba4a1892ea1e575a857d4468868b2aecbb613d029d339128d
                                                                                      • Instruction Fuzzy Hash: 94F030A16443016BD600EAB5CD82E9B77DCEB44354F04883A7E98D72D1E678DD18AB26
                                                                                      APIs
                                                                                      • GetLastActivePopup.USER32(?), ref: 004241BC
                                                                                      • IsWindowVisible.USER32(?), ref: 004241CD
                                                                                      • IsWindowEnabled.USER32(?), ref: 004241D7
                                                                                      • SetForegroundWindow.USER32(?), ref: 004241E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                      • String ID:
                                                                                      • API String ID: 2280970139-0
                                                                                      • Opcode ID: fcfbdc667dfc271acfde3df3b5f004a8a61651cac52fe1164ff6abd3c1fed0d2
                                                                                      • Instruction ID: 7a261241521d5f36110480f60a41559dbc21bd8b6604a945fb8666e4bf107b55
                                                                                      • Opcode Fuzzy Hash: fcfbdc667dfc271acfde3df3b5f004a8a61651cac52fe1164ff6abd3c1fed0d2
                                                                                      • Instruction Fuzzy Hash: 0DE08699B06531139E31FA251885ABB25ACCD54B883C60127BC04F7243DF1CCFA0C1AC
                                                                                      APIs
                                                                                      • GetSystemMenu.USER32(00000000,00000000,0000F060,00000001), ref: 00467191
                                                                                      • EnableMenuItem.USER32(00000000,00000000,00000000), ref: 00467197
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$EnableItemSystem
                                                                                      • String ID: CurPageChanged
                                                                                      • API String ID: 3692539535-2490978513
                                                                                      • Opcode ID: b1f316c5989fff7e00d37c5493a715d64e5e6d0b5679f88fc60dbd8090725f93
                                                                                      • Instruction ID: 85229a9a86c8d76f9b88dc92849b92cb22f01a3e3c9a9662cd7f180e88e3a99e
                                                                                      • Opcode Fuzzy Hash: b1f316c5989fff7e00d37c5493a715d64e5e6d0b5679f88fc60dbd8090725f93
                                                                                      • Instruction Fuzzy Hash: AFA1F734614204DFC711DB69D985EE973F5EB49308F2640F6F804AB322EB38AE41EB59
                                                                                      APIs
                                                                                      • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 0044FB19
                                                                                      • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0044FB4A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExecuteMessageSendShell
                                                                                      • String ID: open
                                                                                      • API String ID: 812272486-2758837156
                                                                                      • Opcode ID: 8a0605ed0c381f0a74a086ec1471ed6555b23fb8dcfb2e81ee34f57c50cf0fe2
                                                                                      • Instruction ID: 724f47e86b4f4745380ee9597168f1c8a72dce230288f2328438c3862ccb2892
                                                                                      • Opcode Fuzzy Hash: 8a0605ed0c381f0a74a086ec1471ed6555b23fb8dcfb2e81ee34f57c50cf0fe2
                                                                                      • Instruction Fuzzy Hash: F8214470E00244AFEB00DF69C992F9EB7F9EF45704F1085BAB500E7391D678BA45CA58
                                                                                      Strings
                                                                                      • Failed to proceed to next wizard page; showing wizard., xrefs: 00468B99
                                                                                      • Failed to proceed to next wizard page; aborting., xrefs: 00468B85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                      • API String ID: 0-1974262853
                                                                                      • Opcode ID: 922b0376bd45f1a340fb446d45ca7413af626e1e06f02045d5dc725511932721
                                                                                      • Instruction ID: be58dce371fc8eb70e9473287a00680558b91856d3b2c3d5b7f8b6b1509d7c4a
                                                                                      • Opcode Fuzzy Hash: 922b0376bd45f1a340fb446d45ca7413af626e1e06f02045d5dc725511932721
                                                                                      • Instruction Fuzzy Hash: 5C218E706042049FDB00EBA9E985E99B7F8EB05714F2541BFF404AB352DB38AE40CB59
                                                                                      APIs
                                                                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00453D18
                                                                                      • GetLastError.KERNEL32(0000003C,00000000,00453D61,?,?,00000001,00000001), ref: 00453D29
                                                                                        • Part of subcall function 00453970: WaitForInputIdle.USER32(00000001,00000032), ref: 0045399C
                                                                                        • Part of subcall function 00453970: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004539BE
                                                                                        • Part of subcall function 00453970: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 004539CD
                                                                                        • Part of subcall function 00453970: CloseHandle.KERNEL32(00000001,004539FA,004539F3,?,00000031,00000080,00000000,?,?,00453D4B,00000080,0000003C,00000000,00453D61), ref: 004539ED
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Wait$CloseCodeErrorExecuteExitHandleIdleInputLastMultipleObjectsProcessShell
                                                                                      • String ID: <
                                                                                      • API String ID: 35504260-4251816714
                                                                                      • Opcode ID: 0a489ccbbc1036629311ba8f0fc18be266887183308125755252c1f90736cb03
                                                                                      • Instruction ID: 33ba34e09f30df1b12b73ce0116b213a2e15e307ba7a65c56a6979caf0e15077
                                                                                      • Opcode Fuzzy Hash: 0a489ccbbc1036629311ba8f0fc18be266887183308125755252c1f90736cb03
                                                                                      • Instruction Fuzzy Hash: 3C2153B0600209ABDB11DF65D8826DE7BF8AF09396F50443AF844E7381D7789E49CB98
                                                                                      APIs
                                                                                      • RtlEnterCriticalSection.KERNEL32(00496420,00000000,)), ref: 004025C7
                                                                                      • RtlLeaveCriticalSection.KERNEL32(00496420,0040263D), ref: 00402630
                                                                                        • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                        • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(00496420,00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                        • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                        • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(00496420,00401A89,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                      • String ID: )
                                                                                      • API String ID: 2227675388-1084416617
                                                                                      • Opcode ID: 3eb0375ff62f3d3bcca9cc60adac25dafbf9b9e3c2e27b1e4b69ca31af3a3358
                                                                                      • Instruction ID: 5893b1754cd22d93ac955961316eccc987691ebf6da7ca014f8aac44d7effe1a
                                                                                      • Opcode Fuzzy Hash: 3eb0375ff62f3d3bcca9cc60adac25dafbf9b9e3c2e27b1e4b69ca31af3a3358
                                                                                      • Instruction Fuzzy Hash: 851101317042046FEB25ABB99F5A62A6AD4D795758B25087FF404F32D2D9BD8C02826C
                                                                                      APIs
                                                                                        • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                        • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                      • SysFreeString.OLEAUT32(?), ref: 00446EFA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$AllocByteCharFreeMultiWide
                                                                                      • String ID: NIL Interface Exception$Unknown Method
                                                                                      • API String ID: 3952431833-1023667238
                                                                                      • Opcode ID: 87cbfea59f1259fc6e468aac4867c83fbc8f3f1cc130e6dbee1779124e49575a
                                                                                      • Instruction ID: 5f9b3b73cb94db711a986a3f2247f7757ae34ed1a40e252d8aaeb61a96a19159
                                                                                      • Opcode Fuzzy Hash: 87cbfea59f1259fc6e468aac4867c83fbc8f3f1cc130e6dbee1779124e49575a
                                                                                      • Instruction Fuzzy Hash: 3E1196706042489FEB10DFA5DC52AAEBBBCEB49704F52407AF900E7681D7799D04CA6A
                                                                                      APIs
                                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00490BFC,?,00490BF0,00000000,00490BD7), ref: 00490BA2
                                                                                      • CloseHandle.KERNEL32(00490C3C,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00490BFC,?,00490BF0,00000000), ref: 00490BB9
                                                                                        • Part of subcall function 00490A8C: GetLastError.KERNEL32(00000000,00490B24,?,?,?,?), ref: 00490AB0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateErrorHandleLastProcess
                                                                                      • String ID: D
                                                                                      • API String ID: 3798668922-2746444292
                                                                                      • Opcode ID: 248f869aaca6227a9bc77a92f638e1a0db6285b6b497ba8db48b301b6d33914f
                                                                                      • Instruction ID: 99184734163d0c92a4db66637d6494c9b23a30ba7254384d63fd9a46e8a5d762
                                                                                      • Opcode Fuzzy Hash: 248f869aaca6227a9bc77a92f638e1a0db6285b6b497ba8db48b301b6d33914f
                                                                                      • Instruction Fuzzy Hash: 790165B1644248AFDF00EBD1CC42F9FBBACDF48718F51007AB504E7291DA78AE048A58
                                                                                      APIs
                                                                                      • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DBB0
                                                                                      • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DBF0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Value$EnumQuery
                                                                                      • String ID: Inno Setup: No Icons
                                                                                      • API String ID: 1576479698-2016326496
                                                                                      • Opcode ID: 0890946b5df0c49e4954d7290b96ce305c787ba9704d15fe4295c439bd8e9102
                                                                                      • Instruction ID: 08e9f6bdc79701da45a7e076aae250b208fcb3010747ef376bcb555be2d5621c
                                                                                      • Opcode Fuzzy Hash: 0890946b5df0c49e4954d7290b96ce305c787ba9704d15fe4295c439bd8e9102
                                                                                      • Instruction Fuzzy Hash: F5018431B8933069F73045266D41F6B558C9B85B64F65003BFA41AA3C0D6DCDC45E26A
                                                                                      APIs
                                                                                        • Part of subcall function 00453FD0: GetCurrentProcess.KERNEL32(00000028), ref: 00453FDF
                                                                                        • Part of subcall function 00453FD0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00453FE5
                                                                                      • SetForegroundWindow.USER32(?), ref: 00491FF3
                                                                                      Strings
                                                                                      • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 0049201E
                                                                                      • Restarting Windows., xrefs: 00491FD0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                                      • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                                      • API String ID: 3179053593-4147564754
                                                                                      • Opcode ID: 92e7afcc8831688dae5fd262e04e4039765fdd7336fda1d0c24d127371dd9238
                                                                                      • Instruction ID: 09758fc62953ac5564f253f86018d0961132e27bbb4a61923f7fbbecd85c55b8
                                                                                      • Opcode Fuzzy Hash: 92e7afcc8831688dae5fd262e04e4039765fdd7336fda1d0c24d127371dd9238
                                                                                      • Instruction Fuzzy Hash: 7701BC747042807AEB01EB65EA02B9C2FA89B4430DF80407BF500AB293C6BD9A49C72D
                                                                                      APIs
                                                                                        • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,00492DAD,00000000,00492E02,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                                                      • MoveFileA.KERNEL32(00000000,00000000), ref: 00471456
                                                                                        • Part of subcall function 004712A8: GetLastError.KERNEL32(00000000,00471394,?,?,?,00497138,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0047141B,00000001), ref: 004712C9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$DeleteErrorLastMove
                                                                                      • String ID: DeleteFile$MoveFile
                                                                                      • API String ID: 3195829115-139070271
                                                                                      • Opcode ID: 51569406b8907aa8f27be33c1290f694066cffae2399f79e6ee197169eb5c4fe
                                                                                      • Instruction ID: 498d1f86d5cab30c0c02f2f8960253c4d30b0e1e307aae4f7005b10ea634dfd9
                                                                                      • Opcode Fuzzy Hash: 51569406b8907aa8f27be33c1290f694066cffae2399f79e6ee197169eb5c4fe
                                                                                      • Instruction Fuzzy Hash: 3AF062A010411067DF107B6E85836DA239C8F0235EB54C17BBD88BF3A3CA3D9C0287AE
                                                                                      APIs
                                                                                      • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00455C42
                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,.2I,?), ref: 00455C4F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$File$LocalSystem
                                                                                      • String ID: .2I
                                                                                      • API String ID: 1748579591-803348413
                                                                                      • Opcode ID: aba8b51db9d65da12f539ddc2c0835b2624d8a3471dbf7fd6520d9ecd032998b
                                                                                      • Instruction ID: 4f8a786cf5642c40ef90ebfca535d25145d1c27a2836ec24ad6e1980779010cb
                                                                                      • Opcode Fuzzy Hash: aba8b51db9d65da12f539ddc2c0835b2624d8a3471dbf7fd6520d9ecd032998b
                                                                                      • Instruction Fuzzy Hash: B7E0ED71D0060DABCF00EBE5DC418EEB7BCFA08314F40067BA814E3295E734A6098B94
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.3436818094.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.3436774598.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437098062.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3437148351.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.3438717270.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_9MgoW3Y1ti.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastSleep
                                                                                      • String ID:
                                                                                      • API String ID: 1458359878-0
                                                                                      • Opcode ID: 8b4360f2b479ea038ec97fb2a00d6f0221d541355e91bee91f30916643827583
                                                                                      • Instruction ID: 017d81aa95838fcb6bb112513f86caaf4ff52444f8b7b5a451e770b39712fdff
                                                                                      • Opcode Fuzzy Hash: 8b4360f2b479ea038ec97fb2a00d6f0221d541355e91bee91f30916643827583
                                                                                      • Instruction Fuzzy Hash: B8F0F632A00524578E20A9AE998192F62CDDAC0B6D730052BEF04DF283D439CC854AAE

                                                                                      Execution Graph

                                                                                      Execution Coverage:6%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:4.1%
                                                                                      Total number of Nodes:460
                                                                                      Total number of Limit Nodes:8
                                                                                      execution_graph 3450 402142 3451 402147 3450->3451 3452 40d75a GetModuleHandleA 3451->3452 3453 40d73b GetModuleFileNameA 3452->3453 3453->3452 3556 402682 3557 402686 3556->3557 3557->3557 3558 40268a CloseServiceHandle 3557->3558 3559 40d982 3558->3559 3504 4031c3 3509 40545b 3504->3509 3506 4053e6 6 API calls 3507 4031d1 3506->3507 3507->3506 3508 403203 3507->3508 3510 405488 3509->3510 3514 40546b 3509->3514 3511 4054a6 3510->3511 3512 4053e6 6 API calls 3510->3512 3513 406897 9 API calls 3511->3513 3511->3514 3512->3511 3513->3514 3514->3507 3560 403283 3561 403291 3560->3561 3562 4032ac 3560->3562 3567 4058b8 3561->3567 3570 4058e5 3562->3570 3565 40329a 3566 4032b5 3573 406c87 3567->3573 3569 4058d4 3569->3565 3571 406c87 6 API calls 3570->3571 3572 405901 3571->3572 3572->3566 3576 406cc2 3573->3576 3574 4053e6 6 API calls 3577 406f77 3574->3577 3575 4053e6 6 API calls 3575->3576 3576->3575 3576->3577 3580 406f6f 3576->3580 3577->3574 3579 406fc2 3577->3579 3578 4053e6 6 API calls 3578->3579 3579->3578 3579->3580 3580->3569 3515 40d1c4 3518 401f64 FindResourceA 3515->3518 3517 40d1c9 3519 401f86 GetLastError SizeofResource 3518->3519 3520 401f9f 3518->3520 3519->3520 3521 401fa6 LoadResource LockResource GlobalAlloc 3519->3521 3520->3517 3522 401fd2 3521->3522 3523 401ffb GetTickCount 3522->3523 3525 402005 GlobalAlloc 3523->3525 3525->3520 3581 404184 3583 40418c 3581->3583 3582 40421e 3583->3582 3585 404094 RtlUnwind 3583->3585 3586 4040ac 3585->3586 3586->3583 3454 402845 3455 40284a 3454->3455 3456 4028f2 GetCommandLineW CommandLineToArgvW 3455->3456 3457 40d3c6 GetLocalTime 3456->3457 3458 401f27 27 API calls 3457->3458 3459 40d3d1 3458->3459 3587 402588 3588 40d117 CreateServiceA 3587->3588 3460 40684b 3461 406852 3460->3461 3462 406883 3461->3462 3463 40685a MultiByteToWideChar 3461->3463 3463->3462 3464 406873 GetStringTypeW 3463->3464 3464->3462 3590 40418c 3591 40421e 3590->3591 3593 4041aa 3590->3593 3592 404094 RtlUnwind 3592->3593 3593->3591 3593->3592 3183 40364d 3184 403659 GetCurrentProcess TerminateProcess 3183->3184 3187 40366a 3183->3187 3184->3187 3185 4036e4 3186 4036d4 ExitProcess 3187->3185 3187->3186 3495 40250e 3498 402501 3495->3498 3496 40d955 RegQueryValueExA 3496->3498 3497 402528 3498->3495 3498->3496 3498->3497 3499 40d661 RegCloseKey 3498->3499 3499->3496 3500 402810 VirtualAlloc 3501 40d38e 3500->3501 3431 402914 RegCloseKey 3432 40d8a7 3431->3432 3465 402254 3466 40d09d CreateFileA CloseHandle 3465->3466 3467 40da53 ExitProcess 3466->3467 3468 402155 3469 402592 wsprintfA 3468->3469 3470 40d06e 3469->3470 3434 402299 StartServiceCtrlDispatcherA 3435 402931 3434->3435 3530 4022d9 Sleep 3531 4025bf 3530->3531 3436 40225a 3437 40225f 3436->3437 3438 40d904 CopyFileA 3437->3438 3532 402fdb 3539 40363c 3532->3539 3534 402ff4 3537 40429d 7 API calls 3534->3537 3535 402fe6 3535->3534 3536 404264 7 API calls 3535->3536 3536->3534 3538 402ffd 3537->3538 3540 40364d 3 API calls 3539->3540 3541 403649 3540->3541 3541->3535 3446 40d11d OpenSCManagerA 3447 40d8ee 3446->3447 3448 40269d CreateDirectoryA 3449 40d1b2 3448->3449 3471 40235e 3472 4023b0 3471->3472 3473 402365 3471->3473 3473->3472 3474 402370 GetLastError SetServiceStatus SetEvent 3473->3474 3474->3472 3475 406a5f 3476 406a6d 3475->3476 3477 406a71 LCMapStringW 3476->3477 3480 406a25 3476->3480 3478 406a89 WideCharToMultiByte 3477->3478 3477->3480 3478->3480 3481 40d460 RegSetValueExA RegCloseKey 3482 40da8b 3481->3482 3485 4022cb 3482->3485 3486 4022f2 WaitForSingleObject 3485->3486 3594 402ea0 3595 402ea5 3594->3595 3598 40319a GetModuleHandleA 3595->3598 3597 402eaa 3599 4031a9 GetProcAddress 3598->3599 3600 4031b9 3598->3600 3599->3600 3600->3597 3545 4021e3 GetTickCount 3546 40231c 3545->3546 3547 405de5 3548 402fe6 7 API calls 3547->3548 3549 405dec 3548->3549 3550 4022e7 3551 4025c5 GetModuleFileNameA 3550->3551 3552 40d138 3551->3552 3069 40d3ab 3070 40d3c6 GetLocalTime 3069->3070 3071 40d3af 3069->3071 3074 401f27 3070->3074 3071->3070 3075 401f3c 3074->3075 3078 401a1d 3075->3078 3077 401f45 3079 401a2c 3078->3079 3084 401a4f CreateFileA 3079->3084 3083 401a3e 3083->3077 3085 401a35 3084->3085 3086 401a7d 3084->3086 3092 401b4b LoadLibraryA 3085->3092 3087 401a98 DeviceIoControl 3086->3087 3089 401b3a FindCloseChangeNotification 3086->3089 3090 401b0e GetLastError 3086->3090 3101 402ce6 3086->3101 3104 402cd8 3086->3104 3087->3086 3089->3085 3090->3086 3090->3089 3093 401c21 3092->3093 3094 401b6e GetProcAddress 3092->3094 3093->3083 3095 401c18 FreeLibrary 3094->3095 3099 401b85 3094->3099 3095->3093 3096 401b95 GetAdaptersInfo 3096->3099 3097 402ce6 7 API calls 3097->3099 3098 401c15 3098->3095 3099->3096 3099->3097 3099->3098 3100 402cd8 12 API calls 3099->3100 3100->3099 3107 4030e1 3101->3107 3137 403041 3104->3137 3108 4030ed 3107->3108 3116 402cef 3107->3116 3109 4030f7 3108->3109 3110 40310d 3108->3110 3112 403139 HeapFree 3109->3112 3113 403103 3109->3113 3111 403138 3110->3111 3115 403127 3110->3115 3111->3112 3112->3116 3118 40447e 3113->3118 3124 404f0f 3115->3124 3116->3086 3119 404772 3118->3119 3120 4044bc 3118->3120 3119->3116 3120->3119 3121 4046b8 VirtualFree 3120->3121 3122 40471c 3121->3122 3122->3119 3123 40472b VirtualFree HeapFree 3122->3123 3123->3119 3125 404f52 3124->3125 3126 404f3c 3124->3126 3125->3116 3126->3125 3128 404df6 3126->3128 3131 404e03 3128->3131 3129 404eb3 3129->3125 3130 404e24 VirtualFree 3130->3131 3131->3129 3131->3130 3133 404da0 VirtualFree 3131->3133 3134 404dbd 3133->3134 3135 404ded 3134->3135 3136 404dcd HeapFree 3134->3136 3135->3131 3136->3131 3138 402ce3 3137->3138 3140 403048 3137->3140 3138->3086 3140->3138 3141 40306d 3140->3141 3142 40307c 3141->3142 3145 403091 3141->3145 3149 40308a 3142->3149 3150 4047a7 3142->3150 3144 4030d0 HeapAlloc 3146 4030df 3144->3146 3145->3144 3145->3149 3156 404f54 3145->3156 3146->3140 3147 40308f 3147->3140 3149->3144 3149->3146 3149->3147 3151 4047d9 3150->3151 3152 404878 3151->3152 3155 404887 3151->3155 3163 404ab0 3151->3163 3152->3155 3170 404b61 3152->3170 3155->3149 3159 404f62 3156->3159 3157 40504e VirtualAlloc 3162 40501f 3157->3162 3158 405123 3174 404c5c 3158->3174 3159->3157 3159->3158 3159->3162 3162->3149 3164 404af3 HeapAlloc 3163->3164 3165 404ac3 HeapReAlloc 3163->3165 3167 404b43 3164->3167 3168 404b19 VirtualAlloc 3164->3168 3166 404ae2 3165->3166 3165->3167 3166->3164 3167->3152 3168->3167 3169 404b33 HeapFree 3168->3169 3169->3167 3171 404b73 VirtualAlloc 3170->3171 3173 404bbc 3171->3173 3173->3155 3175 404c70 HeapAlloc 3174->3175 3176 404c69 3174->3176 3177 404c8d VirtualAlloc 3175->3177 3182 404cc5 3175->3182 3176->3177 3178 404d82 3177->3178 3179 404cad VirtualAlloc 3177->3179 3180 404d8a HeapFree 3178->3180 3178->3182 3181 404d74 VirtualFree 3179->3181 3179->3182 3180->3182 3181->3178 3182->3162 3601 4069ab 3602 4069ba 3601->3602 3603 406a25 3602->3603 3604 4069bf MultiByteToWideChar 3602->3604 3604->3603 3605 4069d8 LCMapStringW 3604->3605 3605->3603 3606 4069f3 3605->3606 3607 406a39 3606->3607 3608 4069f9 3606->3608 3607->3603 3610 406a71 LCMapStringW 3607->3610 3608->3603 3609 406a07 LCMapStringW 3608->3609 3609->3603 3610->3603 3611 406a89 WideCharToMultiByte 3610->3611 3611->3603 3488 40226e 3489 402277 GetLastError 3488->3489 3188 402ef0 GetVersion 3212 404034 HeapCreate 3188->3212 3190 402f4f 3191 402f54 3190->3191 3192 402f5c 3190->3192 3287 40300b 3191->3287 3224 403d14 3192->3224 3196 402f64 GetCommandLineA 3238 403be2 3196->3238 3200 402f7e 3270 4038dc 3200->3270 3202 402f83 3203 402f88 GetStartupInfoA 3202->3203 3283 403884 3203->3283 3205 402f9a GetModuleHandleA 3207 402fbe 3205->3207 3293 40362b 3207->3293 3213 404054 3212->3213 3214 40408a 3212->3214 3300 403eec 3213->3300 3214->3190 3217 404070 3220 40408d 3217->3220 3222 404c5c 5 API calls 3217->3222 3218 404063 3312 40440b HeapAlloc 3218->3312 3220->3190 3221 40406d 3221->3220 3223 40407e HeapDestroy 3221->3223 3222->3221 3223->3214 3368 40302f 3224->3368 3227 403d33 GetStartupInfoA 3234 403e44 3227->3234 3237 403d7f 3227->3237 3230 403eab SetHandleCount 3230->3196 3231 403e6b GetStdHandle 3233 403e79 GetFileType 3231->3233 3231->3234 3232 40302f 12 API calls 3232->3237 3233->3234 3234->3230 3234->3231 3235 403df0 3235->3234 3236 403e12 GetFileType 3235->3236 3236->3235 3237->3232 3237->3234 3237->3235 3239 403c30 3238->3239 3240 403bfd GetEnvironmentStringsW 3238->3240 3241 403c05 3239->3241 3242 403c21 3239->3242 3240->3241 3243 403c11 GetEnvironmentStrings 3240->3243 3245 403c49 WideCharToMultiByte 3241->3245 3246 403c3d GetEnvironmentStringsW 3241->3246 3244 402f74 3242->3244 3247 403cc3 GetEnvironmentStrings 3242->3247 3248 403ccf 3242->3248 3243->3242 3243->3244 3261 403995 3244->3261 3250 403c7d 3245->3250 3251 403caf FreeEnvironmentStringsW 3245->3251 3246->3244 3246->3245 3247->3244 3247->3248 3252 40302f 12 API calls 3248->3252 3253 40302f 12 API calls 3250->3253 3251->3244 3254 403cea 3252->3254 3255 403c83 3253->3255 3257 403d00 FreeEnvironmentStringsA 3254->3257 3255->3251 3256 403c8c WideCharToMultiByte 3255->3256 3258 403c9d 3256->3258 3260 403ca6 3256->3260 3257->3244 3259 4030e1 7 API calls 3258->3259 3259->3260 3260->3251 3262 4039a7 3261->3262 3263 4039ac GetModuleFileNameA 3261->3263 3397 4061f4 3262->3397 3265 4039cf 3263->3265 3266 40302f 12 API calls 3265->3266 3267 4039f0 3266->3267 3268 402fe6 7 API calls 3267->3268 3269 403a00 3267->3269 3268->3269 3269->3200 3271 4038e9 3270->3271 3273 4038ee 3270->3273 3272 4061f4 19 API calls 3271->3272 3272->3273 3274 40302f 12 API calls 3273->3274 3275 40391b 3274->3275 3276 402fe6 7 API calls 3275->3276 3279 40392f 3275->3279 3276->3279 3277 403972 3278 4030e1 7 API calls 3277->3278 3280 40397e 3278->3280 3279->3277 3281 40302f 12 API calls 3279->3281 3282 402fe6 7 API calls 3279->3282 3280->3202 3281->3279 3282->3279 3284 40388d 3283->3284 3286 403892 3283->3286 3285 4061f4 19 API calls 3284->3285 3285->3286 3286->3205 3288 403014 3287->3288 3289 403019 3287->3289 3290 404264 7 API calls 3288->3290 3291 40429d 7 API calls 3289->3291 3290->3289 3292 403022 ExitProcess 3291->3292 3421 40364d 3293->3421 3296 403700 3297 40370c 3296->3297 3298 403835 UnhandledExceptionFilter 3297->3298 3299 402fd8 3297->3299 3298->3299 3314 402d80 3300->3314 3303 403f15 3304 403f2f GetEnvironmentVariableA 3303->3304 3306 403f27 3303->3306 3305 40400c 3304->3305 3308 403f4e 3304->3308 3305->3306 3319 403ebf GetModuleHandleA 3305->3319 3306->3217 3306->3218 3309 403f93 GetModuleFileNameA 3308->3309 3310 403f8b 3308->3310 3309->3310 3310->3305 3316 406210 3310->3316 3313 404427 3312->3313 3313->3221 3315 402d8c GetVersionExA 3314->3315 3315->3303 3315->3304 3321 406227 3316->3321 3320 403ed6 3319->3320 3320->3306 3323 40623f 3321->3323 3325 40626f 3323->3325 3328 4053e6 3323->3328 3324 4053e6 6 API calls 3324->3325 3325->3324 3327 406223 3325->3327 3332 4073eb 3325->3332 3327->3305 3329 405404 3328->3329 3331 4053f8 3328->3331 3338 40674e 3329->3338 3331->3323 3333 4073f9 3332->3333 3334 407416 3332->3334 3333->3325 3335 407432 3334->3335 3336 4053e6 6 API calls 3334->3336 3335->3333 3350 406897 3335->3350 3336->3335 3339 406797 3338->3339 3340 40677f GetStringTypeW 3338->3340 3342 4067c2 GetStringTypeA 3339->3342 3343 4067e6 3339->3343 3340->3339 3341 40679b GetStringTypeA 3340->3341 3341->3339 3344 406883 3341->3344 3342->3344 3343->3344 3346 4067fc MultiByteToWideChar 3343->3346 3344->3331 3346->3344 3347 406820 3346->3347 3347->3344 3348 40685a MultiByteToWideChar 3347->3348 3348->3344 3349 406873 GetStringTypeW 3348->3349 3349->3344 3351 4068c7 LCMapStringW 3350->3351 3352 4068e3 3350->3352 3351->3352 3353 4068eb LCMapStringA 3351->3353 3355 406949 3352->3355 3356 40692c LCMapStringA 3352->3356 3353->3352 3354 406a25 3353->3354 3354->3333 3355->3354 3357 40695f MultiByteToWideChar 3355->3357 3356->3354 3357->3354 3358 406989 3357->3358 3358->3354 3359 4069bf MultiByteToWideChar 3358->3359 3359->3354 3360 4069d8 LCMapStringW 3359->3360 3360->3354 3361 4069f3 3360->3361 3362 4069f9 3361->3362 3364 406a39 3361->3364 3362->3354 3363 406a07 LCMapStringW 3362->3363 3363->3354 3364->3354 3365 406a71 LCMapStringW 3364->3365 3365->3354 3366 406a89 WideCharToMultiByte 3365->3366 3366->3354 3369 403041 12 API calls 3368->3369 3370 40303e 3369->3370 3370->3227 3371 402fe6 3370->3371 3372 402ff4 3371->3372 3373 402fef 3371->3373 3383 40429d 3372->3383 3377 404264 3373->3377 3378 40426e 3377->3378 3379 40429d 7 API calls 3378->3379 3382 40429b 3378->3382 3380 404285 3379->3380 3381 40429d 7 API calls 3380->3381 3381->3382 3382->3372 3386 4042b0 3383->3386 3384 402ffd 3384->3227 3385 4043c7 3389 4043da GetStdHandle WriteFile 3385->3389 3386->3384 3386->3385 3387 4042f0 3386->3387 3387->3384 3388 4042fc GetModuleFileNameA 3387->3388 3390 404314 3388->3390 3389->3384 3392 4065b8 3390->3392 3393 4065c5 LoadLibraryA 3392->3393 3395 406607 3392->3395 3394 4065d6 GetProcAddress 3393->3394 3393->3395 3394->3395 3396 4065ed GetProcAddress GetProcAddress 3394->3396 3395->3384 3396->3395 3398 4061fd 3397->3398 3399 406204 3397->3399 3401 405e30 3398->3401 3399->3263 3408 405fc9 3401->3408 3403 405fbd 3403->3399 3406 405e73 GetCPInfo 3407 405e87 3406->3407 3407->3403 3413 40606f GetCPInfo 3407->3413 3409 405fe9 3408->3409 3410 405fd9 GetOEMCP 3408->3410 3411 405e41 3409->3411 3412 405fee GetACP 3409->3412 3410->3409 3411->3403 3411->3406 3411->3407 3412->3411 3414 40615a 3413->3414 3415 406092 3413->3415 3414->3403 3416 40674e 6 API calls 3415->3416 3417 40610e 3416->3417 3418 406897 9 API calls 3417->3418 3419 406132 3418->3419 3420 406897 9 API calls 3419->3420 3420->3414 3422 403659 GetCurrentProcess TerminateProcess 3421->3422 3425 40366a 3421->3425 3422->3425 3423 402fc7 3423->3296 3424 4036d4 ExitProcess 3425->3423 3425->3424 3426 402571 RegCreateKeyExA 3427 40d427 3426->3427 3428 40d42d 3427->3428 3429 40d8a7 3427->3429 3430 40d483 GetTickCount 3428->3430 3430->3429 3613 4023b3 RegisterServiceCtrlHandlerA 3614 4023d6 3613->3614 3615 4024cc 3613->3615 3616 4023e4 SetServiceStatus GetLastError CreateEventA 3614->3616 3617 40245d SetServiceStatus CreateThread WaitForSingleObject CloseHandle 3616->3617 3618 40243e GetLastError 3616->3618 3619 4024c3 SetServiceStatus 3617->3619 3618->3619 3619->3615 3433 40d639 RegSetValueExA 3439 40d23a RegOpenKeyExA 3440 40d24b 3439->3440 3491 40d07a 3492 40daa7 LoadLibraryExA 3491->3492 3441 40da3b 3442 40d475 3441->3442 3443 40da42 3442->3443 3444 40d661 RegCloseKey 3442->3444 3445 40d955 RegQueryValueExA 3444->3445 3445->3442 3502 40263c SetEvent 3503 40d397 3502->3503 3620 4022bc 3621 402823 wsprintfA 3620->3621 3493 40227f GetProcAddress 3494 4026ae 3493->3494 3553 4026ff 3554 402704 RegCreateKeyExA 3553->3554

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                                                      • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                                      • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                                      • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                      • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                                      • API String ID: 514930453-3667123677
                                                                                      • Opcode ID: a3c77d1947fac9ed500e02c632cb5410261389502922d6f95d8c76429a6c9e05
                                                                                      • Instruction ID: 2fcbbae68a7f2e143e0ba6fa3878dab2488d9b05c73812711a2b91e8578584ab
                                                                                      • Opcode Fuzzy Hash: a3c77d1947fac9ed500e02c632cb5410261389502922d6f95d8c76429a6c9e05
                                                                                      • Instruction Fuzzy Hash: E521A770904109AEEF119B65CD447EF7BB8EF41344F1440BAD504B22E1E7789985CB69

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 26 401a4f-401a77 CreateFileA 27 401b45-401b4a 26->27 28 401a7d-401a91 26->28 29 401a98-401ac0 DeviceIoControl 28->29 30 401ac2-401aca 29->30 31 401af3-401afb 29->31 34 401ad4-401ad9 30->34 35 401acc-401ad2 30->35 32 401b04-401b07 31->32 33 401afd-401b03 call 402ce6 31->33 38 401b09-401b0c 32->38 39 401b3a-401b44 FindCloseChangeNotification 32->39 33->32 34->31 36 401adb-401af1 call 402d00 call 4018cc 34->36 35->31 36->31 42 401b27-401b34 call 402cd8 38->42 43 401b0e-401b17 GetLastError 38->43 39->27 42->29 42->39 43->39 45 401b19-401b1c 43->45 45->42 49 401b1e-401b24 45->49 49->42
                                                                                      APIs
                                                                                      • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                                      • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                                      • GetLastError.KERNEL32 ref: 00401B0E
                                                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00401B3D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChangeCloseControlCreateDeviceErrorFileFindLastNotification
                                                                                      • String ID: \\.\PhysicalDrive0
                                                                                      • API String ID: 3786717961-1180397377
                                                                                      • Opcode ID: 87e5aa96cf8bbfa53ba141c063bc04efd036a70200bde10c5f99651d25558048
                                                                                      • Instruction ID: 04828827cee311aa1ccd055820d70034eb57b3ddca3c9d8c28a7d5788a1782d0
                                                                                      • Opcode Fuzzy Hash: 87e5aa96cf8bbfa53ba141c063bc04efd036a70200bde10c5f99651d25558048
                                                                                      • Instruction Fuzzy Hash: 43318D71D00118EADB21AFA5CD849EFBBB9FF41750F20407AE554B22A0E7785E45CB98

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 167 402299-4022a1 StartServiceCtrlDispatcherA 168 402931-402937 167->168
                                                                                      APIs
                                                                                      • StartServiceCtrlDispatcherA.ADVAPI32 ref: 0040229A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CtrlDispatcherServiceStart
                                                                                      • String ID:
                                                                                      • API String ID: 3789849863-0
                                                                                      • Opcode ID: c003d29a70a172e29de59ed7b689d9b07ce4a3aef7e76657a3f1d292d186b6c5
                                                                                      • Instruction ID: 7236fdf905961642a5bbbc3fb68be642bec8eaa1085a8ac3c622be18bd149764
                                                                                      • Opcode Fuzzy Hash: c003d29a70a172e29de59ed7b689d9b07ce4a3aef7e76657a3f1d292d186b6c5
                                                                                      • Instruction Fuzzy Hash: 55B0127330C10446C30057B8BE4C59F234CE38633AB104C37C04FE00E1D6B8C04A5524

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetVersion.KERNEL32 ref: 00402F16
                                                                                        • Part of subcall function 00404034: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F4F,00000000), ref: 00404045
                                                                                        • Part of subcall function 00404034: HeapDestroy.KERNEL32 ref: 00404084
                                                                                      • GetCommandLineA.KERNEL32 ref: 00402F64
                                                                                      • GetStartupInfoA.KERNEL32(?), ref: 00402F8F
                                                                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402FB2
                                                                                        • Part of subcall function 0040300B: ExitProcess.KERNEL32 ref: 00403028
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                      • String ID: Y
                                                                                      • API String ID: 2057626494-4136946213
                                                                                      • Opcode ID: 2a5b16c506521380fd9b5f66b06519665ea10880a1b1eb47f363de886a19e373
                                                                                      • Instruction ID: 31bd938ea51fadde60a3d0ec437c396cd65a6e637b97124abe794e54387ab133
                                                                                      • Opcode Fuzzy Hash: 2a5b16c506521380fd9b5f66b06519665ea10880a1b1eb47f363de886a19e373
                                                                                      • Instruction Fuzzy Hash: 19216DB1800615AAD714AFA6DE49A6E7FB8EB44719F10413FF505BB2D1DB385500CA58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 79 40250e-402510 80 402512-402526 79->80 81 402574-4025e7 79->81 82 402501-402507 80->82 83 402528-40253d 80->83 85 40d955-40d960 RegQueryValueExA 81->85 82->79 86 40da3c 85->86 87 40da42 86->87 88 40d475-40d66c RegCloseKey 86->88 90 40da44 87->90 88->85 90->90
                                                                                      APIs
                                                                                      • RegQueryValueExA.KERNELBASE(?,Common AppData), ref: 0040D958
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: QueryValue
                                                                                      • String ID: Common AppData$NL5$
                                                                                      • API String ID: 3660427363-3642351906
                                                                                      • Opcode ID: ed0e5acd8f8ece743e598616439700d4f440e59f7496dd527ca1e1139eb0ac89
                                                                                      • Instruction ID: 3625f9f7bcec903c70c52d49b5d04ab8b5a9762ab31523acee7a4a548b3f6f63
                                                                                      • Opcode Fuzzy Hash: ed0e5acd8f8ece743e598616439700d4f440e59f7496dd527ca1e1139eb0ac89
                                                                                      • Instruction Fuzzy Hash: 6A019971C18B40FBCB054FB09E18A697F74AB46710715427BD851720F1D3B8885BEA4F

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 91 402845-40d446 call 402db0 GetCommandLineW CommandLineToArgvW GetLocalTime call 401f27 100 40d8a7 91->100 101 40d44c-40d451 91->101 102 40dba7 100->102 101->102 103 40dbaa 102->103 103->103
                                                                                      APIs
                                                                                      • GetCommandLineW.KERNEL32(?), ref: 004028F2
                                                                                      • CommandLineToArgvW.SHELL32(00000000), ref: 004028F9
                                                                                      • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D3C6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CommandLine$ArgvLocalTime
                                                                                      • String ID: /chk
                                                                                      • API String ID: 3768950922-3837807730
                                                                                      • Opcode ID: 58e77e24c0e44735d9c25947b9bd7a71b097def894af762cde97e617ba063816
                                                                                      • Instruction ID: f8a697a6ba56cfa0421d3161c88fb5920d4a750ed1aa0ba2803a0c5cf8bd7934
                                                                                      • Opcode Fuzzy Hash: 58e77e24c0e44735d9c25947b9bd7a71b097def894af762cde97e617ba063816
                                                                                      • Instruction Fuzzy Hash: 59E06D75C08202EEC7007BE0AF098AC77B4AA08301320817FE556B51D0CB7C548AAB2F

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 104 40364d-403657 105 403659-403664 GetCurrentProcess TerminateProcess 104->105 106 40366a-403680 104->106 105->106 107 403682-403689 106->107 108 4036be-4036d2 call 4036e6 106->108 110 40368b-403697 107->110 111 4036ad-4036bd call 4036e6 107->111 117 4036e4-4036e5 108->117 118 4036d4-4036de ExitProcess 108->118 114 403699-40369d 110->114 115 4036ac 110->115 111->108 119 4036a1-4036aa 114->119 120 40369f 114->120 115->111 119->114 119->115 120->119
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(?,?,00403638,?,00000000,00000000,00402FC7,00000000,00000000), ref: 0040365D
                                                                                      • TerminateProcess.KERNEL32(00000000,?,00403638,?,00000000,00000000,00402FC7,00000000,00000000), ref: 00403664
                                                                                      • ExitProcess.KERNEL32 ref: 004036DE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                      • String ID:
                                                                                      • API String ID: 1703294689-0
                                                                                      • Opcode ID: 45a62d5989472daa66da51cc5c0c53ccf8c07e521785adc499b880c08e76b42c
                                                                                      • Instruction ID: 8ec911347a9f6ebe748c774e3fffa0e274c2dea28e60d441966e3dc67073ffcc
                                                                                      • Opcode Fuzzy Hash: 45a62d5989472daa66da51cc5c0c53ccf8c07e521785adc499b880c08e76b42c
                                                                                      • Instruction Fuzzy Hash: A201C831644300FAD6309F25FE84A5A7FA8A791351B10493FE440723D1CB3AA9848E1C

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 121 40d3ab-40d3ad 122 40d3c6-40d3cc GetLocalTime call 401f27 121->122 123 40d3af-40d3c3 121->123 125 40d3d1-40d446 122->125 123->122 128 40d8a7 125->128 129 40d44c-40d451 125->129 130 40dba7 128->130 129->130 131 40dbaa 130->131 131->131
                                                                                      APIs
                                                                                      • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D3C6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: LocalTime
                                                                                      • String ID: /chk
                                                                                      • API String ID: 481472006-3837807730
                                                                                      • Opcode ID: 719ccb32c6d0f1224c08b4e1637f7109be7b56e533cc931ac7d4392f13334026
                                                                                      • Instruction ID: bfeb034239b7c7118683ac587487231c4a8ae608a4ee2d3b9eda992131e4dc08
                                                                                      • Opcode Fuzzy Hash: 719ccb32c6d0f1224c08b4e1637f7109be7b56e533cc931ac7d4392f13334026
                                                                                      • Instruction Fuzzy Hash: 4CE08630C18743E9D7117BA0CD088987FB1AB51314760463FE1A2754E1D73D549AEF4E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 132 40269d-4026a9 CreateDirectoryA 133 40d1b2-40d61b call 402dc0 * 2 132->133
                                                                                      APIs
                                                                                      • CreateDirectoryA.KERNELBASE ref: 0040269D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectory
                                                                                      • String ID: .exe
                                                                                      • API String ID: 4241100979-4119554291
                                                                                      • Opcode ID: 6ff648dc406feb637f11e3f6b69f0d8219d4dba7ac56d197b0b02803ca9b4c05
                                                                                      • Instruction ID: 7be0dad2239628ad1372a9b2e638fdce078da6a21a9524e3c9378f4dc9fd0076
                                                                                      • Opcode Fuzzy Hash: 6ff648dc406feb637f11e3f6b69f0d8219d4dba7ac56d197b0b02803ca9b4c05
                                                                                      • Instruction Fuzzy Hash: CFC04C38596131F2D51132D10E0EE5F641C5D8E745334403F7142700D349FC180A56BF

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 139 404034-404052 HeapCreate 140 404054-404061 call 403eec 139->140 141 40408a-40408c 139->141 144 404070-404073 140->144 145 404063-40406e call 40440b 140->145 147 404075 call 404c5c 144->147 148 40408d-404090 144->148 151 40407a-40407c 145->151 147->151 151->148 152 40407e-404084 HeapDestroy 151->152 152->141
                                                                                      APIs
                                                                                      • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F4F,00000000), ref: 00404045
                                                                                        • Part of subcall function 00403EEC: GetVersionExA.KERNEL32 ref: 00403F0B
                                                                                      • HeapDestroy.KERNEL32 ref: 00404084
                                                                                        • Part of subcall function 0040440B: HeapAlloc.KERNEL32(00000000,00000140,0040406D,000003F8), ref: 00404418
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocCreateDestroyVersion
                                                                                      • String ID:
                                                                                      • API String ID: 2507506473-0
                                                                                      • Opcode ID: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                                                      • Instruction ID: 795a75c142ce263548137c971673ec0d69254cf7c95aacf64765c85fef2462b4
                                                                                      • Opcode Fuzzy Hash: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                                                      • Instruction Fuzzy Hash: E9F065F060530199DB205F749F45B2A35989BC0765F10453FFB40F41D0EB788481990E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 153 402571-402579 RegCreateKeyExA 154 40d427 153->154 155 40d8a7-40dba7 154->155 156 40d42d-40d48c call 402c80 GetTickCount 154->156 161 40dbaa 155->161 156->155 161->161
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CountCreateTick
                                                                                      • String ID:
                                                                                      • API String ID: 3069548982-0
                                                                                      • Opcode ID: ee8128013bf5e90e42cdd554de5022e84e0101b2628d331728f9b3f566d64dcf
                                                                                      • Instruction ID: ea209166fb0ef528cf99b9c0e38baeae1227fb332146ce63fc0e23087ad075ce
                                                                                      • Opcode Fuzzy Hash: ee8128013bf5e90e42cdd554de5022e84e0101b2628d331728f9b3f566d64dcf
                                                                                      • Instruction Fuzzy Hash: FCD05EB1D08109DBD7605BE0EE4EAE932785B04308F54403BEA8AF10C0DA7C955DA91E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 162 40225a-40d90c call 402dc0 CopyFileA
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CopyFile
                                                                                      • String ID:
                                                                                      • API String ID: 1304948518-0
                                                                                      • Opcode ID: 8747868f841f3e86c60c04198b4c3812247f9f6c6e6f8a051b3cab23d1bc53d8
                                                                                      • Instruction ID: 18315759b2a842b5bc47b7c566bd7707562d10a9491666b6158da95836141683
                                                                                      • Opcode Fuzzy Hash: 8747868f841f3e86c60c04198b4c3812247f9f6c6e6f8a051b3cab23d1bc53d8
                                                                                      • Instruction Fuzzy Hash: 7DC08CB0C14109EAC2105AA19E4A9AA3B6C4B0038CB2000B7720BB1081EA3C854EA67B

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 169 40d23a-40d245 RegOpenKeyExA 170 40da42 169->170 171 40d24b 169->171 172 40da44 170->172 171->170 172->172
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Open
                                                                                      • String ID:
                                                                                      • API String ID: 71445658-0
                                                                                      • Opcode ID: 31de8d22fc593bc1c279bc5476df20698ba11a3bbf33a6183a20eb6f6725d707
                                                                                      • Instruction ID: 8040d302770a520428a66105e482caf9ceff3af2c13684b85fe4baa54a86378e
                                                                                      • Opcode Fuzzy Hash: 31de8d22fc593bc1c279bc5476df20698ba11a3bbf33a6183a20eb6f6725d707
                                                                                      • Instruction Fuzzy Hash: 47C09B30708406CDE7555BB14A082B77764B644344B704D76E44BF05D0F739850F591E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 173 40d11d-40d126 OpenSCManagerA 174 40d8ee 173->174
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ManagerOpen
                                                                                      • String ID:
                                                                                      • API String ID: 1889721586-0
                                                                                      • Opcode ID: 86451105a0139d872ac9f7691e3aa5979c091675fabf703e7b9c18d13448488a
                                                                                      • Instruction ID: 5b145c32185f2fe23c23a9f3356da1e15a91333f529c69de665c0df8320d1f6d
                                                                                      • Opcode Fuzzy Hash: 86451105a0139d872ac9f7691e3aa5979c091675fabf703e7b9c18d13448488a
                                                                                      • Instruction Fuzzy Hash: C8B01270C05101FECB506F604F9801C35665500305330487AD103F10D0C73C4509FA2E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 175 402914-40291a RegCloseKey 176 40d8a7-40dba7 175->176 178 40dbaa 176->178 178->178
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Close
                                                                                      • String ID:
                                                                                      • API String ID: 3535843008-0
                                                                                      • Opcode ID: f5db5590c29d013d9deb5da303e7320bdae192f81683c438447ff80dd5f1286a
                                                                                      • Instruction ID: a672698ba65cf88ccc8542e474dbf54698bfe7b51bb9aee12de0e43c7b427ca3
                                                                                      • Opcode Fuzzy Hash: f5db5590c29d013d9deb5da303e7320bdae192f81683c438447ff80dd5f1286a
                                                                                      • Instruction Fuzzy Hash: E2A00271904514C6D64496949F4859877746504311751407ED152710D0D77C554A651D
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Value
                                                                                      • String ID:
                                                                                      • API String ID: 3702945584-0
                                                                                      • Opcode ID: 30ccf38bae0651031a747be385cf41240ce9650c7b68b68cc0c0d266fe80d253
                                                                                      • Instruction ID: 56e8f69265871bb44e1bd22ced2ad85af3968b80b96cf2c0600ba62ef43449e4
                                                                                      • Opcode Fuzzy Hash: 30ccf38bae0651031a747be385cf41240ce9650c7b68b68cc0c0d266fe80d253
                                                                                      • Instruction Fuzzy Hash: 51A00275504404EBCB090B919B0C67C7E31B748305F151069E142704A08B751655AF19
                                                                                      APIs
                                                                                      • CreateServiceA.ADVAPI32(?,?,?,000F01FF), ref: 0040D586
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateService
                                                                                      • String ID:
                                                                                      • API String ID: 1592570254-0
                                                                                      • Opcode ID: b1d535fcba41d0c5bc0ec726a091b62f5efeb8c2f631be5d7d856abec158dcf1
                                                                                      • Instruction ID: 55442d6bb3312950ba1be5e0f5e2ac9e55e18be424259f3225f08959e138762c
                                                                                      • Opcode Fuzzy Hash: b1d535fcba41d0c5bc0ec726a091b62f5efeb8c2f631be5d7d856abec158dcf1
                                                                                      • Instruction Fuzzy Hash: 73C04C74D8C402F6C2210AD00D4983510282585795331083B6E47B44C199B8044FB12F
                                                                                      APIs
                                                                                      • RegisterServiceCtrlHandlerA.ADVAPI32(UID Finder 6.11.66,Function_0000235E), ref: 004023C1
                                                                                      • SetServiceStatus.ADVAPI32(0040C408), ref: 00402420
                                                                                      • GetLastError.KERNEL32 ref: 00402422
                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                                      • GetLastError.KERNEL32 ref: 00402450
                                                                                      • SetServiceStatus.ADVAPI32(0040C408), ref: 00402480
                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                                      • CloseHandle.KERNEL32 ref: 004024A1
                                                                                      • SetServiceStatus.ADVAPI32(0040C408), ref: 004024CA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                                      • String ID: UID Finder 6.11.66
                                                                                      • API String ID: 3346042915-245170862
                                                                                      • Opcode ID: 8481bbef3285b0f9ebce9f82f4e1eb68b4ac82d1f0eae4c5cd12d91383da07eb
                                                                                      • Instruction ID: 4f107cf957cbd680cd4d605db27ce117804603c61eb7b626b01e69dba3e91430
                                                                                      • Opcode Fuzzy Hash: 8481bbef3285b0f9ebce9f82f4e1eb68b4ac82d1f0eae4c5cd12d91383da07eb
                                                                                      • Instruction Fuzzy Hash: 3521C570441214EBC2105F16EFE9A267FA8FBC5794B11823EE544B22B2CBB90549CFAD
                                                                                      APIs
                                                                                      • LCMapStringW.KERNEL32(00000000,00000100,00408650,00000001,00000000,00000000,00000103,00000001,00000000,?,00406357,00200020,00000000,?,00000000,00000000), ref: 004068D9
                                                                                      • LCMapStringA.KERNEL32(00000000,00000100,0040864C,00000001,00000000,00000000,?,00406357,00200020,00000000,?,00000000,00000000,00000001), ref: 004068F5
                                                                                      • LCMapStringA.KERNEL32(?,?,?,?,Wc@ ,?,00000103,00000001,00000000,?,00406357,00200020,00000000,?,00000000,00000000), ref: 0040693E
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406357,00200020,00000000,?,00000000,00000000), ref: 00406976
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 004069CE
                                                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406357,00200020,00000000,?,00000000), ref: 004069E4
                                                                                      • LCMapStringW.KERNEL32(?,?,?,00000000,Wc@ ,?,?,00406357,00200020,00000000,?,00000000), ref: 00406A17
                                                                                      • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 00406A7F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$ByteCharMultiWide
                                                                                      • String ID: Wc@
                                                                                      • API String ID: 352835431-4128830131
                                                                                      • Opcode ID: c59ed56cf9200d4eb4cbe2117608f716f3cf8688afb6deb225ba4043c85c6758
                                                                                      • Instruction ID: c30aaca26a5f6a0372154cda3c497b92e07e281ea3e6606adb1712902525b657
                                                                                      • Opcode Fuzzy Hash: c59ed56cf9200d4eb4cbe2117608f716f3cf8688afb6deb225ba4043c85c6758
                                                                                      • Instruction Fuzzy Hash: 8A517E71A00209EBCF219F94CD45ADF7FB5FB49750F11812AF911B12A0D7398921DF69
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F74), ref: 00403BFD
                                                                                      • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F74), ref: 00403C11
                                                                                      • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F74), ref: 00403C3D
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F74), ref: 00403C75
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F74), ref: 00403C97
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F74), ref: 00403CB0
                                                                                      • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F74), ref: 00403CC3
                                                                                      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403D01
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                      • String ID: t/@
                                                                                      • API String ID: 1823725401-3363397731
                                                                                      • Opcode ID: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                                                      • Instruction ID: 879d38be92084954eaea71e49c87bd85cc2f9a5de8a3f101a3316a48e994b743
                                                                                      • Opcode Fuzzy Hash: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                                                      • Instruction Fuzzy Hash: 3E31017350C2246EE7203F746CC483BBE9CEA4575AB15053FF982F3280DA398E8146AD
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,004043C1,?,Microsoft Visual C++ Runtime Library,00012010,?,00408584,?,004085D4,?,?,?,Runtime Error!Program: ), ref: 004065CA
                                                                                      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004065E2
                                                                                      • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004065F3
                                                                                      • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00406600
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad
                                                                                      • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                                                      • API String ID: 2238633743-4044615076
                                                                                      • Opcode ID: 1e827d42bf4979efd8fc0e05e1792a28396127eff3a42ececc528c363af0fc92
                                                                                      • Instruction ID: db39845ca5f1b339293cd545309a4189fd77c948f0b46f5b4ed21715b02f5541
                                                                                      • Opcode Fuzzy Hash: 1e827d42bf4979efd8fc0e05e1792a28396127eff3a42ececc528c363af0fc92
                                                                                      • Instruction Fuzzy Hash: 46018871A40611EFC7208FB5AFC49277EE99B587407061D3FA541F2291DE7B8811CB6D
                                                                                      APIs
                                                                                      • GetStringTypeW.KERNEL32(00000001,00408650,00000001,00000000,00000103,00000001,00000000,00406357,00200020,00000000,?,00000000,00000000,00000001), ref: 0040678D
                                                                                      • GetStringTypeA.KERNEL32(00000000,00000001,0040864C,00000001,?,?,00000000,00000000,00000001), ref: 004067A7
                                                                                      • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406357,00200020,00000000,?,00000000,00000000,00000001), ref: 004067DB
                                                                                      • MultiByteToWideChar.KERNEL32(Wc@ ,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406357,00200020,00000000,?,00000000,00000000,00000001), ref: 00406813
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 00406869
                                                                                      • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 0040687B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: StringType$ByteCharMultiWide
                                                                                      • String ID: Wc@
                                                                                      • API String ID: 3852931651-4128830131
                                                                                      • Opcode ID: 51aa12949cff19f931a0c8f8e78869120ffa08a7a0a03f1196022c1900c26aa0
                                                                                      • Instruction ID: 956ec2585e1336e719d8d065e8dcf62e24d3c9f54db028b8b8152b0cc77897f4
                                                                                      • Opcode Fuzzy Hash: 51aa12949cff19f931a0c8f8e78869120ffa08a7a0a03f1196022c1900c26aa0
                                                                                      • Instruction Fuzzy Hash: 3F419F72501209EFCF20AF94DD85EAF3B79FB04754F11453AF902F2290C73989248BA9
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040430A
                                                                                      • GetStdHandle.KERNEL32(000000F4,00408584,00000000,?,00000000,00000000), ref: 004043E0
                                                                                      • WriteFile.KERNEL32(00000000), ref: 004043E7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$HandleModuleNameWrite
                                                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                      • API String ID: 3784150691-4022980321
                                                                                      • Opcode ID: efc2387ad9e4ebc715aa49f254a253419fe4c6ba22f87958d70440b8e59437cd
                                                                                      • Instruction ID: d8635e2a7f81e525e6493e1b235b12eebf94c6aed7416e9ae0bb5a91e3b582aa
                                                                                      • Opcode Fuzzy Hash: efc2387ad9e4ebc715aa49f254a253419fe4c6ba22f87958d70440b8e59437cd
                                                                                      • Instruction Fuzzy Hash: ED318572601219AEDF20AA60DE46FDA336CAF85304F1004BFF944B61D1DA78DE448A5D
                                                                                      APIs
                                                                                      • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                                      • GetLastError.KERNEL32 ref: 00401F86
                                                                                      • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                                      • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                                      • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401FBF
                                                                                      • GetTickCount.KERNEL32 ref: 00401FFB
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00402061
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                                      • String ID:
                                                                                      • API String ID: 564119183-0
                                                                                      • Opcode ID: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                                                      • Instruction ID: 6227662f3afde43d5576465443d89a1ce2d87db52467ebd9ddb435d6f9af9923
                                                                                      • Opcode Fuzzy Hash: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                                                      • Instruction Fuzzy Hash: 68316E31A00255AFDB105FB49F8896F7F68EF45344F10807AFE86F7291DA748845C7A8
                                                                                      APIs
                                                                                      • GetVersionExA.KERNEL32 ref: 00403F0B
                                                                                      • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403F40
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403FA0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                      • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                      • API String ID: 1385375860-4131005785
                                                                                      • Opcode ID: 902e60ade4d92a6391f73bc102fd9c1f1b848196a8b58942b8a92e566e39241b
                                                                                      • Instruction ID: f9b557e5926ae0cb1bea86ca91105dc92f8de38cdcecb6fe0ade7bda32980430
                                                                                      • Opcode Fuzzy Hash: 902e60ade4d92a6391f73bc102fd9c1f1b848196a8b58942b8a92e566e39241b
                                                                                      • Instruction Fuzzy Hash: B6312571D412886DEB319A705C45ADE7F7C8B06309F2400FBE685F62C2E6388FC98B19
                                                                                      APIs
                                                                                      • GetStartupInfoA.KERNEL32(?), ref: 00403D6D
                                                                                      • GetFileType.KERNEL32(00000800), ref: 00403E13
                                                                                      • GetStdHandle.KERNEL32(-000000F6), ref: 00403E6C
                                                                                      • GetFileType.KERNEL32(00000000), ref: 00403E7A
                                                                                      • SetHandleCount.KERNEL32 ref: 00403EB1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileHandleType$CountInfoStartup
                                                                                      • String ID:
                                                                                      • API String ID: 1710529072-0
                                                                                      • Opcode ID: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                                                      • Instruction ID: 9dbc4695f3205ced207c781c98d2c2eecf37425ec268f2c04ee58d1a3995b9ba
                                                                                      • Opcode Fuzzy Hash: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                                                      • Instruction Fuzzy Hash: 7C5143716046458BD7218F38CD887663FA8AF02B26F15473EE4A2FB2E0C7389A45C74D
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 004069CE
                                                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406357,00200020,00000000,?,00000000), ref: 004069E4
                                                                                      • LCMapStringW.KERNEL32(?,?,?,00000000,Wc@ ,?,?,00406357,00200020,00000000,?,00000000), ref: 00406A17
                                                                                      • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 00406A7F
                                                                                      • WideCharToMultiByte.KERNEL32(?,00000220,?,00000000,Wc@ ,?,00000000,00000000,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 00406AA4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$ByteCharMultiWide
                                                                                      • String ID: Wc@
                                                                                      • API String ID: 352835431-4128830131
                                                                                      • Opcode ID: 1312c45284bb9b0df6438f0e9267380287f1a9abf6012680dfeac5a7f92326d3
                                                                                      • Instruction ID: 95b79f799a9dc74ab8783d7474949c37cbdd673329ec6272a6b224a97d77f72f
                                                                                      • Opcode Fuzzy Hash: 1312c45284bb9b0df6438f0e9267380287f1a9abf6012680dfeac5a7f92326d3
                                                                                      • Instruction Fuzzy Hash: C2113A32A00209ABCF229F98CD04ADEBFB6FF49350F11816AF911722A0D3368D61DF54
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(KERNEL32,00402EAA), ref: 0040319F
                                                                                      • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 004031AF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                      • API String ID: 1646373207-3105848591
                                                                                      • Opcode ID: 748c3a06171c204e9a1fd50ae91f73f3c4da2d806122e1fde3641ea021038800
                                                                                      • Instruction ID: 8ffc782c345fbc4a568335a89d7931e33654b4b0dba7f91db9b0a41dc5523864
                                                                                      • Opcode Fuzzy Hash: 748c3a06171c204e9a1fd50ae91f73f3c4da2d806122e1fde3641ea021038800
                                                                                      • Instruction Fuzzy Hash: 25C08C70381B01A6EE602FB22F09B172C0C1B48B43F1800BE7A89F81C0CE7CC208813D
                                                                                      APIs
                                                                                      • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040407A), ref: 00404C7D
                                                                                      • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040407A), ref: 00404CA1
                                                                                      • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040407A), ref: 00404CBB
                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040407A), ref: 00404D7C
                                                                                      • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040407A), ref: 00404D93
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual$FreeHeap
                                                                                      • String ID:
                                                                                      • API String ID: 714016831-0
                                                                                      • Opcode ID: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                                                      • Instruction ID: 2da35cf39901cd0166ef30884cd3fae4f1f30d489fd3d975fdb0eff0fbde1f7b
                                                                                      • Opcode Fuzzy Hash: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                                                      • Instruction Fuzzy Hash: 5531E2B15017019BE3208F28EE44B22B7A4EBC8754F11863EEA55B73E1E778AC44CB5C
                                                                                      APIs
                                                                                      • VirtualFree.KERNEL32(?,00008000,00004000,7622DFF0,?,00000000), ref: 004046D6
                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00404731
                                                                                      • HeapFree.KERNEL32(00000000,?), ref: 00404743
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$Virtual$Heap
                                                                                      • String ID: t/@
                                                                                      • API String ID: 2016334554-3363397731
                                                                                      • Opcode ID: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                                                      • Instruction ID: 8d17195ec0ccff2424cf6b57804f20dfeb37273885bc82fd82189131503ce94b
                                                                                      • Opcode Fuzzy Hash: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                                                      • Instruction Fuzzy Hash: 3EB19EB4A01205DFDB14CF44CAD0A69BBA1FB88314F25C1AEDA596F3A2D735ED41CB84
                                                                                      APIs
                                                                                      • GetCPInfo.KERNEL32(?,00000000), ref: 00406083
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Info
                                                                                      • String ID: $
                                                                                      • API String ID: 1807457897-3032137957
                                                                                      • Opcode ID: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                                                      • Instruction ID: 3e87ef9e1105c78bb2f85cebc7c09ea1e0cb28c4563d123519c4b9c13c46ffd4
                                                                                      • Opcode Fuzzy Hash: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                                                      • Instruction Fuzzy Hash: 0C414831004258AAEB119B54CD99BFB3FE9DB06704F1501F6D587FB1D3C23949648BAE
                                                                                      APIs
                                                                                      • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404878,?,?,?,00000100,?,00000000), ref: 00404AD8
                                                                                      • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404878,?,?,?,00000100,?,00000000), ref: 00404B0C
                                                                                      • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404878,?,?,?,00000100,?,00000000), ref: 00404B26
                                                                                      • HeapFree.KERNEL32(00000000,?,?,00000000,00404878,?,?,?,00000100,?,00000000), ref: 00404B3D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000003.00000002.2198598494.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000003.00000002.2198598494.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_3_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocHeap$FreeVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 3499195154-0
                                                                                      • Opcode ID: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                                                      • Instruction ID: e332c3e7fbabb4a530177a7352d9393d0fbd82ec7ab2db7e11d44f19093e014a
                                                                                      • Opcode Fuzzy Hash: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                                                      • Instruction Fuzzy Hash: 611116B0201601DFC7219F19EE85E22BBB5FB84720711463AF292E65F0D771A845CF5C

                                                                                      Execution Graph

                                                                                      Execution Coverage:9.7%
                                                                                      Dynamic/Decrypted Code Coverage:84.5%
                                                                                      Signature Coverage:0.2%
                                                                                      Total number of Nodes:2000
                                                                                      Total number of Limit Nodes:38
                                                                                      execution_graph 18908 40d460 RegSetValueExA RegCloseKey 18909 40da8b 18908->18909 18912 4022cb 18909->18912 18913 4022f2 WaitForSingleObject 18912->18913 18915 b9c99b 18916 bd22d0 WriteFile 18915->18916 18877 40d804 18878 40d817 18877->18878 18879 40d82c RegCreateKeyExA 18877->18879 18878->18879 18880 40dbc9 18878->18880 18881 40d1c4 18884 401f64 FindResourceA 18881->18884 18883 40d1c9 18885 401f86 GetLastError SizeofResource 18884->18885 18890 401f9f 18884->18890 18886 401fa6 LoadResource LockResource GlobalAlloc 18885->18886 18885->18890 18887 401fd2 18886->18887 18888 401ffb GetTickCount 18887->18888 18891 402005 GlobalAlloc 18888->18891 18890->18883 18891->18890 18917 4025a4 18918 40255f 18917->18918 18919 402926 18918->18919 18921 b53cbf 18918->18921 18922 b53ccd 18921->18922 18923 b53cc8 18921->18923 18927 b53ce2 18922->18927 18935 b5b891 18923->18935 18926 b53cdb 18926->18919 18928 b53cee CallCatchBlock 18927->18928 18932 b53d3c ___DllMainCRTStartup 18928->18932 18934 b53d99 CallCatchBlock 18928->18934 18939 b53b4d 18928->18939 18930 b53d76 18931 b53b4d __CRT_INIT@12 138 API calls 18930->18931 18930->18934 18931->18934 18932->18930 18933 b53b4d __CRT_INIT@12 138 API calls 18932->18933 18932->18934 18933->18930 18934->18926 18936 b5b8b4 18935->18936 18937 b5b8c1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18935->18937 18936->18937 18938 b5b8b8 18936->18938 18937->18938 18938->18922 18940 b53b59 CallCatchBlock 18939->18940 18941 b53b61 18940->18941 18942 b53bdb 18940->18942 18987 b58196 GetProcessHeap 18941->18987 18944 b53c44 18942->18944 18945 b53bdf 18942->18945 18947 b53ca7 18944->18947 18948 b53c49 18944->18948 18950 b53c00 18945->18950 18981 b53b6a CallCatchBlock __CRT_INIT@12 18945->18981 19088 b5840b 18945->19088 18946 b53b66 18946->18981 18988 b55d44 18946->18988 18947->18981 19147 b55bd4 18947->19147 19119 b5917b 18948->19119 19091 b582e2 RtlDecodePointer 18950->19091 18952 b53c54 18952->18981 19122 b58a1c 18952->19122 18956 b53b76 __RTC_Initialize 18964 b53b86 GetCommandLineA 18956->18964 18956->18981 18959 b53c16 __CRT_INIT@12 19115 b53c2f 18959->19115 18961 b5b52f __ioterm 60 API calls 18963 b53c11 18961->18963 18966 b55dba __mtterm 62 API calls 18963->18966 19009 b5b92d GetEnvironmentStringsW 18964->19009 18966->18959 18968 b53c7d 18970 b53c83 18968->18970 18971 b53c9b 18968->18971 19131 b55c91 18970->19131 19141 b52f24 18971->19141 18975 b53ba0 18977 b53ba4 18975->18977 19041 b5b581 18975->19041 18976 b53c8b GetCurrentThreadId 18976->18981 19074 b55dba 18977->19074 18981->18932 18982 b53bc4 18982->18981 19083 b5b52f 18982->19083 18987->18946 19155 b584b2 RtlEncodePointer 18988->19155 18990 b55d49 19160 b589ce 18990->19160 18993 b55d52 18994 b55dba __mtterm 62 API calls 18993->18994 18996 b55d57 18994->18996 18996->18956 18998 b55d6f 18999 b58a1c __calloc_crt 59 API calls 18998->18999 19000 b55d7c 18999->19000 19001 b55db1 19000->19001 19003 b5919a __freeptd TlsSetValue 19000->19003 19002 b55dba __mtterm 62 API calls 19001->19002 19004 b55db6 19002->19004 19005 b55d90 19003->19005 19004->18956 19005->19001 19006 b55d96 19005->19006 19007 b55c91 __initptd 59 API calls 19006->19007 19008 b55d9e GetCurrentThreadId 19007->19008 19008->18956 19010 b5b940 WideCharToMultiByte 19009->19010 19015 b53b96 19009->19015 19012 b5b973 19010->19012 19013 b5b9aa FreeEnvironmentStringsW 19010->19013 19171 b58a64 19012->19171 19013->19015 19022 b5b27b 19015->19022 19017 b5b980 WideCharToMultiByte 19018 b5b996 19017->19018 19019 b5b99f FreeEnvironmentStringsW 19017->19019 19020 b52f24 _free 59 API calls 19018->19020 19019->19015 19021 b5b99c 19020->19021 19021->19019 19023 b5b287 CallCatchBlock 19022->19023 19024 b5889d __lock 59 API calls 19023->19024 19025 b5b28e 19024->19025 19026 b58a1c __calloc_crt 59 API calls 19025->19026 19027 b5b29f 19026->19027 19028 b5b30a GetStartupInfoW 19027->19028 19029 b5b2aa CallCatchBlock @_EH4_CallFilterFunc@8 19027->19029 19035 b5b31f 19028->19035 19036 b5b44e 19028->19036 19029->18975 19030 b5b516 19424 b5b526 19030->19424 19032 b58a1c __calloc_crt 59 API calls 19032->19035 19033 b5b49b GetStdHandle 19033->19036 19034 b5b4ae GetFileType 19034->19036 19035->19032 19035->19036 19038 b5b36d 19035->19038 19036->19030 19036->19033 19036->19034 19040 b591bc __ioinit InitializeCriticalSectionAndSpinCount 19036->19040 19037 b5b3a1 GetFileType 19037->19038 19038->19036 19038->19037 19039 b591bc __ioinit InitializeCriticalSectionAndSpinCount 19038->19039 19039->19038 19040->19036 19042 b5b594 GetModuleFileNameA 19041->19042 19043 b5b58f 19041->19043 19045 b5b5c1 19042->19045 19434 b5523a 19043->19434 19428 b5b634 19045->19428 19047 b53bb0 19047->18982 19052 b5b7b0 19047->19052 19049 b58a64 __malloc_crt 59 API calls 19050 b5b5fa 19049->19050 19050->19047 19051 b5b634 _parse_cmdline 59 API calls 19050->19051 19051->19047 19053 b5b7b9 19052->19053 19055 b5b7be _strlen 19052->19055 19054 b5523a ___initmbctable 71 API calls 19053->19054 19054->19055 19056 b58a1c __calloc_crt 59 API calls 19055->19056 19059 b53bb9 19055->19059 19064 b5b7f4 _strlen 19056->19064 19057 b5b846 19058 b52f24 _free 59 API calls 19057->19058 19058->19059 19059->18982 19068 b5841a 19059->19068 19060 b58a1c __calloc_crt 59 API calls 19060->19064 19061 b5b86d 19063 b52f24 _free 59 API calls 19061->19063 19063->19059 19064->19057 19064->19059 19064->19060 19064->19061 19065 b5b884 19064->19065 19598 b56c6c 19064->19598 19066 b54eb5 __invoke_watson 8 API calls 19065->19066 19067 b5b890 19066->19067 19070 b58426 __IsNonwritableInCurrentImage 19068->19070 19607 b5d28f 19070->19607 19071 b58444 __initterm_e 19075 b55dc4 19074->19075 19080 b55dca 19074->19080 19676 b5915c 19075->19676 19077 b588e7 RtlDeleteCriticalSection 19079 b52f24 _free 59 API calls 19077->19079 19078 b58903 19081 b5890f RtlDeleteCriticalSection 19078->19081 19082 b58922 19078->19082 19079->19080 19080->19077 19080->19078 19081->19078 19082->18981 19085 b5b536 19083->19085 19084 b5b57e 19084->18977 19085->19084 19086 b52f24 _free 59 API calls 19085->19086 19087 b5b54f RtlDeleteCriticalSection 19085->19087 19086->19085 19087->19085 19089 b58554 _doexit 59 API calls 19088->19089 19090 b58416 19089->19090 19090->18950 19092 b5830e 19091->19092 19093 b582fc 19091->19093 19094 b52f24 _free 59 API calls 19092->19094 19093->19092 19096 b52f24 _free 59 API calls 19093->19096 19095 b5831b 19094->19095 19097 b5833f 19095->19097 19099 b52f24 _free 59 API calls 19095->19099 19096->19093 19098 b52f24 _free 59 API calls 19097->19098 19100 b5834b 19098->19100 19099->19095 19101 b52f24 _free 59 API calls 19100->19101 19102 b5835c 19101->19102 19103 b52f24 _free 59 API calls 19102->19103 19104 b58367 19103->19104 19105 b5838c RtlEncodePointer 19104->19105 19108 b52f24 _free 59 API calls 19104->19108 19106 b583a1 19105->19106 19107 b583a7 19105->19107 19109 b52f24 _free 59 API calls 19106->19109 19110 b583bd 19107->19110 19112 b52f24 _free 59 API calls 19107->19112 19111 b5838b 19108->19111 19109->19107 19113 b53c05 19110->19113 19114 b52f24 _free 59 API calls 19110->19114 19111->19105 19112->19110 19113->18959 19113->18961 19114->19113 19116 b53c41 19115->19116 19117 b53c33 19115->19117 19116->18981 19117->19116 19118 b55dba __mtterm 62 API calls 19117->19118 19118->19116 19120 b59192 TlsGetValue 19119->19120 19121 b5918e 19119->19121 19120->18952 19121->18952 19125 b58a23 19122->19125 19124 b53c65 19124->18981 19128 b5919a 19124->19128 19125->19124 19127 b58a41 19125->19127 19679 b60468 19125->19679 19127->19124 19127->19125 19687 b594b5 Sleep 19127->19687 19129 b591b4 TlsSetValue 19128->19129 19130 b591b0 19128->19130 19129->18968 19130->18968 19132 b55c9d CallCatchBlock 19131->19132 19133 b5889d __lock 59 API calls 19132->19133 19134 b55cda 19133->19134 19688 b55d32 19134->19688 19137 b5889d __lock 59 API calls 19138 b55cfb ___addlocaleref 19137->19138 19691 b55d3b 19138->19691 19140 b55d26 CallCatchBlock 19140->18976 19142 b52f2d HeapFree 19141->19142 19143 b52f56 _free 19141->19143 19142->19143 19144 b52f42 19142->19144 19143->18981 19145 b55e0b ___strgtold12_l 57 API calls 19144->19145 19146 b52f48 GetLastError 19145->19146 19146->19143 19148 b55be1 19147->19148 19149 b55c07 19147->19149 19150 b55bef 19148->19150 19151 b5917b __freeptd TlsGetValue 19148->19151 19149->18981 19152 b5919a __freeptd TlsSetValue 19150->19152 19151->19150 19153 b55bff 19152->19153 19696 b55a9f 19153->19696 19156 b584c3 __init_pointers __initp_misc_winsig 19155->19156 19167 b539b7 RtlEncodePointer 19156->19167 19158 b584db __init_pointers 19159 b5922a 34 API calls 19158->19159 19159->18990 19161 b589da 19160->19161 19163 b55d4e 19161->19163 19168 b591bc 19161->19168 19163->18993 19164 b5913e 19163->19164 19165 b59155 TlsAlloc 19164->19165 19166 b55d64 19164->19166 19166->18993 19166->18998 19167->19158 19169 b591d9 InitializeCriticalSectionAndSpinCount 19168->19169 19170 b591cc 19168->19170 19169->19161 19170->19161 19175 b58a72 19171->19175 19173 b58aa4 19173->19013 19173->19017 19175->19173 19176 b52f5c 19175->19176 19193 b594b5 Sleep 19175->19193 19177 b52fd7 19176->19177 19186 b52f68 19176->19186 19178 b581b3 __calloc_impl RtlDecodePointer 19177->19178 19179 b52fdd 19178->19179 19181 b55e0b ___strgtold12_l 58 API calls 19179->19181 19183 b52fcf 19181->19183 19182 b52f9b RtlAllocateHeap 19182->19183 19182->19186 19183->19175 19185 b52f73 19185->19186 19194 b58683 19185->19194 19203 b586e0 19185->19203 19238 b582cc 19185->19238 19186->19182 19186->19185 19187 b52fc3 19186->19187 19191 b52fc1 19186->19191 19241 b581b3 RtlDecodePointer 19186->19241 19243 b55e0b 19187->19243 19192 b55e0b ___strgtold12_l 58 API calls 19191->19192 19192->19183 19193->19175 19246 b6012e 19194->19246 19196 b5868a 19197 b6012e __NMSG_WRITE 59 API calls 19196->19197 19201 b58697 19196->19201 19197->19201 19198 b586e0 __NMSG_WRITE 59 API calls 19199 b586af 19198->19199 19200 b586e0 __NMSG_WRITE 59 API calls 19199->19200 19202 b586b9 19200->19202 19201->19198 19201->19202 19202->19185 19204 b586fe __NMSG_WRITE 19203->19204 19205 b58825 19204->19205 19206 b6012e __NMSG_WRITE 55 API calls 19204->19206 19314 b544fb 19205->19314 19208 b58711 19206->19208 19210 b5882a GetStdHandle 19208->19210 19211 b6012e __NMSG_WRITE 55 API calls 19208->19211 19209 b5888e 19209->19185 19210->19205 19214 b58838 _strlen 19210->19214 19212 b58722 19211->19212 19212->19210 19213 b58734 19212->19213 19213->19205 19262 b5f4ed 19213->19262 19214->19205 19216 b58871 WriteFile 19214->19216 19216->19205 19218 b58761 GetModuleFileNameW 19220 b58781 19218->19220 19226 b58791 __NMSG_WRITE 19218->19226 19219 b58892 19321 b54eb5 IsProcessorFeaturePresent 19219->19321 19222 b5f4ed __NMSG_WRITE 55 API calls 19220->19222 19222->19226 19225 b587d7 19225->19219 19280 b5f481 19225->19280 19226->19219 19226->19225 19271 b5f562 19226->19271 19233 b5f481 __NMSG_WRITE 55 API calls 19234 b5880e 19233->19234 19234->19219 19407 b58298 GetModuleHandleExW 19238->19407 19242 b581c6 19241->19242 19242->19186 19410 b55c22 GetLastError 19243->19410 19245 b55e10 19245->19191 19247 b60138 19246->19247 19248 b55e0b ___strgtold12_l 59 API calls 19247->19248 19249 b60142 19247->19249 19250 b6015e 19248->19250 19249->19196 19253 b54ea5 19250->19253 19256 b54e7a RtlDecodePointer 19253->19256 19257 b54e8d 19256->19257 19258 b54eb5 __invoke_watson 8 API calls 19257->19258 19259 b54ea4 19258->19259 19260 b54e7a ___strgtold12_l 8 API calls 19259->19260 19261 b54eb1 19260->19261 19261->19196 19263 b5f4f8 19262->19263 19264 b5f506 19262->19264 19263->19264 19268 b5f51f 19263->19268 19265 b55e0b ___strgtold12_l 59 API calls 19264->19265 19266 b5f510 19265->19266 19267 b54ea5 ___strgtold12_l 9 API calls 19266->19267 19269 b58754 19267->19269 19268->19269 19270 b55e0b ___strgtold12_l 59 API calls 19268->19270 19269->19218 19269->19219 19270->19266 19272 b5f570 19271->19272 19274 b5f579 19272->19274 19275 b5f574 19272->19275 19278 b5f5b3 19272->19278 19273 b55e0b ___strgtold12_l 59 API calls 19276 b5f5a4 19273->19276 19274->19225 19275->19273 19275->19274 19277 b54ea5 ___strgtold12_l 9 API calls 19276->19277 19277->19274 19278->19274 19279 b55e0b ___strgtold12_l 59 API calls 19278->19279 19279->19276 19281 b5f49b 19280->19281 19282 b5f48d 19280->19282 19283 b55e0b ___strgtold12_l 59 API calls 19281->19283 19282->19281 19287 b5f4c7 19282->19287 19284 b5f4a5 19283->19284 19285 b54ea5 ___strgtold12_l 9 API calls 19284->19285 19286 b587f7 19285->19286 19286->19219 19286->19233 19287->19286 19288 b55e0b ___strgtold12_l 59 API calls 19287->19288 19288->19284 19315 b54505 IsProcessorFeaturePresent 19314->19315 19316 b54503 19314->19316 19318 b5953f 19315->19318 19316->19209 19356 b594ee IsDebuggerPresent 19318->19356 19322 b54ec0 19321->19322 19364 b54d48 19322->19364 19357 b59503 __call_reportfault 19356->19357 19362 b594d8 SetUnhandledExceptionFilter UnhandledExceptionFilter 19357->19362 19359 b5950b __call_reportfault 19363 b594c3 GetCurrentProcess TerminateProcess 19359->19363 19361 b59528 19361->19209 19362->19359 19363->19361 19365 b54d62 _memset __call_reportfault 19364->19365 19366 b54d82 IsDebuggerPresent 19365->19366 19372 b594d8 SetUnhandledExceptionFilter UnhandledExceptionFilter 19366->19372 19368 b544fb ___strgtold12_l 6 API calls 19370 b54e46 __call_reportfault 19370->19368 19372->19370 19408 b582b1 GetProcAddress 19407->19408 19409 b582c3 ExitProcess 19407->19409 19408->19409 19411 b5917b __freeptd TlsGetValue 19410->19411 19412 b55c37 19411->19412 19413 b55c85 SetLastError 19412->19413 19414 b58a1c __calloc_crt 56 API calls 19412->19414 19413->19245 19415 b55c4a 19414->19415 19415->19413 19416 b5919a __freeptd TlsSetValue 19415->19416 19417 b55c5e 19416->19417 19418 b55c64 19417->19418 19419 b55c7c 19417->19419 19420 b55c91 __initptd 56 API calls 19418->19420 19421 b52f24 _free 56 API calls 19419->19421 19423 b55c6c GetCurrentThreadId 19420->19423 19422 b55c82 19421->19422 19422->19413 19423->19413 19427 b58a07 RtlLeaveCriticalSection 19424->19427 19426 b5b52d 19426->19029 19427->19426 19430 b5b656 19428->19430 19433 b5b6ba 19430->19433 19438 b61586 19430->19438 19431 b5b5d7 19431->19047 19431->19049 19432 b61586 _parse_cmdline 59 API calls 19432->19433 19433->19431 19433->19432 19435 b5524a 19434->19435 19436 b55243 19434->19436 19435->19042 19494 b55597 19436->19494 19441 b6152c 19438->19441 19444 b5222b 19441->19444 19445 b5223c 19444->19445 19451 b52289 19444->19451 19452 b55c0a 19445->19452 19447 b52242 19448 b52269 19447->19448 19457 b5516f 19447->19457 19448->19451 19472 b554f1 19448->19472 19451->19430 19453 b55c22 __getptd_noexit 59 API calls 19452->19453 19454 b55c10 19453->19454 19455 b55c1d 19454->19455 19456 b583ef __amsg_exit 59 API calls 19454->19456 19455->19447 19456->19455 19458 b5517b CallCatchBlock 19457->19458 19459 b55c0a CallCatchBlock 59 API calls 19458->19459 19460 b55184 19459->19460 19473 b554fd CallCatchBlock 19472->19473 19474 b55c0a CallCatchBlock 59 API calls 19473->19474 19495 b555a3 CallCatchBlock 19494->19495 19496 b55c0a CallCatchBlock 59 API calls 19495->19496 19497 b555ab 19496->19497 19498 b554f1 _LocaleUpdate::_LocaleUpdate 59 API calls 19497->19498 19499 b555b5 19498->19499 19519 b55292 19499->19519 19502 b58a64 __malloc_crt 59 API calls 19503 b555d7 19502->19503 19504 b55704 CallCatchBlock 19503->19504 19504->19435 19520 b5222b _LocaleUpdate::_LocaleUpdate 59 API calls 19519->19520 19521 b552a2 19520->19521 19522 b552b1 GetOEMCP 19521->19522 19523 b552c3 19521->19523 19525 b552da 19522->19525 19524 b552c8 GetACP 19523->19524 19523->19525 19524->19525 19525->19502 19525->19504 19599 b56c85 19598->19599 19600 b56c77 19598->19600 19601 b55e0b ___strgtold12_l 59 API calls 19599->19601 19600->19599 19605 b56c9b 19600->19605 19602 b56c8c 19601->19602 19603 b54ea5 ___strgtold12_l 9 API calls 19602->19603 19604 b56c96 19603->19604 19604->19064 19605->19604 19606 b55e0b ___strgtold12_l 59 API calls 19605->19606 19606->19602 19608 b5d292 RtlEncodePointer 19607->19608 19608->19608 19609 b5d2ac 19608->19609 19609->19071 19677 b59173 TlsFree 19676->19677 19678 b5916f 19676->19678 19677->19080 19678->19080 19680 b60473 19679->19680 19685 b6048e 19679->19685 19681 b6047f 19680->19681 19680->19685 19682 b55e0b ___strgtold12_l 58 API calls 19681->19682 19684 b60484 19682->19684 19683 b6049e RtlAllocateHeap 19683->19684 19683->19685 19684->19125 19685->19683 19685->19684 19686 b581b3 __calloc_impl RtlDecodePointer 19685->19686 19686->19685 19687->19127 19694 b58a07 RtlLeaveCriticalSection 19688->19694 19690 b55cf4 19690->19137 19695 b58a07 RtlLeaveCriticalSection 19691->19695 19693 b55d42 19693->19140 19694->19690 19695->19693 19698 b55aab CallCatchBlock 19696->19698 19697 b55ac4 19701 b55ad3 19697->19701 19703 b52f24 _free 59 API calls 19697->19703 19698->19697 19699 b55bb3 CallCatchBlock 19698->19699 19700 b52f24 _free 59 API calls 19698->19700 19699->19149 19700->19697 19702 b55ae2 19701->19702 19704 b52f24 _free 59 API calls 19701->19704 19705 b55af1 19702->19705 19706 b52f24 _free 59 API calls 19702->19706 19703->19701 19704->19702 19707 b55b00 19705->19707 19708 b52f24 _free 59 API calls 19705->19708 19706->19705 19709 b55b0f 19707->19709 19711 b52f24 _free 59 API calls 19707->19711 19708->19707 19710 b55b1e 19709->19710 19712 b52f24 _free 59 API calls 19709->19712 19713 b55b30 19710->19713 19714 b52f24 _free 59 API calls 19710->19714 19711->19709 19712->19710 19715 b5889d __lock 59 API calls 19713->19715 19714->19713 19719 b55b38 19715->19719 19716 b55b5b 19728 b55bbf 19716->19728 19719->19716 19721 b52f24 _free 59 API calls 19719->19721 19720 b5889d __lock 59 API calls 19726 b55b6f ___removelocaleref 19720->19726 19721->19716 19722 b55ba0 19761 b55bcb 19722->19761 19725 b52f24 _free 59 API calls 19725->19699 19726->19722 19731 b54f75 19726->19731 19764 b58a07 RtlLeaveCriticalSection 19728->19764 19730 b55b68 19730->19720 19732 b54fee 19731->19732 19733 b54f8a 19731->19733 19734 b5503b 19732->19734 19735 b52f24 _free 59 API calls 19732->19735 19733->19732 19736 b54fbb 19733->19736 19743 b52f24 _free 59 API calls 19733->19743 19739 b55064 19734->19739 19805 b5d4ed 19734->19805 19738 b5500f 19735->19738 19747 b52f24 _free 59 API calls 19736->19747 19760 b54fd9 19736->19760 19741 b52f24 _free 59 API calls 19738->19741 19745 b550c3 19739->19745 19755 b52f24 59 API calls _free 19739->19755 19746 b55022 19741->19746 19742 b52f24 _free 59 API calls 19749 b54fe3 19742->19749 19750 b54fb0 19743->19750 19744 b52f24 _free 59 API calls 19744->19739 19751 b52f24 _free 59 API calls 19745->19751 19748 b52f24 _free 59 API calls 19746->19748 19752 b54fce 19747->19752 19753 b55030 19748->19753 19754 b52f24 _free 59 API calls 19749->19754 19765 b5d38a 19750->19765 19757 b550c9 19751->19757 19793 b5d486 19752->19793 19759 b52f24 _free 59 API calls 19753->19759 19754->19732 19755->19739 19757->19722 19759->19734 19760->19742 19981 b58a07 RtlLeaveCriticalSection 19761->19981 19763 b55bad 19763->19725 19764->19730 19766 b5d399 19765->19766 19792 b5d482 19765->19792 19767 b5d3aa 19766->19767 19769 b52f24 _free 59 API calls 19766->19769 19768 b5d3bc 19767->19768 19770 b52f24 _free 59 API calls 19767->19770 19771 b5d3ce 19768->19771 19772 b52f24 _free 59 API calls 19768->19772 19769->19767 19770->19768 19773 b5d3e0 19771->19773 19774 b52f24 _free 59 API calls 19771->19774 19772->19771 19775 b5d3f2 19773->19775 19777 b52f24 _free 59 API calls 19773->19777 19774->19773 19776 b5d404 19775->19776 19778 b52f24 _free 59 API calls 19775->19778 19779 b5d416 19776->19779 19780 b52f24 _free 59 API calls 19776->19780 19777->19775 19778->19776 19781 b5d428 19779->19781 19782 b52f24 _free 59 API calls 19779->19782 19780->19779 19783 b52f24 _free 59 API calls 19781->19783 19787 b5d43a 19781->19787 19782->19781 19783->19787 19784 b52f24 _free 59 API calls 19786 b5d44c 19784->19786 19785 b5d45e 19789 b5d470 19785->19789 19790 b52f24 _free 59 API calls 19785->19790 19786->19785 19788 b52f24 _free 59 API calls 19786->19788 19787->19784 19787->19786 19788->19785 19791 b52f24 _free 59 API calls 19789->19791 19789->19792 19790->19789 19791->19792 19792->19736 19794 b5d491 19793->19794 19795 b5d4e9 19793->19795 19796 b5d4a1 19794->19796 19797 b52f24 _free 59 API calls 19794->19797 19795->19760 19798 b5d4b3 19796->19798 19799 b52f24 _free 59 API calls 19796->19799 19797->19796 19800 b5d4c5 19798->19800 19801 b52f24 _free 59 API calls 19798->19801 19799->19798 19802 b5d4d7 19800->19802 19803 b52f24 _free 59 API calls 19800->19803 19801->19800 19802->19795 19804 b52f24 _free 59 API calls 19802->19804 19803->19802 19804->19795 19806 b5d4fc 19805->19806 19980 b55059 19805->19980 19807 b52f24 _free 59 API calls 19806->19807 19808 b5d504 19807->19808 19809 b52f24 _free 59 API calls 19808->19809 19810 b5d50c 19809->19810 19811 b52f24 _free 59 API calls 19810->19811 19812 b5d514 19811->19812 19813 b52f24 _free 59 API calls 19812->19813 19814 b5d51c 19813->19814 19815 b52f24 _free 59 API calls 19814->19815 19816 b5d524 19815->19816 19817 b52f24 _free 59 API calls 19816->19817 19818 b5d52c 19817->19818 19819 b52f24 _free 59 API calls 19818->19819 19820 b5d533 19819->19820 19821 b52f24 _free 59 API calls 19820->19821 19980->19744 19981->19763 19982 b4f851 CreateFileA 19983 b4f94d 19982->19983 19987 b4f882 19982->19987 19984 b4f89a DeviceIoControl 19984->19987 19985 b4f943 FindCloseChangeNotification 19985->19983 19986 b4f90f GetLastError 19986->19985 19986->19987 19987->19984 19987->19985 19987->19986 19989 b53afc 19987->19989 19991 b53b04 19989->19991 19990 b52f5c _malloc 59 API calls 19990->19991 19991->19990 19992 b53b1e 19991->19992 19993 b581b3 __calloc_impl RtlDecodePointer 19991->19993 19994 b53b22 std::exception::exception 19991->19994 19992->19987 19993->19991 19997 b5450a 19994->19997 19996 b53b4c 19998 b54529 RaiseException 19997->19998 19998->19996 18894 b7f370 WriteFile 18895 ba17b2 18896 bc1c30 CreateFileA 18895->18896 18897 be0860 18896->18897 18898 b7e77d 18899 b7e70a 18898->18899 18900 b9f874 18899->18900 18901 b9f7b0 FindCloseChangeNotification 18899->18901 18901->18900 20000 b47b9f 20036 b466f0 _memset 20000->20036 20002 b52f24 59 API calls _free 20002->20036 20003 b4670a RtlEnterCriticalSection RtlLeaveCriticalSection 20003->20036 20004 b46704 Sleep 20004->20003 20005 b472a7 InternetOpenA 20006 b472c5 InternetSetOptionA InternetSetOptionA InternetSetOptionA 20005->20006 20005->20036 20011 b4733e _memset 20006->20011 20007 b4731e InternetOpenUrlA 20008 b4737e InternetCloseHandle 20007->20008 20007->20011 20008->20036 20009 b47342 InternetReadFile 20010 b47373 InternetCloseHandle 20009->20010 20009->20011 20010->20008 20011->20007 20011->20009 20012 b473e5 RtlEnterCriticalSection RtlLeaveCriticalSection 20044 b522ec 20012->20044 20014 b52f5c _malloc 59 API calls 20015 b47499 RtlEnterCriticalSection RtlLeaveCriticalSection 20014->20015 20015->20036 20016 b522ec 66 API calls 20016->20036 20017 b47766 RtlEnterCriticalSection RtlLeaveCriticalSection 20017->20036 20019 b52f5c 59 API calls _malloc 20019->20036 20022 b478de RtlEnterCriticalSection 20023 b4790b RtlLeaveCriticalSection 20022->20023 20022->20036 20120 b43c67 20023->20120 20027 b4a6d3 73 API calls 20027->20036 20030 b53afc _Allocate 60 API calls 20030->20036 20035 b53596 60 API calls _strtok 20035->20036 20036->20002 20036->20003 20036->20004 20036->20005 20036->20012 20036->20014 20036->20016 20036->20017 20036->20019 20036->20022 20036->20023 20036->20027 20036->20030 20036->20035 20036->20036 20040 b476e8 Sleep 20036->20040 20042 b476e3 shared_ptr 20036->20042 20054 b4a7fd 20036->20054 20058 b45119 20036->20058 20087 b4abbd 20036->20087 20097 b461f1 20036->20097 20100 b523c8 20036->20100 20111 b41ba7 20036->20111 20127 b43d7e 20036->20127 20134 b482e9 20036->20134 20140 b4d0c5 20036->20140 20145 b48398 20036->20145 20153 b433b2 20036->20153 20160 b52800 20036->20160 20163 b496e5 20036->20163 20178 b48fb1 20036->20178 20185 b4534d 20036->20185 20170 b518a0 20040->20170 20042->20036 20042->20040 20174 b44100 20042->20174 20045 b5231b 20044->20045 20046 b522f8 20044->20046 20195 b52333 20045->20195 20046->20045 20047 b522fe 20046->20047 20049 b55e0b ___strgtold12_l 59 API calls 20047->20049 20051 b52303 20049->20051 20050 b5232e 20050->20036 20052 b54ea5 ___strgtold12_l 9 API calls 20051->20052 20053 b5230e 20052->20053 20053->20036 20055 b4a807 __EH_prolog 20054->20055 20205 b4dfae 20055->20205 20057 b4a825 shared_ptr 20057->20036 20059 b45123 __EH_prolog 20058->20059 20209 b50ac0 20059->20209 20062 b43c67 72 API calls 20063 b4514a 20062->20063 20064 b43d7e 64 API calls 20063->20064 20065 b45158 20064->20065 20066 b482e9 89 API calls 20065->20066 20067 b4516c 20066->20067 20070 b45322 shared_ptr 20067->20070 20213 b4a6d3 20067->20213 20070->20036 20071 b451c4 20074 b4a6d3 73 API calls 20071->20074 20072 b451f6 20073 b4a6d3 73 API calls 20072->20073 20075 b45207 20073->20075 20076 b451d4 20074->20076 20075->20070 20077 b4a6d3 73 API calls 20075->20077 20076->20070 20079 b4a6d3 73 API calls 20076->20079 20078 b4524a 20077->20078 20078->20070 20081 b4a6d3 73 API calls 20078->20081 20080 b452b4 20079->20080 20080->20070 20082 b4a6d3 73 API calls 20080->20082 20081->20076 20083 b452da 20082->20083 20083->20070 20084 b4a6d3 73 API calls 20083->20084 20085 b45304 20084->20085 20218 b4ce87 20085->20218 20088 b4abc7 __EH_prolog 20087->20088 20269 b4d09c 20088->20269 20090 b4abe8 shared_ptr 20272 b520a0 20090->20272 20092 b4abff 20093 b4ac15 20092->20093 20278 b43fb0 20092->20278 20093->20036 20098 b52f5c _malloc 59 API calls 20097->20098 20099 b46204 20098->20099 20101 b523e4 20100->20101 20102 b523f9 20100->20102 20104 b55e0b ___strgtold12_l 59 API calls 20101->20104 20102->20101 20103 b52400 20102->20103 20721 b56000 20103->20721 20105 b523e9 20104->20105 20107 b54ea5 ___strgtold12_l 9 API calls 20105->20107 20109 b523f4 20107->20109 20109->20036 20946 b653a0 20111->20946 20113 b41bb1 RtlEnterCriticalSection 20114 b41be9 RtlLeaveCriticalSection 20113->20114 20116 b41bd1 20113->20116 20947 b4e2de 20114->20947 20116->20114 20117 b41c55 RtlLeaveCriticalSection 20116->20117 20117->20036 20118 b41c22 20118->20117 20121 b50ac0 Mailbox 68 API calls 20120->20121 20122 b43c7e 20121->20122 21029 b43ca2 20122->21029 20128 b43d99 htons 20127->20128 20129 b43dcb htons 20127->20129 21056 b43bd3 20128->21056 21062 b43c16 20129->21062 20133 b43ded 20133->20036 20135 b48301 20134->20135 20138 b48322 20134->20138 21093 b495ab 20135->21093 20139 b48347 20138->20139 21096 b42ac7 20138->21096 20139->20036 20141 b50ac0 Mailbox 68 API calls 20140->20141 20144 b4d0db 20141->20144 20142 b4d1c9 20142->20036 20143 b42db5 73 API calls 20143->20144 20144->20142 20144->20143 20146 b483b3 WSASetLastError shutdown 20145->20146 20147 b483a3 20145->20147 20148 b4a4b7 69 API calls 20146->20148 20149 b50ac0 Mailbox 68 API calls 20147->20149 20150 b483d0 20148->20150 20151 b483a8 20149->20151 20150->20151 20152 b50ac0 Mailbox 68 API calls 20150->20152 20151->20036 20152->20151 20154 b433c4 InterlockedCompareExchange 20153->20154 20155 b433e1 20153->20155 20154->20155 20156 b433d6 20154->20156 20157 b429ee 76 API calls 20155->20157 21190 b432ab 20156->21190 20159 b433f1 20157->20159 20159->20036 21243 b5281e 20160->21243 20162 b52819 20162->20036 20164 b496ef __EH_prolog 20163->20164 20165 b41ba7 210 API calls 20164->20165 20166 b49744 20165->20166 20167 b49761 RtlEnterCriticalSection 20166->20167 20168 b4977c 20167->20168 20169 b4977f RtlLeaveCriticalSection 20167->20169 20168->20169 20169->20036 20171 b518d1 20170->20171 20172 b518ad 20170->20172 20171->20042 20172->20171 20173 b518c1 GetProcessHeap HeapFree 20172->20173 20173->20171 20175 b44112 20174->20175 20176 b44118 20174->20176 21249 b4a6b1 20175->21249 20176->20042 20179 b48fbb __EH_prolog 20178->20179 21251 b4373f 20179->21251 20181 b48fd5 RtlEnterCriticalSection 20183 b48fe4 RtlLeaveCriticalSection 20181->20183 20184 b4901e 20183->20184 20184->20036 20186 b52f5c _malloc 59 API calls 20185->20186 20187 b45362 SHGetSpecialFolderPathA 20186->20187 20188 b45378 20187->20188 21260 b53721 20188->21260 20192 b453dc 21276 b53a34 20192->21276 20194 b453e2 20194->20036 20196 b5222b _LocaleUpdate::_LocaleUpdate 59 API calls 20195->20196 20197 b52347 20196->20197 20198 b52355 20197->20198 20199 b5236c 20197->20199 20200 b55e0b ___strgtold12_l 59 API calls 20198->20200 20202 b52365 ___ascii_stricmp 20199->20202 20204 b5592a 66 API calls __tolower_l 20199->20204 20201 b5235a 20200->20201 20203 b54ea5 ___strgtold12_l 9 API calls 20201->20203 20202->20050 20203->20202 20204->20199 20206 b4dfb8 __EH_prolog 20205->20206 20207 b53afc _Allocate 60 API calls 20206->20207 20208 b4dfcf 20207->20208 20208->20057 20210 b4513d 20209->20210 20211 b50ae9 20209->20211 20210->20062 20212 b53354 __cinit 68 API calls 20211->20212 20212->20210 20214 b50ac0 Mailbox 68 API calls 20213->20214 20216 b4a6ed 20214->20216 20215 b4519d 20215->20070 20215->20071 20215->20072 20216->20215 20223 b42db5 20216->20223 20219 b50ac0 Mailbox 68 API calls 20218->20219 20220 b4cea1 20219->20220 20221 b4cfb0 20220->20221 20250 b42b95 20220->20250 20221->20070 20224 b42de4 20223->20224 20225 b42dca 20223->20225 20227 b42dfc 20224->20227 20228 b42def 20224->20228 20226 b50ac0 Mailbox 68 API calls 20225->20226 20231 b42dcf 20226->20231 20237 b42d39 WSASetLastError WSASend 20227->20237 20230 b50ac0 Mailbox 68 API calls 20228->20230 20230->20231 20231->20216 20232 b42e54 WSASetLastError select 20247 b4a4b7 20232->20247 20233 b50ac0 68 API calls Mailbox 20235 b42e0c 20233->20235 20235->20231 20235->20232 20235->20233 20236 b42d39 71 API calls 20235->20236 20236->20235 20238 b4a4b7 69 API calls 20237->20238 20239 b42d6e 20238->20239 20240 b42d75 20239->20240 20241 b42d82 20239->20241 20242 b50ac0 Mailbox 68 API calls 20240->20242 20243 b42d7a 20241->20243 20244 b50ac0 Mailbox 68 API calls 20241->20244 20242->20243 20245 b42d9c 20243->20245 20246 b50ac0 Mailbox 68 API calls 20243->20246 20244->20243 20245->20235 20246->20245 20248 b50ac0 Mailbox 68 API calls 20247->20248 20249 b4a4c3 WSAGetLastError 20248->20249 20249->20235 20251 b42bc7 20250->20251 20252 b42bb1 20250->20252 20255 b42bd2 20251->20255 20264 b42bdf 20251->20264 20253 b50ac0 Mailbox 68 API calls 20252->20253 20258 b42bb6 20253->20258 20254 b42be2 WSASetLastError WSARecv 20256 b4a4b7 69 API calls 20254->20256 20257 b50ac0 Mailbox 68 API calls 20255->20257 20256->20264 20257->20258 20258->20220 20259 b50ac0 68 API calls Mailbox 20259->20264 20260 b42d22 20265 b41996 20260->20265 20262 b42cbc WSASetLastError select 20263 b4a4b7 69 API calls 20262->20263 20263->20264 20264->20254 20264->20258 20264->20259 20264->20260 20264->20262 20266 b419bb 20265->20266 20267 b4199f 20265->20267 20266->20258 20268 b53354 __cinit 68 API calls 20267->20268 20268->20266 20291 b4e22e 20269->20291 20271 b4d0ae 20271->20090 20373 b53369 20272->20373 20275 b520c4 20275->20092 20276 b520ed ResumeThread 20276->20092 20277 b520e6 CloseHandle 20277->20276 20279 b50ac0 Mailbox 68 API calls 20278->20279 20280 b43fb8 20279->20280 20692 b41815 20280->20692 20283 b4a639 20284 b4a643 __EH_prolog 20283->20284 20698 b4cbf1 20284->20698 20289 b5450a __CxxThrowException@8 RaiseException 20290 b4a677 20289->20290 20292 b4e238 __EH_prolog 20291->20292 20297 b44030 20292->20297 20296 b4e266 20296->20271 20309 b653a0 20297->20309 20299 b4403a GetProcessHeap RtlAllocateHeap 20300 b4407c 20299->20300 20301 b44053 std::exception::exception 20299->20301 20300->20296 20303 b4408a 20300->20303 20310 b4a678 20301->20310 20304 b44094 __EH_prolog 20303->20304 20354 b4a297 20304->20354 20309->20299 20311 b4a682 __EH_prolog 20310->20311 20318 b4cc27 20311->20318 20316 b5450a __CxxThrowException@8 RaiseException 20317 b4a6b0 20316->20317 20324 b4d787 20318->20324 20321 b4cc41 20346 b4d7bf 20321->20346 20323 b4a69f 20323->20316 20327 b524c3 20324->20327 20330 b524f1 20327->20330 20331 b4a691 20330->20331 20332 b524ff 20330->20332 20331->20321 20336 b52587 20332->20336 20337 b52590 20336->20337 20338 b52504 20336->20338 20339 b52f24 _free 59 API calls 20337->20339 20338->20331 20340 b52549 20338->20340 20339->20338 20341 b52555 _strlen 20340->20341 20344 b5257a 20340->20344 20342 b52f5c _malloc 59 API calls 20341->20342 20343 b52567 20342->20343 20343->20344 20345 b56c6c __cftoe2_l 59 API calls 20343->20345 20344->20331 20345->20344 20347 b4d7c9 __EH_prolog 20346->20347 20350 b4b6ea 20347->20350 20349 b4d800 Mailbox 20349->20323 20351 b4b6f4 __EH_prolog 20350->20351 20352 b524c3 std::exception::exception 59 API calls 20351->20352 20353 b4b705 Mailbox 20352->20353 20353->20349 20365 b4b0ae 20354->20365 20357 b43fdc 20358 b43fe6 CreateEventA 20357->20358 20372 b653a0 20357->20372 20360 b43ffd 20358->20360 20361 b4400f 20358->20361 20362 b43fb0 Mailbox 68 API calls 20360->20362 20361->20296 20363 b44005 20362->20363 20364 b4a639 Mailbox 60 API calls 20363->20364 20364->20361 20366 b440c1 20365->20366 20367 b4b0ba 20365->20367 20366->20357 20368 b53afc _Allocate 60 API calls 20367->20368 20369 b4b0ca std::exception::exception 20367->20369 20368->20369 20369->20366 20370 b5450a __CxxThrowException@8 RaiseException 20369->20370 20371 b4fadf 20370->20371 20372->20358 20374 b53377 20373->20374 20375 b5338b 20373->20375 20377 b55e0b ___strgtold12_l 59 API calls 20374->20377 20376 b58a1c __calloc_crt 59 API calls 20375->20376 20378 b53398 20376->20378 20379 b5337c 20377->20379 20381 b533e9 20378->20381 20382 b55c0a CallCatchBlock 59 API calls 20378->20382 20380 b54ea5 ___strgtold12_l 9 API calls 20379->20380 20386 b520bb 20380->20386 20383 b52f24 _free 59 API calls 20381->20383 20384 b533a5 20382->20384 20385 b533ef 20383->20385 20387 b55c91 __initptd 59 API calls 20384->20387 20385->20386 20392 b55dea 20385->20392 20386->20275 20386->20276 20386->20277 20389 b533ae CreateThread 20387->20389 20389->20386 20391 b533e1 GetLastError 20389->20391 20400 b534c9 20389->20400 20391->20381 20397 b55dd7 20392->20397 20394 b55df3 _free 20395 b55e0b ___strgtold12_l 59 API calls 20394->20395 20396 b55e06 20395->20396 20396->20386 20398 b55c22 __getptd_noexit 59 API calls 20397->20398 20399 b55ddc 20398->20399 20399->20394 20401 b534d2 __threadstartex@4 20400->20401 20402 b5917b __freeptd TlsGetValue 20401->20402 20403 b534d8 20402->20403 20404 b534df __threadstartex@4 20403->20404 20405 b5350b 20403->20405 20407 b5919a __freeptd TlsSetValue 20404->20407 20406 b55a9f __freefls@4 59 API calls 20405->20406 20409 b53526 ___crtIsPackagedApp 20406->20409 20408 b534ee 20407->20408 20410 b534f4 GetLastError RtlExitUserThread 20408->20410 20411 b53501 GetCurrentThreadId 20408->20411 20414 b5353a 20409->20414 20416 b53471 20409->20416 20410->20411 20411->20409 20422 b53402 20414->20422 20417 b534b3 RtlDecodePointer 20416->20417 20418 b5347a LoadLibraryExW GetProcAddress 20416->20418 20421 b534c3 20417->20421 20419 b5349d RtlEncodePointer 20418->20419 20420 b5349c 20418->20420 20419->20417 20420->20414 20421->20414 20423 b5340e CallCatchBlock 20422->20423 20424 b55c0a CallCatchBlock 59 API calls 20423->20424 20425 b53413 20424->20425 20432 b52110 20425->20432 20450 b515c0 20432->20450 20435 b52160 20472 b4dd62 20435->20472 20436 b52158 TlsSetValue 20436->20435 20468 b51624 20450->20468 20451 b516a0 20452 b516b6 20451->20452 20453 b516b3 CloseHandle 20451->20453 20455 b544fb ___strgtold12_l 6 API calls 20452->20455 20453->20452 20454 b5167e ResetEvent 20456 b51685 20454->20456 20460 b516ce 20455->20460 20492 b51800 20456->20492 20457 b5174c WaitForSingleObject 20457->20468 20458 b51655 OpenEventA 20462 b51677 20458->20462 20463 b5166f 20458->20463 20459 b5163c 20459->20454 20459->20458 20488 b51bc0 20459->20488 20460->20435 20460->20436 20462->20454 20462->20456 20463->20462 20466 b51674 CloseHandle 20463->20466 20464 b51720 CreateEventA 20464->20468 20465 b51652 20465->20458 20466->20462 20467 b51bc0 GetCurrentProcessId 20467->20468 20468->20451 20468->20457 20468->20459 20468->20464 20468->20467 20470 b5173e CloseHandle 20468->20470 20470->20468 20473 b4dd84 20472->20473 20503 b44d86 20473->20503 20474 b4dd87 20476 b51ee0 20474->20476 20477 b51f19 TlsGetValue 20476->20477 20485 b51f11 Mailbox 20476->20485 20477->20485 20502 b50c20 20488->20502 20490 b51c12 GetCurrentProcessId 20491 b51c25 20490->20491 20491->20465 20493 b5180f 20492->20493 20496 b51845 CreateEventA 20493->20496 20497 b51bc0 GetCurrentProcessId 20493->20497 20498 b51867 20493->20498 20494 b51873 SetEvent 20495 b5169d 20494->20495 20495->20451 20496->20498 20499 b5185b 20496->20499 20500 b51842 20497->20500 20498->20494 20498->20495 20499->20498 20501 b51860 CloseHandle 20499->20501 20500->20496 20501->20498 20502->20490 20504 b44d90 __EH_prolog 20503->20504 20505 b50ac0 Mailbox 68 API calls 20504->20505 20506 b44da6 RtlEnterCriticalSection RtlLeaveCriticalSection 20505->20506 20507 b450d4 shared_ptr 20506->20507 20516 b44dd1 std::bad_exception::bad_exception 20506->20516 20507->20474 20509 b450a1 RtlEnterCriticalSection RtlLeaveCriticalSection 20510 b450b3 RtlEnterCriticalSection RtlLeaveCriticalSection 20509->20510 20510->20507 20510->20516 20511 b4a6d3 73 API calls 20511->20516 20513 b44e8d RtlEnterCriticalSection RtlLeaveCriticalSection 20514 b44e9f RtlEnterCriticalSection RtlLeaveCriticalSection 20513->20514 20514->20516 20515 b4ce87 73 API calls 20515->20516 20516->20509 20516->20510 20516->20511 20516->20513 20516->20514 20516->20515 20521 b518a0 2 API calls 20516->20521 20522 b44100 2 API calls 20516->20522 20523 b44bed 20516->20523 20547 b47cd2 20516->20547 20551 b4cfb9 20516->20551 20557 b47cac 20516->20557 20560 b4a960 20516->20560 20572 b4aa38 20516->20572 20521->20516 20522->20516 20524 b44bf7 __EH_prolog 20523->20524 20525 b41ba7 209 API calls 20524->20525 20548 b47cee 20547->20548 20645 b49060 20548->20645 20552 b4cfc3 __EH_prolog 20551->20552 20556 b4cfec 20552->20556 20652 b491cc 20552->20652 20666 b488a6 20557->20666 20561 b4a96a __EH_prolog 20560->20561 20562 b47cac std::bad_exception::bad_exception 60 API calls 20561->20562 20573 b4aa42 __EH_prolog 20572->20573 20681 b4d044 20573->20681 20667 b4892f 20666->20667 20668 b488bb 20666->20668 20695 b52483 20692->20695 20696 b52549 std::exception::_Copy_str 59 API calls 20695->20696 20697 b4182a 20696->20697 20697->20283 20704 b4d6b8 20698->20704 20701 b4cc0b 20713 b4d6f0 20701->20713 20703 b4a666 20703->20289 20707 b4b1dc 20704->20707 20708 b4b1e6 __EH_prolog 20707->20708 20709 b524c3 std::exception::exception 59 API calls 20708->20709 20710 b4b1f7 20709->20710 20711 b47cac std::bad_exception::bad_exception 60 API calls 20710->20711 20712 b4a658 20711->20712 20712->20701 20714 b4d6fa __EH_prolog 20713->20714 20717 b4b5d4 20714->20717 20716 b4d731 Mailbox 20716->20703 20718 b4b5de __EH_prolog 20717->20718 20719 b4b1dc std::bad_exception::bad_exception 60 API calls 20718->20719 20720 b4b5ef Mailbox 20719->20720 20720->20716 20722 b5222b _LocaleUpdate::_LocaleUpdate 59 API calls 20721->20722 20723 b56075 20722->20723 20724 b55e0b ___strgtold12_l 59 API calls 20723->20724 20725 b5607a 20724->20725 20726 b56b4b 20725->20726 20740 b5609a __output_l __aulldvrm _strlen 20725->20740 20766 b59de1 20725->20766 20727 b55e0b ___strgtold12_l 59 API calls 20726->20727 20729 b56b50 20727->20729 20731 b54ea5 ___strgtold12_l 9 API calls 20729->20731 20730 b56b25 20732 b544fb ___strgtold12_l 6 API calls 20730->20732 20731->20730 20733 b52426 20732->20733 20733->20109 20745 b55eb1 20733->20745 20735 b56b80 79 API calls __output_l 20735->20740 20736 b56703 RtlDecodePointer 20736->20740 20737 b52f24 _free 59 API calls 20737->20740 20738 b58a64 __malloc_crt 59 API calls 20738->20740 20739 b56766 RtlDecodePointer 20739->20740 20740->20726 20740->20730 20740->20735 20740->20736 20740->20737 20740->20738 20740->20739 20741 b56bf4 79 API calls _write_string 20740->20741 20742 b5678b RtlDecodePointer 20740->20742 20743 b5fa94 61 API calls __cftof 20740->20743 20744 b56bc8 79 API calls _write_multi_char 20740->20744 20773 b5dcbe 20740->20773 20741->20740 20742->20740 20743->20740 20744->20740 20746 b59de1 __filbuf 59 API calls 20745->20746 20747 b55ebf 20746->20747 20748 b55ee1 20747->20748 20749 b55eca 20747->20749 20750 b55ee6 20748->20750 20760 b55ef3 __flsbuf 20748->20760 20751 b55e0b ___strgtold12_l 59 API calls 20749->20751 20752 b55e0b ___strgtold12_l 59 API calls 20750->20752 20753 b55ecf 20751->20753 20752->20753 20753->20109 20754 b55f57 20757 b55f71 20754->20757 20759 b55f88 20754->20759 20755 b55fd1 20756 b59e05 __write 79 API calls 20755->20756 20756->20753 20788 b59e05 20757->20788 20759->20753 20816 b5f7a6 20759->20816 20760->20753 20762 b55f42 20760->20762 20765 b55f4d 20760->20765 20776 b5f752 20760->20776 20762->20765 20785 b5f915 20762->20785 20765->20754 20765->20755 20767 b59e00 20766->20767 20768 b59deb 20766->20768 20767->20740 20769 b55e0b ___strgtold12_l 59 API calls 20768->20769 20770 b59df0 20769->20770 20771 b54ea5 ___strgtold12_l 9 API calls 20770->20771 20772 b59dfb 20771->20772 20772->20740 20774 b5222b _LocaleUpdate::_LocaleUpdate 59 API calls 20773->20774 20775 b5dccf 20774->20775 20775->20740 20777 b5f75d 20776->20777 20778 b5f76a 20776->20778 20779 b55e0b ___strgtold12_l 59 API calls 20777->20779 20780 b55e0b ___strgtold12_l 59 API calls 20778->20780 20782 b5f776 20778->20782 20781 b5f762 20779->20781 20783 b5f797 20780->20783 20781->20762 20782->20762 20784 b54ea5 ___strgtold12_l 9 API calls 20783->20784 20784->20781 20786 b58a64 __malloc_crt 59 API calls 20785->20786 20787 b5f92a 20786->20787 20787->20765 20789 b59e11 CallCatchBlock 20788->20789 20790 b59e35 20789->20790 20791 b59e1e 20789->20791 20793 b59ed4 20790->20793 20794 b59e49 20790->20794 20792 b55dd7 __set_osfhnd 59 API calls 20791->20792 20796 b59e23 20792->20796 20795 b55dd7 __set_osfhnd 59 API calls 20793->20795 20797 b59e67 20794->20797 20798 b59e71 20794->20798 20799 b59e6c 20795->20799 20800 b55e0b ___strgtold12_l 59 API calls 20796->20800 20801 b55dd7 __set_osfhnd 59 API calls 20797->20801 20841 b60c37 20798->20841 20804 b55e0b ___strgtold12_l 59 API calls 20799->20804 20811 b59e2a CallCatchBlock 20800->20811 20801->20799 20803 b59e77 20805 b59e9d 20803->20805 20806 b59e8a 20803->20806 20807 b59ee0 20804->20807 20810 b55e0b ___strgtold12_l 59 API calls 20805->20810 20850 b59ef4 20806->20850 20809 b54ea5 ___strgtold12_l 9 API calls 20807->20809 20809->20811 20813 b59ea2 20810->20813 20811->20753 20812 b59e96 20909 b59ecc 20812->20909 20814 b55dd7 __set_osfhnd 59 API calls 20813->20814 20814->20812 20817 b5f7b2 CallCatchBlock 20816->20817 20818 b5f7c3 20817->20818 20819 b5f7db 20817->20819 20820 b55dd7 __set_osfhnd 59 API calls 20818->20820 20821 b5f880 20819->20821 20826 b5f810 20819->20826 20822 b5f7c8 20820->20822 20823 b55dd7 __set_osfhnd 59 API calls 20821->20823 20824 b55e0b ___strgtold12_l 59 API calls 20822->20824 20825 b5f885 20823->20825 20835 b5f7d0 CallCatchBlock 20824->20835 20827 b55e0b ___strgtold12_l 59 API calls 20825->20827 20828 b60c37 ___lock_fhandle 60 API calls 20826->20828 20829 b5f88d 20827->20829 20830 b5f816 20828->20830 20831 b54ea5 ___strgtold12_l 9 API calls 20829->20831 20832 b5f844 20830->20832 20833 b5f82c 20830->20833 20831->20835 20836 b55e0b ___strgtold12_l 59 API calls 20832->20836 20834 b5f8a2 __lseeki64_nolock 61 API calls 20833->20834 20837 b5f83b 20834->20837 20835->20753 20838 b5f849 20836->20838 20942 b5f878 20837->20942 20839 b55dd7 __set_osfhnd 59 API calls 20838->20839 20839->20837 20842 b60c43 CallCatchBlock 20841->20842 20843 b60c92 RtlEnterCriticalSection 20842->20843 20844 b5889d __lock 59 API calls 20842->20844 20845 b60cb8 CallCatchBlock 20843->20845 20846 b60c68 20844->20846 20845->20803 20847 b60c80 20846->20847 20848 b591bc __ioinit InitializeCriticalSectionAndSpinCount 20846->20848 20912 b60cbc 20847->20912 20848->20847 20851 b59f01 __write_nolock 20850->20851 20852 b59f40 20851->20852 20853 b59f5f 20851->20853 20881 b59f35 20851->20881 20855 b55dd7 __set_osfhnd 59 API calls 20852->20855 20856 b59fb7 20853->20856 20857 b59f9b 20853->20857 20854 b544fb ___strgtold12_l 6 API calls 20858 b5a755 20854->20858 20859 b59f45 20855->20859 20861 b59fd0 20856->20861 20916 b5f8a2 20856->20916 20860 b55dd7 __set_osfhnd 59 API calls 20857->20860 20858->20812 20862 b55e0b ___strgtold12_l 59 API calls 20859->20862 20864 b59fa0 20860->20864 20863 b5f752 __write_nolock 59 API calls 20861->20863 20866 b59f4c 20862->20866 20867 b59fde 20863->20867 20868 b55e0b ___strgtold12_l 59 API calls 20864->20868 20869 b54ea5 ___strgtold12_l 9 API calls 20866->20869 20870 b5a337 20867->20870 20875 b55c0a CallCatchBlock 59 API calls 20867->20875 20871 b59fa7 20868->20871 20869->20881 20872 b5a355 20870->20872 20873 b5a6ca WriteFile 20870->20873 20874 b54ea5 ___strgtold12_l 9 API calls 20871->20874 20876 b5a479 20872->20876 20884 b5a36b 20872->20884 20877 b5a32a GetLastError 20873->20877 20882 b5a2f7 20873->20882 20874->20881 20878 b5a00a GetConsoleMode 20875->20878 20889 b5a484 20876->20889 20902 b5a56e 20876->20902 20877->20882 20878->20870 20880 b5a049 20878->20880 20879 b5a703 20879->20881 20886 b55e0b ___strgtold12_l 59 API calls 20879->20886 20880->20870 20883 b5a059 GetConsoleCP 20880->20883 20881->20854 20882->20879 20882->20881 20888 b5a457 20882->20888 20883->20879 20907 b5a088 20883->20907 20884->20879 20884->20882 20885 b5a3da WriteFile 20884->20885 20885->20877 20885->20884 20887 b5a731 20886->20887 20890 b55dd7 __set_osfhnd 59 API calls 20887->20890 20891 b5a462 20888->20891 20892 b5a6fa 20888->20892 20889->20879 20889->20882 20894 b5a4e9 WriteFile 20889->20894 20890->20881 20895 b55e0b ___strgtold12_l 59 API calls 20891->20895 20896 b55dea __dosmaperr 59 API calls 20892->20896 20893 b5a5e3 WideCharToMultiByte 20893->20877 20893->20902 20894->20877 20894->20889 20897 b5a467 20895->20897 20896->20881 20899 b55dd7 __set_osfhnd 59 API calls 20897->20899 20898 b5a632 WriteFile 20901 b5a685 GetLastError 20898->20901 20898->20902 20899->20881 20901->20902 20902->20879 20902->20882 20902->20893 20902->20898 20903 b61006 WriteConsoleW CreateFileW __putwch_nolock 20903->20907 20904 b5ffba 61 API calls __write_nolock 20904->20907 20905 b5a171 WideCharToMultiByte 20905->20882 20906 b5a1ac WriteFile 20905->20906 20906->20877 20906->20907 20907->20877 20907->20882 20907->20903 20907->20904 20907->20905 20908 b5a206 WriteFile 20907->20908 20925 b5dcf8 20907->20925 20908->20877 20908->20907 20941 b60fe0 RtlLeaveCriticalSection 20909->20941 20911 b59ed2 20911->20811 20915 b58a07 RtlLeaveCriticalSection 20912->20915 20914 b60cc3 20914->20843 20915->20914 20928 b60ef4 20916->20928 20918 b5f8b2 20919 b5f8cb SetFilePointerEx 20918->20919 20920 b5f8ba 20918->20920 20921 b5f8e3 GetLastError 20919->20921 20924 b5f8bf 20919->20924 20922 b55e0b ___strgtold12_l 59 API calls 20920->20922 20923 b55dea __dosmaperr 59 API calls 20921->20923 20922->20924 20923->20924 20924->20861 20926 b5dcbe __isleadbyte_l 59 API calls 20925->20926 20927 b5dd05 20926->20927 20927->20907 20929 b60f14 20928->20929 20930 b60eff 20928->20930 20932 b55dd7 __set_osfhnd 59 API calls 20929->20932 20934 b60f39 20929->20934 20931 b55dd7 __set_osfhnd 59 API calls 20930->20931 20933 b60f04 20931->20933 20935 b60f43 20932->20935 20936 b55e0b ___strgtold12_l 59 API calls 20933->20936 20934->20918 20937 b55e0b ___strgtold12_l 59 API calls 20935->20937 20938 b60f0c 20936->20938 20939 b60f4b 20937->20939 20938->20918 20940 b54ea5 ___strgtold12_l 9 API calls 20939->20940 20940->20938 20941->20911 20945 b60fe0 RtlLeaveCriticalSection 20942->20945 20944 b5f87e 20944->20835 20945->20944 20946->20113 20948 b4e2e8 __EH_prolog 20947->20948 20949 b53afc _Allocate 60 API calls 20948->20949 20950 b4e2f1 20949->20950 20951 b41bfa RtlEnterCriticalSection 20950->20951 20953 b4e4ff 20950->20953 20951->20118 20954 b4e509 __EH_prolog 20953->20954 20957 b426db RtlEnterCriticalSection 20954->20957 20956 b4e55f 20956->20951 20958 b4277e 20957->20958 20959 b42728 CreateWaitableTimerA 20957->20959 20962 b427d5 RtlLeaveCriticalSection 20958->20962 20964 b53afc _Allocate 60 API calls 20958->20964 20960 b42738 GetLastError 20959->20960 20961 b4275b SetWaitableTimer 20959->20961 20963 b50ac0 Mailbox 68 API calls 20960->20963 20961->20958 20962->20956 20965 b42745 20963->20965 20966 b4278a 20964->20966 21001 b41712 20965->21001 20968 b53afc _Allocate 60 API calls 20966->20968 20972 b427c8 20966->20972 20970 b427a9 20968->20970 20973 b41cf8 CreateEventA 20970->20973 21007 b47db1 20972->21007 20974 b41d52 CreateEventA 20973->20974 20975 b41d23 GetLastError 20973->20975 20976 b41d96 20974->20976 20977 b41d6b GetLastError 20974->20977 20979 b41d33 20975->20979 20978 b53369 __beginthreadex 201 API calls 20976->20978 20982 b41d7b 20977->20982 20980 b41db6 20978->20980 20981 b50ac0 Mailbox 68 API calls 20979->20981 20983 b41dc6 GetLastError 20980->20983 20984 b41e0d 20980->20984 20985 b41d3c 20981->20985 20986 b50ac0 Mailbox 68 API calls 20982->20986 20991 b41dd8 20983->20991 20989 b41e11 WaitForSingleObject FindCloseChangeNotification 20984->20989 20990 b41e1d 20984->20990 20987 b41712 60 API calls 20985->20987 20988 b41d84 20986->20988 20992 b41d4e 20987->20992 20993 b41712 60 API calls 20988->20993 20989->20990 20990->20972 20994 b41ddc CloseHandle 20991->20994 20995 b41ddf 20991->20995 20992->20974 20993->20976 20994->20995 20996 b41dee 20995->20996 20997 b41de9 CloseHandle 20995->20997 20998 b50ac0 Mailbox 68 API calls 20996->20998 20997->20996 20999 b41dfb 20998->20999 21000 b41712 60 API calls 20999->21000 21000->20984 21002 b4171c __EH_prolog 21001->21002 21003 b4173e 21002->21003 21004 b41815 Mailbox 59 API calls 21002->21004 21003->20961 21005 b41732 21004->21005 21010 b4a450 21005->21010 21008 b47dcd 21007->21008 21009 b47dbe CloseHandle 21007->21009 21008->20962 21009->21008 21011 b4a45a __EH_prolog 21010->21011 21018 b4c9b5 21011->21018 21015 b4a47b 21016 b5450a __CxxThrowException@8 RaiseException 21015->21016 21017 b4a489 21016->21017 21019 b4b1dc std::bad_exception::bad_exception 60 API calls 21018->21019 21020 b4a46d 21019->21020 21021 b4c9f1 21020->21021 21022 b4c9fb __EH_prolog 21021->21022 21025 b4b18b 21022->21025 21024 b4ca2a Mailbox 21024->21015 21026 b4b195 __EH_prolog 21025->21026 21027 b4b1dc std::bad_exception::bad_exception 60 API calls 21026->21027 21028 b4b1a6 Mailbox 21027->21028 21028->21024 21040 b430ae WSASetLastError 21029->21040 21032 b43c90 21034 b416ae 21032->21034 21033 b430ae 71 API calls 21033->21032 21035 b416b8 __EH_prolog 21034->21035 21036 b41701 21035->21036 21037 b52483 std::exception::exception 59 API calls 21035->21037 21036->20036 21038 b416dc 21037->21038 21039 b4a450 60 API calls 21038->21039 21039->21036 21041 b430ec WSAStringToAddressA 21040->21041 21042 b430ce 21040->21042 21043 b4a4b7 69 API calls 21041->21043 21042->21041 21044 b430d3 21042->21044 21046 b43114 21043->21046 21045 b50ac0 Mailbox 68 API calls 21044->21045 21055 b430d8 21045->21055 21047 b43154 21046->21047 21053 b4311e _memcmp 21046->21053 21048 b43135 21047->21048 21050 b50ac0 Mailbox 68 API calls 21047->21050 21049 b43193 21048->21049 21051 b50ac0 Mailbox 68 API calls 21048->21051 21054 b50ac0 Mailbox 68 API calls 21049->21054 21049->21055 21050->21048 21051->21049 21052 b50ac0 Mailbox 68 API calls 21052->21048 21053->21048 21053->21052 21054->21055 21055->21032 21055->21033 21057 b43bdd __EH_prolog 21056->21057 21058 b43bfe htonl htonl 21057->21058 21068 b52467 21057->21068 21058->20133 21063 b43c20 __EH_prolog 21062->21063 21064 b43c41 21063->21064 21065 b52467 std::bad_exception::bad_exception 59 API calls 21063->21065 21064->20133 21066 b43c35 21065->21066 21067 b4a605 60 API calls 21066->21067 21067->21064 21069 b52483 std::exception::exception 59 API calls 21068->21069 21070 b43bf2 21069->21070 21071 b4a605 21070->21071 21072 b4a60f __EH_prolog 21071->21072 21079 b4cb28 21072->21079 21076 b4a62a 21077 b5450a __CxxThrowException@8 RaiseException 21076->21077 21078 b4a638 21077->21078 21086 b5244c 21079->21086 21082 b4cb64 21083 b4cb6e __EH_prolog 21082->21083 21089 b4b4fa 21083->21089 21085 b4cb9d Mailbox 21085->21076 21087 b524c3 std::exception::exception 59 API calls 21086->21087 21088 b4a61c 21087->21088 21088->21082 21090 b4b504 __EH_prolog 21089->21090 21091 b5244c std::bad_exception::bad_exception 59 API calls 21090->21091 21092 b4b515 Mailbox 21091->21092 21092->21085 21114 b4353e 21093->21114 21097 b42ae8 WSASetLastError connect 21096->21097 21098 b42ad8 21096->21098 21100 b4a4b7 69 API calls 21097->21100 21099 b50ac0 Mailbox 68 API calls 21098->21099 21101 b42add 21099->21101 21102 b42b07 21100->21102 21103 b50ac0 Mailbox 68 API calls 21101->21103 21102->21101 21104 b50ac0 Mailbox 68 API calls 21102->21104 21105 b42b1b 21103->21105 21104->21101 21106 b50ac0 Mailbox 68 API calls 21105->21106 21108 b42b38 21105->21108 21106->21108 21110 b42b87 21108->21110 21174 b43027 21108->21174 21110->20139 21113 b50ac0 Mailbox 68 API calls 21113->21110 21115 b43548 __EH_prolog 21114->21115 21116 b43576 21115->21116 21117 b43557 21115->21117 21136 b42edd WSASetLastError WSASocketA 21116->21136 21118 b41996 68 API calls 21117->21118 21134 b4355f 21118->21134 21121 b435ad CreateIoCompletionPort 21122 b435c5 GetLastError 21121->21122 21123 b435db 21121->21123 21125 b50ac0 Mailbox 68 API calls 21122->21125 21124 b50ac0 Mailbox 68 API calls 21123->21124 21126 b435d2 21124->21126 21125->21126 21127 b43626 21126->21127 21128 b435ef 21126->21128 21162 b4dea1 21127->21162 21129 b50ac0 Mailbox 68 API calls 21128->21129 21130 b43608 21129->21130 21144 b429ee 21130->21144 21133 b43659 21135 b50ac0 Mailbox 68 API calls 21133->21135 21134->20138 21135->21134 21137 b50ac0 Mailbox 68 API calls 21136->21137 21138 b42f0a WSAGetLastError 21137->21138 21139 b42f21 21138->21139 21140 b42f41 21138->21140 21141 b42f27 setsockopt 21139->21141 21142 b42f3c 21139->21142 21140->21121 21140->21134 21141->21142 21143 b50ac0 Mailbox 68 API calls 21142->21143 21143->21140 21145 b42a0c 21144->21145 21161 b42aad 21144->21161 21147 b42a39 WSASetLastError closesocket 21145->21147 21150 b50ac0 Mailbox 68 API calls 21145->21150 21146 b50ac0 Mailbox 68 API calls 21148 b42ab8 21146->21148 21149 b4a4b7 69 API calls 21147->21149 21148->21134 21152 b42a51 21149->21152 21151 b42a21 21150->21151 21166 b42f50 21151->21166 21154 b50ac0 Mailbox 68 API calls 21152->21154 21152->21161 21156 b42a5c 21154->21156 21157 b42a7b ioctlsocket WSASetLastError closesocket 21156->21157 21158 b50ac0 Mailbox 68 API calls 21156->21158 21160 b4a4b7 69 API calls 21157->21160 21159 b42a6e 21158->21159 21159->21157 21159->21161 21160->21161 21161->21146 21161->21148 21163 b4deab __EH_prolog 21162->21163 21164 b53afc _Allocate 60 API calls 21163->21164 21165 b4debf 21164->21165 21165->21133 21167 b42f70 WSASetLastError setsockopt 21166->21167 21168 b42f5b 21166->21168 21170 b4a4b7 69 API calls 21167->21170 21169 b50ac0 Mailbox 68 API calls 21168->21169 21173 b42a36 21169->21173 21171 b42f9e 21170->21171 21172 b50ac0 Mailbox 68 API calls 21171->21172 21171->21173 21172->21173 21173->21147 21175 b4304d WSASetLastError select 21174->21175 21176 b4303b 21174->21176 21178 b4a4b7 69 API calls 21175->21178 21177 b50ac0 Mailbox 68 API calls 21176->21177 21181 b42b59 21177->21181 21179 b43095 21178->21179 21180 b50ac0 Mailbox 68 API calls 21179->21180 21179->21181 21180->21181 21181->21110 21182 b42fb4 21181->21182 21183 b42fd5 WSASetLastError getsockopt 21182->21183 21184 b42fc0 21182->21184 21186 b4a4b7 69 API calls 21183->21186 21185 b50ac0 Mailbox 68 API calls 21184->21185 21187 b42b7a 21185->21187 21188 b4300f 21186->21188 21187->21110 21187->21113 21188->21187 21189 b50ac0 Mailbox 68 API calls 21188->21189 21189->21187 21197 b653a0 21190->21197 21192 b432b5 RtlEnterCriticalSection 21193 b50ac0 Mailbox 68 API calls 21192->21193 21194 b432d6 21193->21194 21198 b43307 21194->21198 21197->21192 21199 b43311 __EH_prolog 21198->21199 21201 b43350 21199->21201 21210 b47e30 21199->21210 21214 b4239d 21201->21214 21204 b43390 21220 b47dd9 21204->21220 21206 b50ac0 Mailbox 68 API calls 21208 b4337c 21206->21208 21209 b42d39 71 API calls 21208->21209 21209->21204 21212 b47e3e 21210->21212 21211 b47eb4 21211->21199 21212->21211 21224 b48995 21212->21224 21216 b423ab 21214->21216 21215 b42417 21215->21204 21215->21206 21216->21215 21217 b423c1 PostQueuedCompletionStatus 21216->21217 21219 b423f8 InterlockedExchange RtlLeaveCriticalSection 21216->21219 21217->21216 21218 b423da RtlEnterCriticalSection 21217->21218 21218->21216 21219->21216 21222 b47dde 21220->21222 21221 b432ee RtlLeaveCriticalSection 21221->20155 21222->21221 21240 b41e7f 21222->21240 21225 b489bf 21224->21225 21226 b47dd9 68 API calls 21225->21226 21227 b48a05 21226->21227 21228 b48a2c 21227->21228 21230 b4a222 21227->21230 21228->21211 21231 b4a23c 21230->21231 21232 b4a22c 21230->21232 21231->21228 21232->21231 21235 b4fae0 21232->21235 21236 b52483 std::exception::exception 59 API calls 21235->21236 21237 b4faf8 21236->21237 21238 b5450a __CxxThrowException@8 RaiseException 21237->21238 21239 b4fb0d 21238->21239 21241 b50ac0 Mailbox 68 API calls 21240->21241 21242 b41e90 21241->21242 21242->21222 21244 b5283b 21243->21244 21245 b55e0b ___strgtold12_l 59 API calls 21244->21245 21246 b5284b _strlen 21244->21246 21247 b52840 21245->21247 21246->20162 21248 b54ea5 ___strgtold12_l 9 API calls 21247->21248 21248->21246 21250 b4a6c0 GetProcessHeap HeapFree 21249->21250 21250->20176 21252 b43755 InterlockedCompareExchange 21251->21252 21253 b43770 21251->21253 21252->21253 21254 b43765 21252->21254 21255 b50ac0 Mailbox 68 API calls 21253->21255 21256 b432ab 78 API calls 21254->21256 21257 b43779 21255->21257 21256->21253 21258 b429ee 76 API calls 21257->21258 21259 b4378e 21258->21259 21259->20181 21289 b5365d 21260->21289 21262 b453c8 21262->20194 21263 b538b6 21262->21263 21264 b538c2 CallCatchBlock 21263->21264 21265 b538e0 21264->21265 21266 b538f8 21264->21266 21267 b538f0 CallCatchBlock 21264->21267 21269 b55e0b ___strgtold12_l 59 API calls 21265->21269 21431 b597a2 21266->21431 21267->20192 21271 b538e5 21269->21271 21273 b54ea5 ___strgtold12_l 9 API calls 21271->21273 21273->21267 21277 b53a40 CallCatchBlock 21276->21277 21278 b53a54 21277->21278 21279 b53a6c 21277->21279 21280 b55e0b ___strgtold12_l 59 API calls 21278->21280 21282 b597a2 __lock_file 60 API calls 21279->21282 21285 b53a64 CallCatchBlock 21279->21285 21281 b53a59 21280->21281 21283 b54ea5 ___strgtold12_l 9 API calls 21281->21283 21284 b53a7e 21282->21284 21283->21285 21458 b539c8 21284->21458 21285->20194 21290 b53669 CallCatchBlock 21289->21290 21291 b5367b 21290->21291 21294 b536a8 21290->21294 21292 b55e0b ___strgtold12_l 59 API calls 21291->21292 21293 b53680 21292->21293 21295 b54ea5 ___strgtold12_l 9 API calls 21293->21295 21308 b59878 21294->21308 21305 b5368b CallCatchBlock @_EH4_CallFilterFunc@8 21295->21305 21297 b536ad 21298 b536b6 21297->21298 21299 b536c3 21297->21299 21300 b55e0b ___strgtold12_l 59 API calls 21298->21300 21301 b536ec 21299->21301 21302 b536cc 21299->21302 21300->21305 21323 b59997 21301->21323 21303 b55e0b ___strgtold12_l 59 API calls 21302->21303 21303->21305 21305->21262 21309 b59884 CallCatchBlock 21308->21309 21310 b5889d __lock 59 API calls 21309->21310 21311 b59892 21310->21311 21312 b5990d 21311->21312 21318 b58925 __mtinitlocknum 59 API calls 21311->21318 21321 b59906 21311->21321 21343 b597e1 21311->21343 21348 b5984b 21311->21348 21313 b58a64 __malloc_crt 59 API calls 21312->21313 21315 b59914 21313->21315 21317 b591bc __ioinit InitializeCriticalSectionAndSpinCount 21315->21317 21315->21321 21316 b59983 CallCatchBlock 21316->21297 21320 b5993a RtlEnterCriticalSection 21317->21320 21318->21311 21320->21321 21353 b5998e 21321->21353 21332 b599b4 21323->21332 21324 b599c8 21326 b55e0b ___strgtold12_l 59 API calls 21324->21326 21325 b59b6f 21325->21324 21328 b59bcb 21325->21328 21327 b599cd 21326->21327 21329 b54ea5 ___strgtold12_l 9 API calls 21327->21329 21364 b607e0 21328->21364 21331 b536f7 21329->21331 21340 b53719 21331->21340 21332->21324 21332->21325 21358 b607fe 21332->21358 21337 b6092d __openfile 59 API calls 21338 b59b87 21337->21338 21338->21325 21339 b6092d __openfile 59 API calls 21338->21339 21339->21325 21424 b59811 21340->21424 21342 b5371f 21342->21305 21344 b59802 RtlEnterCriticalSection 21343->21344 21345 b597ec 21343->21345 21344->21311 21346 b5889d __lock 59 API calls 21345->21346 21347 b597f5 21346->21347 21347->21311 21349 b5986c RtlLeaveCriticalSection 21348->21349 21350 b59859 21348->21350 21349->21311 21356 b58a07 RtlLeaveCriticalSection 21350->21356 21352 b59869 21352->21311 21357 b58a07 RtlLeaveCriticalSection 21353->21357 21355 b59995 21355->21316 21356->21352 21357->21355 21367 b60816 21358->21367 21360 b59b35 21360->21324 21361 b6092d 21360->21361 21375 b60945 21361->21375 21363 b59b68 21363->21325 21363->21337 21382 b606c9 21364->21382 21366 b607f9 21366->21331 21368 b60824 21367->21368 21369 b6082b 21367->21369 21368->21360 21370 b5222b _LocaleUpdate::_LocaleUpdate 59 API calls 21369->21370 21371 b60838 21370->21371 21371->21368 21372 b55e0b ___strgtold12_l 59 API calls 21371->21372 21373 b6086b 21372->21373 21374 b54ea5 ___strgtold12_l 9 API calls 21373->21374 21374->21368 21376 b5222b _LocaleUpdate::_LocaleUpdate 59 API calls 21375->21376 21377 b60958 21376->21377 21378 b55e0b ___strgtold12_l 59 API calls 21377->21378 21381 b6096d 21377->21381 21379 b60999 21378->21379 21380 b54ea5 ___strgtold12_l 9 API calls 21379->21380 21380->21381 21381->21363 21385 b606d5 CallCatchBlock 21382->21385 21383 b606eb 21384 b55e0b ___strgtold12_l 59 API calls 21383->21384 21386 b606f0 21384->21386 21385->21383 21387 b60721 21385->21387 21389 b54ea5 ___strgtold12_l 9 API calls 21386->21389 21393 b60792 21387->21393 21392 b606fa CallCatchBlock 21389->21392 21392->21366 21402 b581e6 21393->21402 21395 b607a6 21396 b52f24 _free 59 API calls 21395->21396 21397 b6073d 21395->21397 21396->21397 21398 b60766 21397->21398 21399 b6076c 21398->21399 21401 b60790 21398->21401 21423 b60fe0 RtlLeaveCriticalSection 21399->21423 21401->21392 21403 b581f3 21402->21403 21404 b58209 21402->21404 21405 b55e0b ___strgtold12_l 59 API calls 21403->21405 21404->21403 21406 b58210 ___crtIsPackagedApp 21404->21406 21407 b581f8 21405->21407 21409 b58226 MultiByteToWideChar 21406->21409 21410 b58219 AreFileApisANSI 21406->21410 21408 b54ea5 ___strgtold12_l 9 API calls 21407->21408 21419 b58202 21408->21419 21412 b58251 21409->21412 21413 b58240 GetLastError 21409->21413 21410->21409 21411 b58223 21410->21411 21411->21409 21414 b58a64 __malloc_crt 59 API calls 21412->21414 21415 b55dea __dosmaperr 59 API calls 21413->21415 21416 b58259 21414->21416 21415->21419 21417 b58260 MultiByteToWideChar 21416->21417 21416->21419 21418 b58276 GetLastError 21417->21418 21417->21419 21420 b55dea __dosmaperr 59 API calls 21418->21420 21419->21395 21421 b58282 21420->21421 21422 b52f24 _free 59 API calls 21421->21422 21422->21419 21423->21401 21425 b59820 21424->21425 21426 b5983f RtlLeaveCriticalSection 21424->21426 21425->21426 21427 b59827 21425->21427 21426->21342 21430 b58a07 RtlLeaveCriticalSection 21427->21430 21429 b5983c 21429->21342 21430->21429 21432 b597d4 RtlEnterCriticalSection 21431->21432 21433 b597b2 21431->21433 21435 b538fe 21432->21435 21433->21432 21434 b597ba 21433->21434 21436 b5889d __lock 59 API calls 21434->21436 21437 b5375d 21435->21437 21436->21435 21438 b5376c 21437->21438 21443 b5378a 21437->21443 21439 b5377a 21438->21439 21438->21443 21447 b537a4 _memmove 21438->21447 21440 b55e0b ___strgtold12_l 59 API calls 21439->21440 21441 b5377f 21440->21441 21442 b54ea5 ___strgtold12_l 9 API calls 21441->21442 21442->21443 21449 b53930 21443->21449 21444 b55eb1 __flsbuf 79 API calls 21444->21447 21446 b59de1 __filbuf 59 API calls 21446->21447 21447->21443 21447->21444 21447->21446 21448 b59e05 __write 79 API calls 21447->21448 21452 b5a79f 21447->21452 21448->21447 21450 b59811 __fsopen 2 API calls 21449->21450 21451 b53936 21450->21451 21451->21267 21453 b5a7b2 21452->21453 21457 b5a7d6 21452->21457 21454 b59de1 __filbuf 59 API calls 21453->21454 21453->21457 21455 b5a7cf 21454->21455 21456 b59e05 __write 79 API calls 21455->21456 21456->21457 21457->21447 21459 b539d7 21458->21459 21460 b539eb 21458->21460 21461 b55e0b ___strgtold12_l 59 API calls 21459->21461 21462 b539e7 21460->21462 21463 b5a79f __flush 79 API calls 21460->21463 21464 b539dc 21461->21464 21474 b53aa3 21462->21474 21465 b539f7 21463->21465 21466 b54ea5 ___strgtold12_l 9 API calls 21464->21466 21477 b5b24b 21465->21477 21466->21462 21469 b59de1 __filbuf 59 API calls 21470 b53a05 21469->21470 21481 b5b0d6 21470->21481 21472 b53a0b 21472->21462 21473 b52f24 _free 59 API calls 21472->21473 21473->21462 21475 b59811 __fsopen 2 API calls 21474->21475 21476 b53aa9 21475->21476 21476->21285 21478 b539ff 21477->21478 21479 b5b258 21477->21479 21478->21469 21479->21478 21480 b52f24 _free 59 API calls 21479->21480 21480->21478 21482 b5b0e2 CallCatchBlock 21481->21482 21483 b5b106 21482->21483 21484 b5b0ef 21482->21484 21486 b5b191 21483->21486 21488 b5b116 21483->21488 21485 b55dd7 __set_osfhnd 59 API calls 21484->21485 21487 b5b0f4 21485->21487 21489 b55dd7 __set_osfhnd 59 API calls 21486->21489 21491 b55e0b ___strgtold12_l 59 API calls 21487->21491 21492 b5b134 21488->21492 21493 b5b13e 21488->21493 21490 b5b139 21489->21490 21496 b55e0b ___strgtold12_l 59 API calls 21490->21496 21503 b5b0fb CallCatchBlock 21491->21503 21494 b55dd7 __set_osfhnd 59 API calls 21492->21494 21495 b60c37 ___lock_fhandle 60 API calls 21493->21495 21494->21490 21497 b5b144 21495->21497 21498 b5b19d 21496->21498 21499 b5b157 21497->21499 21500 b5b162 21497->21500 21501 b54ea5 ___strgtold12_l 9 API calls 21498->21501 21507 b5b1b1 21499->21507 21504 b55e0b ___strgtold12_l 59 API calls 21500->21504 21501->21503 21503->21472 21505 b5b15d 21504->21505 21522 b5b189 21505->21522 21508 b60ef4 __chsize_nolock 59 API calls 21507->21508 21510 b5b1bf 21508->21510 21509 b5b215 21525 b60e6e 21509->21525 21510->21509 21512 b5b1f3 21510->21512 21514 b60ef4 __chsize_nolock 59 API calls 21510->21514 21512->21509 21515 b60ef4 __chsize_nolock 59 API calls 21512->21515 21517 b5b1ea 21514->21517 21518 b5b1ff CloseHandle 21515->21518 21516 b5b23f 21516->21505 21521 b60ef4 __chsize_nolock 59 API calls 21517->21521 21518->21509 21519 b5b20b GetLastError 21518->21519 21519->21509 21520 b55dea __dosmaperr 59 API calls 21520->21516 21521->21512 21534 b60fe0 RtlLeaveCriticalSection 21522->21534 21524 b5b18f 21524->21503 21526 b60eda 21525->21526 21527 b60e7a 21525->21527 21528 b55e0b ___strgtold12_l 59 API calls 21526->21528 21527->21526 21531 b60ea3 21527->21531 21529 b60edf 21528->21529 21530 b55dd7 __set_osfhnd 59 API calls 21529->21530 21532 b5b21d 21530->21532 21531->21532 21533 b60ec5 SetStdHandle 21531->21533 21532->21516 21532->21520 21533->21532 21534->21524 21535 40d3ab 21536 40d3c6 GetLocalTime 21535->21536 21537 40d3af 21535->21537 21540 401f27 21536->21540 21537->21536 21539 40d3d1 21541 401f3c 21540->21541 21544 401a1d 21541->21544 21543 401f45 21543->21539 21543->21543 21545 401a2c 21544->21545 21550 401a4f CreateFileA 21545->21550 21549 401a3e 21549->21543 21551 401a35 21550->21551 21553 401a7d 21550->21553 21558 401b4b LoadLibraryA 21551->21558 21552 401a98 DeviceIoControl 21552->21553 21553->21552 21554 401b3a FindCloseChangeNotification 21553->21554 21556 401b0e GetLastError 21553->21556 21567 402ce6 21553->21567 21570 402cd8 21553->21570 21554->21551 21556->21553 21556->21554 21559 401c21 21558->21559 21560 401b6e GetProcAddress 21558->21560 21559->21549 21561 401c18 FreeLibrary 21560->21561 21564 401b85 21560->21564 21561->21559 21562 401b95 GetAdaptersInfo 21562->21564 21563 402ce6 7 API calls 21563->21564 21564->21562 21564->21563 21565 401c15 21564->21565 21566 402cd8 12 API calls 21564->21566 21565->21561 21566->21564 21573 4030e1 21567->21573 21603 403041 21570->21603 21574 402cef 21573->21574 21575 4030ed 21573->21575 21574->21553 21576 4030f7 21575->21576 21577 40310d 21575->21577 21579 403139 HeapFree 21576->21579 21580 403103 21576->21580 21578 403138 21577->21578 21581 403127 21577->21581 21578->21579 21579->21574 21584 40447e 21580->21584 21590 404f0f 21581->21590 21585 4044bc 21584->21585 21589 404772 21584->21589 21586 4046b8 VirtualFree 21585->21586 21585->21589 21587 40471c 21586->21587 21588 40472b VirtualFree HeapFree 21587->21588 21587->21589 21588->21589 21589->21574 21591 404f3c 21590->21591 21593 404f52 21590->21593 21591->21593 21594 404df6 21591->21594 21593->21574 21597 404e03 21594->21597 21595 404eb3 21595->21593 21596 404e24 VirtualFree 21596->21597 21597->21595 21597->21596 21599 404da0 VirtualFree 21597->21599 21600 404dbd 21599->21600 21601 404ded 21600->21601 21602 404dcd HeapFree 21600->21602 21601->21597 21602->21597 21604 402ce3 21603->21604 21606 403048 21603->21606 21604->21553 21606->21604 21607 40306d 21606->21607 21608 403091 21607->21608 21609 40307c 21607->21609 21611 4030d0 HeapAlloc 21608->21611 21612 40308a 21608->21612 21622 404f54 21608->21622 21609->21612 21616 4047a7 21609->21616 21613 4030df 21611->21613 21612->21611 21612->21613 21614 40308f 21612->21614 21613->21606 21614->21606 21617 4047d9 21616->21617 21618 404878 21617->21618 21620 404887 21617->21620 21629 404ab0 21617->21629 21618->21620 21636 404b61 21618->21636 21620->21612 21623 404f62 21622->21623 21624 40504e VirtualAlloc 21623->21624 21625 405123 21623->21625 21628 40501f 21623->21628 21624->21628 21640 404c5c 21625->21640 21628->21612 21630 404af3 HeapAlloc 21629->21630 21631 404ac3 HeapReAlloc 21629->21631 21633 404b19 VirtualAlloc 21630->21633 21634 404b43 21630->21634 21632 404ae2 21631->21632 21631->21634 21632->21630 21633->21634 21635 404b33 HeapFree 21633->21635 21634->21618 21635->21634 21637 404b73 VirtualAlloc 21636->21637 21639 404bbc 21637->21639 21639->21620 21641 404c70 HeapAlloc 21640->21641 21642 404c69 21640->21642 21643 404c8d VirtualAlloc 21641->21643 21648 404cc5 21641->21648 21642->21643 21644 404d82 21643->21644 21645 404cad VirtualAlloc 21643->21645 21646 404d8a HeapFree 21644->21646 21644->21648 21647 404d74 VirtualFree 21645->21647 21645->21648 21646->21648 21647->21644 21648->21628 18902 402810 VirtualAlloc 18903 40d38e 18902->18903 21649 402ef0 GetVersion 21673 404034 HeapCreate 21649->21673 21651 402f4f 21652 402f54 21651->21652 21653 402f5c 21651->21653 21748 40300b 21652->21748 21685 403d14 21653->21685 21656 402f64 GetCommandLineA 21699 403be2 21656->21699 21661 402f7e 21731 4038dc 21661->21731 21663 402f83 21664 402f88 GetStartupInfoA 21663->21664 21744 403884 21664->21744 21666 402f9a GetModuleHandleA 21668 402fbe 21666->21668 21754 40362b 21668->21754 21674 404054 21673->21674 21675 40408a 21673->21675 21761 403eec 21674->21761 21675->21651 21678 404070 21681 40408d 21678->21681 21683 404c5c 5 API calls 21678->21683 21679 404063 21773 40440b HeapAlloc 21679->21773 21681->21651 21682 40406d 21682->21681 21684 40407e HeapDestroy 21682->21684 21683->21682 21684->21675 21829 40302f 21685->21829 21688 403d33 GetStartupInfoA 21691 403e44 21688->21691 21698 403d7f 21688->21698 21692 403eab SetHandleCount 21691->21692 21693 403e6b GetStdHandle 21691->21693 21692->21656 21693->21691 21695 403e79 GetFileType 21693->21695 21694 40302f 12 API calls 21694->21698 21695->21691 21696 403df0 21696->21691 21697 403e12 GetFileType 21696->21697 21697->21696 21698->21691 21698->21694 21698->21696 21700 403c30 21699->21700 21701 403bfd GetEnvironmentStringsW 21699->21701 21703 403c05 21700->21703 21704 403c21 21700->21704 21702 403c11 GetEnvironmentStrings 21701->21702 21701->21703 21702->21704 21707 402f74 21702->21707 21705 403c49 WideCharToMultiByte 21703->21705 21706 403c3d GetEnvironmentStringsW 21703->21706 21704->21707 21708 403cc3 GetEnvironmentStrings 21704->21708 21709 403ccf 21704->21709 21711 403c7d 21705->21711 21712 403caf FreeEnvironmentStringsW 21705->21712 21706->21705 21706->21707 21722 403995 21707->21722 21708->21707 21708->21709 21714 40302f 12 API calls 21709->21714 21713 40302f 12 API calls 21711->21713 21712->21707 21715 403c83 21713->21715 21720 403cea 21714->21720 21715->21712 21716 403c8c WideCharToMultiByte 21715->21716 21718 403ca6 21716->21718 21719 403c9d 21716->21719 21717 403d00 FreeEnvironmentStringsA 21717->21707 21718->21712 21721 4030e1 7 API calls 21719->21721 21720->21717 21721->21718 21723 4039a7 21722->21723 21724 4039ac GetModuleFileNameA 21722->21724 21858 4061f4 21723->21858 21726 4039cf 21724->21726 21727 40302f 12 API calls 21726->21727 21728 4039f0 21727->21728 21729 403a00 21728->21729 21730 402fe6 7 API calls 21728->21730 21729->21661 21730->21729 21732 4038e9 21731->21732 21735 4038ee 21731->21735 21733 4061f4 19 API calls 21732->21733 21733->21735 21734 40302f 12 API calls 21736 40391b 21734->21736 21735->21734 21737 402fe6 7 API calls 21736->21737 21742 40392f 21736->21742 21737->21742 21738 403972 21739 4030e1 7 API calls 21738->21739 21740 40397e 21739->21740 21740->21663 21741 40302f 12 API calls 21741->21742 21742->21738 21742->21741 21743 402fe6 7 API calls 21742->21743 21743->21742 21745 40388d 21744->21745 21747 403892 21744->21747 21746 4061f4 19 API calls 21745->21746 21746->21747 21747->21666 21749 403014 21748->21749 21750 403019 21748->21750 21752 404264 7 API calls 21749->21752 21751 40429d 7 API calls 21750->21751 21753 403022 ExitProcess 21751->21753 21752->21750 21882 40364d 21754->21882 21757 403700 21758 40370c 21757->21758 21759 403835 UnhandledExceptionFilter 21758->21759 21760 402fd8 21758->21760 21759->21760 21775 402d80 21761->21775 21764 403f15 21765 403f2f GetEnvironmentVariableA 21764->21765 21769 403f27 21764->21769 21766 40400c 21765->21766 21767 403f4e 21765->21767 21766->21769 21780 403ebf GetModuleHandleA 21766->21780 21770 403f93 GetModuleFileNameA 21767->21770 21771 403f8b 21767->21771 21769->21678 21769->21679 21770->21771 21771->21766 21777 406210 21771->21777 21774 404427 21773->21774 21774->21682 21776 402d8c GetVersionExA 21775->21776 21776->21764 21776->21765 21782 406227 21777->21782 21781 403ed6 21780->21781 21781->21769 21784 40623f 21782->21784 21787 40626f 21784->21787 21789 4053e6 21784->21789 21785 406223 21785->21766 21786 4053e6 6 API calls 21786->21787 21787->21785 21787->21786 21793 4073eb 21787->21793 21790 405404 21789->21790 21792 4053f8 21789->21792 21799 40674e 21790->21799 21792->21784 21794 407416 21793->21794 21798 4073f9 21793->21798 21795 4053e6 6 API calls 21794->21795 21796 407432 21794->21796 21795->21796 21796->21798 21811 406897 21796->21811 21798->21787 21800 40677f GetStringTypeW 21799->21800 21803 406797 21799->21803 21800->21803 21804 40679b GetStringTypeA 21800->21804 21801 4067c2 GetStringTypeA 21806 406883 21801->21806 21802 4067e6 21802->21806 21807 4067fc MultiByteToWideChar 21802->21807 21803->21801 21803->21802 21804->21803 21804->21806 21806->21792 21807->21806 21808 406820 21807->21808 21808->21806 21809 40685a MultiByteToWideChar 21808->21809 21809->21806 21810 406873 GetStringTypeW 21809->21810 21810->21806 21812 4068c7 LCMapStringW 21811->21812 21813 4068e3 21811->21813 21812->21813 21814 4068eb LCMapStringA 21812->21814 21815 406949 21813->21815 21816 40692c LCMapStringA 21813->21816 21814->21813 21817 406a25 21814->21817 21815->21817 21818 40695f MultiByteToWideChar 21815->21818 21816->21817 21817->21798 21818->21817 21819 406989 21818->21819 21819->21817 21820 4069bf MultiByteToWideChar 21819->21820 21820->21817 21821 4069d8 LCMapStringW 21820->21821 21821->21817 21822 4069f3 21821->21822 21823 4069f9 21822->21823 21825 406a39 21822->21825 21823->21817 21824 406a07 LCMapStringW 21823->21824 21824->21817 21825->21817 21826 406a71 LCMapStringW 21825->21826 21826->21817 21827 406a89 WideCharToMultiByte 21826->21827 21827->21817 21830 403041 12 API calls 21829->21830 21831 40303e 21830->21831 21831->21688 21832 402fe6 21831->21832 21833 402ff4 21832->21833 21834 402fef 21832->21834 21844 40429d 21833->21844 21838 404264 21834->21838 21839 40426e 21838->21839 21840 40429d 7 API calls 21839->21840 21843 40429b 21839->21843 21841 404285 21840->21841 21842 40429d 7 API calls 21841->21842 21842->21843 21843->21833 21847 4042b0 21844->21847 21845 402ffd 21845->21688 21846 4043c7 21849 4043da GetStdHandle WriteFile 21846->21849 21847->21845 21847->21846 21848 4042f0 21847->21848 21848->21845 21850 4042fc GetModuleFileNameA 21848->21850 21849->21845 21851 404314 21850->21851 21853 4065b8 21851->21853 21854 4065c5 LoadLibraryA 21853->21854 21856 406607 21853->21856 21855 4065d6 GetProcAddress 21854->21855 21854->21856 21855->21856 21857 4065ed GetProcAddress GetProcAddress 21855->21857 21856->21845 21857->21856 21859 4061fd 21858->21859 21861 406204 21858->21861 21862 405e30 21859->21862 21861->21724 21869 405fc9 21862->21869 21864 405fbd 21864->21861 21867 405e73 GetCPInfo 21868 405e87 21867->21868 21868->21864 21874 40606f GetCPInfo 21868->21874 21870 405fe9 21869->21870 21871 405fd9 GetOEMCP 21869->21871 21872 405e41 21870->21872 21873 405fee GetACP 21870->21873 21871->21870 21872->21864 21872->21867 21872->21868 21873->21872 21875 40615a 21874->21875 21878 406092 21874->21878 21875->21864 21876 40674e 6 API calls 21877 40610e 21876->21877 21879 406897 9 API calls 21877->21879 21878->21876 21880 406132 21879->21880 21881 406897 9 API calls 21880->21881 21881->21875 21883 403659 GetCurrentProcess TerminateProcess 21882->21883 21886 40366a 21882->21886 21883->21886 21884 402fc7 21884->21757 21885 4036d4 ExitProcess 21886->21884 21886->21885 21887 b46487 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 21965 b442c7 21887->21965 21966 bd4488 21967 be079a 21966->21967 21971 b4f955 LoadLibraryA 21967->21971 21968 be079f 21969 b4f955 64 API calls 21968->21969 21969->21968 21972 b4f97e GetProcAddress 21971->21972 21973 b4fa38 21971->21973 21974 b4fa31 FreeLibrary 21972->21974 21977 b4f992 21972->21977 21973->21968 21974->21973 21975 b4f9a4 GetAdaptersInfo 21975->21977 21976 b4fa2c 21976->21974 21977->21975 21977->21976 21978 b53afc _Allocate 60 API calls 21977->21978 21978->21977 18904 4022d9 Sleep 18905 4025bf 18904->18905 21979 b4104d 21980 b53354 __cinit 68 API calls 21979->21980 21981 b41057 21980->21981 21984 b41aa9 InterlockedIncrement 21981->21984 21985 b41ac5 WSAStartup InterlockedExchange 21984->21985 21986 b4105c 21984->21986 21985->21986 21987 40d07a 21988 40daa7 LoadLibraryExA 21987->21988

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 b472a7-b472bf InternetOpenA 1 b47385-b4738b 0->1 2 b472c5-b4733c InternetSetOptionA * 3 call b54aa0 InternetOpenUrlA 0->2 4 b473a7-b473b5 1->4 5 b4738d-b47393 1->5 15 b4737e-b4737f InternetCloseHandle 2->15 16 b4733e 2->16 6 b466f0-b466f2 4->6 7 b473bb-b473df call b54aa0 call b4439c 4->7 9 b47395-b47397 5->9 10 b47399-b473a6 call b453ec 5->10 13 b466f4-b466f9 6->13 14 b466fb-b466fd 6->14 7->6 31 b473e5-b47413 RtlEnterCriticalSection RtlLeaveCriticalSection call b522ec 7->31 9->4 10->4 21 b46704 Sleep 13->21 18 b466ff 14->18 19 b4670a-b4673e RtlEnterCriticalSection RtlLeaveCriticalSection 14->19 15->1 22 b47342-b47368 InternetReadFile 16->22 18->21 26 b46740-b4674c 19->26 27 b4678e 19->27 21->19 24 b47373-b4737a InternetCloseHandle 22->24 25 b4736a-b47371 22->25 24->15 25->22 26->27 29 b4674e-b4675b 26->29 30 b46792 27->30 32 b46763-b46764 29->32 33 b4675d-b46761 29->33 30->0 39 b47415-b47427 call b522ec 31->39 40 b47469-b47484 call b522ec 31->40 34 b46768-b4678c call b54aa0 * 2 32->34 33->34 34->30 39->40 49 b47429-b4743b call b522ec 39->49 47 b4773e-b47750 call b522ec 40->47 48 b4748a-b4748c 40->48 57 b47752-b47754 47->57 58 b47799-b477ab call b522ec 47->58 48->47 52 b47492-b47544 call b52f5c RtlEnterCriticalSection RtlLeaveCriticalSection call b54aa0 * 5 call b4439c * 2 48->52 49->40 56 b4743d-b4744f call b522ec 49->56 115 b47546-b47548 52->115 116 b47581 52->116 56->40 70 b47451-b47463 call b522ec 56->70 57->58 62 b47756-b47794 call b54aa0 RtlEnterCriticalSection RtlLeaveCriticalSection 57->62 71 b477cc-b477de call b522ec 58->71 72 b477ad-b477c7 call b461f1 call b462ff call b4640a 58->72 62->6 70->6 70->40 83 b477e4-b477e6 71->83 84 b47afc-b47b0e call b522ec 71->84 72->6 83->84 85 b477ec-b47803 call b4439c 83->85 84->6 96 b47b14-b47b42 call b52f5c call b54aa0 call b4439c 84->96 85->6 97 b47809-b478d7 call b523c8 call b41ba7 85->97 117 b47b44-b47b46 call b4534d 96->117 118 b47b4b-b47b52 call b52f24 96->118 113 b478de-b478ff RtlEnterCriticalSection 97->113 114 b478d9 call b4143f 97->114 121 b47901-b47908 113->121 122 b4790b-b4796f RtlLeaveCriticalSection call b43c67 call b43d7e call b482e9 113->122 114->113 115->116 123 b4754a-b4755c call b522ec 115->123 119 b47585-b475b3 call b52f5c call b54aa0 call b4439c 116->119 117->118 118->6 146 b475f4-b475fd call b52f24 119->146 147 b475b5-b475c4 call b53596 119->147 121->122 144 b47975-b479bd call b4a6d3 122->144 145 b47ae3-b47af7 call b48fb1 122->145 123->116 133 b4755e-b4757f call b4439c 123->133 133->119 156 b479c3-b479ca 144->156 157 b47aad-b47ade call b48398 call b433b2 144->157 145->6 158 b47734-b47737 146->158 159 b47603-b4761b call b53afc 146->159 147->146 160 b475c6 147->160 163 b479cd-b479d2 156->163 157->145 158->47 172 b47627 159->172 173 b4761d-b47625 call b496e5 159->173 161 b475cb-b475dd call b52800 160->161 175 b475e2-b475f2 call b53596 161->175 176 b475df 161->176 163->163 167 b479d4-b47a1f call b4a6d3 163->167 167->157 181 b47a25-b47a2b 167->181 174 b47629-b476e1 call b4a7fd call b43863 call b45119 call b43863 call b4aaa3 call b4abbd 172->174 173->174 202 b476e3 call b4380b 174->202 203 b476e8-b47713 Sleep call b518a0 174->203 175->146 175->161 176->175 185 b47a2e-b47a33 181->185 185->185 187 b47a35-b47a70 call b4a6d3 185->187 187->157 192 b47a72-b47aac call b4d0c5 187->192 192->157 202->203 207 b47715-b4771e call b44100 203->207 208 b4771f-b4772d 203->208 207->208 208->158 210 b4772f call b4380b 208->210 210->158
                                                                                      APIs
                                                                                      • Sleep.KERNELBASE(0000EA60), ref: 00B46704
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B4670F
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B46720
                                                                                      • _memset.LIBCMT ref: 00B46775
                                                                                      • _memset.LIBCMT ref: 00B46784
                                                                                      • InternetOpenA.WININET(?), ref: 00B472B1
                                                                                      • InternetSetOptionA.WININET(00000000,00000002,?), ref: 00B472D9
                                                                                      • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 00B472F1
                                                                                      • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 00B47309
                                                                                      • _memset.LIBCMT ref: 00B47319
                                                                                      • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 00B47332
                                                                                      • InternetReadFile.WININET(00000000,?,00001000,?), ref: 00B47354
                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00B47374
                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00B4737F
                                                                                      • _memset.LIBCMT ref: 00B473C7
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B473EA
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B473FB
                                                                                      • _malloc.LIBCMT ref: 00B47494
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B474A6
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B474B2
                                                                                      • _memset.LIBCMT ref: 00B474CC
                                                                                      • _memset.LIBCMT ref: 00B474DB
                                                                                      • _memset.LIBCMT ref: 00B474EB
                                                                                      • _memset.LIBCMT ref: 00B474FE
                                                                                      • _memset.LIBCMT ref: 00B47514
                                                                                      • _malloc.LIBCMT ref: 00B4758A
                                                                                      • _memset.LIBCMT ref: 00B4759B
                                                                                      • _strtok.LIBCMT ref: 00B475BB
                                                                                      • _swscanf.LIBCMT ref: 00B475D2
                                                                                      • _strtok.LIBCMT ref: 00B475E9
                                                                                      • _free.LIBCMT ref: 00B475F5
                                                                                      • Sleep.KERNEL32(000007D0), ref: 00B476ED
                                                                                      • _memset.LIBCMT ref: 00B47761
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B4776E
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B47780
                                                                                      • _sprintf.LIBCMT ref: 00B4781E
                                                                                      • RtlEnterCriticalSection.NTDLL(00000020), ref: 00B478E2
                                                                                      • RtlLeaveCriticalSection.NTDLL(00000020), ref: 00B47916
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _memset$CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                                      • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                                      • API String ID: 696907137-1839899575
                                                                                      • Opcode ID: a3a4b35e3a4b682c451cd2c9df1ec09b7de510df23a983f47d1a39571739500f
                                                                                      • Instruction ID: b5d4b1c6698d0a02292355d3dcc3f716ab627d10d41e22c1723650ff55318d74
                                                                                      • Opcode Fuzzy Hash: a3a4b35e3a4b682c451cd2c9df1ec09b7de510df23a983f47d1a39571739500f
                                                                                      • Instruction Fuzzy Hash: 0732013168C381ABD734AB24DC45BAFB7E4EF86310F00089DF58997292DF749A08DB52

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 473 b46487-b466ed RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call b442c7 GetTickCount call b4605a GetVersionExA call b54aa0 call b52f5c * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call b54aa0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call b52f5c * 4 QueryPerformanceCounter Sleep call b52f5c * 2 call b54aa0 * 2 518 b466f0-b466f2 473->518 519 b466f4-b466f9 518->519 520 b466fb-b466fd 518->520 523 b46704 Sleep 519->523 521 b466ff 520->521 522 b4670a-b4673e RtlEnterCriticalSection RtlLeaveCriticalSection 520->522 521->523 524 b46740-b4674c 522->524 525 b4678e 522->525 523->522 524->525 526 b4674e-b4675b 524->526 527 b46792-b472bf InternetOpenA 525->527 529 b46763-b46764 526->529 530 b4675d-b46761 526->530 531 b47385-b4738b 527->531 532 b472c5-b4733c InternetSetOptionA * 3 call b54aa0 InternetOpenUrlA 527->532 533 b46768-b4678c call b54aa0 * 2 529->533 530->533 535 b473a7-b473b5 531->535 536 b4738d-b47393 531->536 546 b4737e-b4737f InternetCloseHandle 532->546 547 b4733e 532->547 533->527 535->518 539 b473bb-b473df call b54aa0 call b4439c 535->539 541 b47395-b47397 536->541 542 b47399-b473a6 call b453ec 536->542 539->518 556 b473e5-b47413 RtlEnterCriticalSection RtlLeaveCriticalSection call b522ec 539->556 541->535 542->535 546->531 551 b47342-b47368 InternetReadFile 547->551 553 b47373-b4737a InternetCloseHandle 551->553 554 b4736a-b47371 551->554 553->546 554->551 559 b47415-b47427 call b522ec 556->559 560 b47469-b47484 call b522ec 556->560 559->560 567 b47429-b4743b call b522ec 559->567 565 b4773e-b47750 call b522ec 560->565 566 b4748a-b4748c 560->566 575 b47752-b47754 565->575 576 b47799-b477ab call b522ec 565->576 566->565 570 b47492-b47544 call b52f5c RtlEnterCriticalSection RtlLeaveCriticalSection call b54aa0 * 5 call b4439c * 2 566->570 567->560 574 b4743d-b4744f call b522ec 567->574 633 b47546-b47548 570->633 634 b47581 570->634 574->560 588 b47451-b47463 call b522ec 574->588 575->576 580 b47756-b47794 call b54aa0 RtlEnterCriticalSection RtlLeaveCriticalSection 575->580 589 b477cc-b477de call b522ec 576->589 590 b477ad-b477bb call b461f1 call b462ff 576->590 580->518 588->518 588->560 601 b477e4-b477e6 589->601 602 b47afc-b47b0e call b522ec 589->602 605 b477c0-b477c7 call b4640a 590->605 601->602 603 b477ec-b47803 call b4439c 601->603 602->518 614 b47b14-b47b42 call b52f5c call b54aa0 call b4439c 602->614 603->518 615 b47809-b478d7 call b523c8 call b41ba7 603->615 605->518 635 b47b44-b47b46 call b4534d 614->635 636 b47b4b-b47b52 call b52f24 614->636 631 b478de-b478ff RtlEnterCriticalSection 615->631 632 b478d9 call b4143f 615->632 639 b47901-b47908 631->639 640 b4790b-b4796f RtlLeaveCriticalSection call b43c67 call b43d7e call b482e9 631->640 632->631 633->634 641 b4754a-b4755c call b522ec 633->641 637 b47585-b475b3 call b52f5c call b54aa0 call b4439c 634->637 635->636 636->518 664 b475f4-b475fd call b52f24 637->664 665 b475b5-b475c4 call b53596 637->665 639->640 662 b47975-b479bd call b4a6d3 640->662 663 b47ae3-b47af7 call b48fb1 640->663 641->634 651 b4755e-b4757f call b4439c 641->651 651->637 674 b479c3-b479ca 662->674 675 b47aad-b47ade call b48398 call b433b2 662->675 663->518 676 b47734-b47737 664->676 677 b47603-b4761b call b53afc 664->677 665->664 678 b475c6 665->678 681 b479cd-b479d2 674->681 675->663 676->565 690 b47627 677->690 691 b4761d-b47625 call b496e5 677->691 679 b475cb-b475dd call b52800 678->679 693 b475e2-b475f2 call b53596 679->693 694 b475df 679->694 681->681 685 b479d4-b47a1f call b4a6d3 681->685 685->675 699 b47a25-b47a2b 685->699 692 b47629-b476cb call b4a7fd call b43863 call b45119 call b43863 call b4aaa3 call b4abbd 690->692 691->692 719 b476d0-b476e1 692->719 693->664 693->679 694->693 703 b47a2e-b47a33 699->703 703->703 705 b47a35-b47a70 call b4a6d3 703->705 705->675 710 b47a72-b47aa6 call b4d0c5 705->710 714 b47aab-b47aac 710->714 714->675 720 b476e3 call b4380b 719->720 721 b476e8-b47713 Sleep call b518a0 719->721 720->721 725 b47715-b4771e call b44100 721->725 726 b4771f-b4772d 721->726 725->726 726->676 728 b4772f call b4380b 726->728 728->676
                                                                                      APIs
                                                                                      • RtlInitializeCriticalSection.NTDLL(00B771D8), ref: 00B464B6
                                                                                      • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 00B464CD
                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B464D6
                                                                                      • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 00B464E5
                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B464E8
                                                                                      • GetTickCount.KERNEL32 ref: 00B464F4
                                                                                        • Part of subcall function 00B4605A: _malloc.LIBCMT ref: 00B46068
                                                                                      • GetVersionExA.KERNEL32(00B77030), ref: 00B46521
                                                                                      • _memset.LIBCMT ref: 00B46540
                                                                                      • _malloc.LIBCMT ref: 00B4654D
                                                                                        • Part of subcall function 00B52F5C: __FF_MSGBANNER.LIBCMT ref: 00B52F73
                                                                                        • Part of subcall function 00B52F5C: __NMSG_WRITE.LIBCMT ref: 00B52F7A
                                                                                        • Part of subcall function 00B52F5C: RtlAllocateHeap.NTDLL(00A40000,00000000,00000001), ref: 00B52F9F
                                                                                      • _malloc.LIBCMT ref: 00B4655D
                                                                                      • _malloc.LIBCMT ref: 00B46568
                                                                                      • _malloc.LIBCMT ref: 00B46573
                                                                                      • _malloc.LIBCMT ref: 00B4657E
                                                                                      • _malloc.LIBCMT ref: 00B46589
                                                                                      • _malloc.LIBCMT ref: 00B46594
                                                                                      • _malloc.LIBCMT ref: 00B465A3
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000004), ref: 00B465BA
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00B465C3
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000400), ref: 00B465D2
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00B465D5
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000400), ref: 00B465E0
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00B465E3
                                                                                      • _memset.LIBCMT ref: 00B465F6
                                                                                      • _memset.LIBCMT ref: 00B46602
                                                                                      • _memset.LIBCMT ref: 00B4660F
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B4661D
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B4662A
                                                                                      • _malloc.LIBCMT ref: 00B4664E
                                                                                      • _malloc.LIBCMT ref: 00B4665C
                                                                                      • _malloc.LIBCMT ref: 00B46663
                                                                                      • _malloc.LIBCMT ref: 00B46689
                                                                                      • QueryPerformanceCounter.KERNEL32(00000200), ref: 00B4669C
                                                                                      • Sleep.KERNELBASE ref: 00B466AA
                                                                                      • _malloc.LIBCMT ref: 00B466B6
                                                                                      • _malloc.LIBCMT ref: 00B466C3
                                                                                      • _memset.LIBCMT ref: 00B466D8
                                                                                      • _memset.LIBCMT ref: 00B466E8
                                                                                      • Sleep.KERNELBASE(0000EA60), ref: 00B46704
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B4670F
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B46720
                                                                                      • _memset.LIBCMT ref: 00B46775
                                                                                      • _memset.LIBCMT ref: 00B46784
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _malloc$_memset$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                      • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat$zGi
                                                                                      • API String ID: 2251652938-1892911702
                                                                                      • Opcode ID: 0c42990c56f3bdbe9be32ee5e138efb0d4885039e5a7dd189455f649c0508d5e
                                                                                      • Instruction ID: 29acb80add1c6bdd38f57e327cf2e4073121a731860c8fe71be0e060b6e5a754
                                                                                      • Opcode Fuzzy Hash: 0c42990c56f3bdbe9be32ee5e138efb0d4885039e5a7dd189455f649c0508d5e
                                                                                      • Instruction Fuzzy Hash: B171C872D8D340AFD3106F34AC49B5B7BE8AF46314F1008ADF949A7291DFB85845CBA6

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 832 401b4b-401b68 LoadLibraryA 833 401c21-401c25 832->833 834 401b6e-401b7f GetProcAddress 832->834 835 401b85-401b8e 834->835 836 401c18-401c1b FreeLibrary 834->836 837 401b95-401ba5 GetAdaptersInfo 835->837 836->833 838 401ba7-401bb0 837->838 839 401bdb-401be3 837->839 842 401bc1-401bd7 call 402d00 call 4018cc 838->842 843 401bb2-401bb6 838->843 840 401be5-401beb call 402ce6 839->840 841 401bec-401bf0 839->841 840->841 846 401bf2-401bf6 841->846 847 401c15-401c17 841->847 842->839 843->839 848 401bb8-401bbf 843->848 846->847 851 401bf8-401bfb 846->851 847->836 848->842 848->843 853 401c06-401c13 call 402cd8 851->853 854 401bfd-401c03 851->854 853->837 853->847 854->853
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                                                      • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                                      • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                                      • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                      • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                                      • API String ID: 514930453-3667123677
                                                                                      • Opcode ID: a3c77d1947fac9ed500e02c632cb5410261389502922d6f95d8c76429a6c9e05
                                                                                      • Instruction ID: 2fcbbae68a7f2e143e0ba6fa3878dab2488d9b05c73812711a2b91e8578584ab
                                                                                      • Opcode Fuzzy Hash: a3c77d1947fac9ed500e02c632cb5410261389502922d6f95d8c76429a6c9e05
                                                                                      • Instruction Fuzzy Hash: E521A770904109AEEF119B65CD447EF7BB8EF41344F1440BAD504B22E1E7789985CB69

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1121 b4f955-b4f978 LoadLibraryA 1122 b4f97e-b4f98c GetProcAddress 1121->1122 1123 b4fa38-b4fa3f 1121->1123 1124 b4fa31-b4fa32 FreeLibrary 1122->1124 1125 b4f992-b4f9a2 1122->1125 1124->1123 1126 b4f9a4-b4f9b0 GetAdaptersInfo 1125->1126 1127 b4f9b2 1126->1127 1128 b4f9e8-b4f9f0 1126->1128 1129 b4f9b4-b4f9bb 1127->1129 1130 b4f9f2-b4f9f8 call b53758 1128->1130 1131 b4f9f9-b4f9fe 1128->1131 1134 b4f9c5-b4f9cd 1129->1134 1135 b4f9bd-b4f9c1 1129->1135 1130->1131 1132 b4fa00-b4fa03 1131->1132 1133 b4fa2c-b4fa30 1131->1133 1132->1133 1137 b4fa05-b4fa0a 1132->1137 1133->1124 1139 b4f9d0-b4f9d5 1134->1139 1135->1129 1138 b4f9c3 1135->1138 1141 b4fa17-b4fa22 call b53afc 1137->1141 1142 b4fa0c-b4fa14 1137->1142 1138->1128 1139->1139 1143 b4f9d7-b4f9e4 call b4f6a4 1139->1143 1141->1133 1148 b4fa24-b4fa27 1141->1148 1142->1141 1143->1128 1148->1126
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00B4F96B
                                                                                      • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00B4F984
                                                                                      • GetAdaptersInfo.IPHLPAPI(?,?), ref: 00B4F9A9
                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00B4FA32
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                      • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                      • API String ID: 514930453-3114217049
                                                                                      • Opcode ID: 0600b64ecbca86a792d1c1103acf6b6ff6a31c7735bd58500c65c34d16848de8
                                                                                      • Instruction ID: 2a5a72c08d15cfc4cdd887e76b39e45ec72c3778ce51d07e5b384bf8df6a0fa1
                                                                                      • Opcode Fuzzy Hash: 0600b64ecbca86a792d1c1103acf6b6ff6a31c7735bd58500c65c34d16848de8
                                                                                      • Instruction Fuzzy Hash: E421A275E0420AABDB10CBA998846FEBBF8EF05310F1440F9E908E7251DB34CE45DBA1

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1206 b4f851-b4f87c CreateFileA 1207 b4f882-b4f897 1206->1207 1208 b4f94d-b4f954 1206->1208 1209 b4f89a-b4f8bc DeviceIoControl 1207->1209 1210 b4f8f5-b4f8fd 1209->1210 1211 b4f8be-b4f8c6 1209->1211 1214 b4f906-b4f908 1210->1214 1215 b4f8ff-b4f905 call b53758 1210->1215 1212 b4f8cf-b4f8d4 1211->1212 1213 b4f8c8-b4f8cd 1211->1213 1212->1210 1218 b4f8d6-b4f8de 1212->1218 1213->1210 1216 b4f943-b4f94c FindCloseChangeNotification 1214->1216 1217 b4f90a-b4f90d 1214->1217 1215->1214 1216->1208 1221 b4f90f-b4f918 GetLastError 1217->1221 1222 b4f929-b4f936 call b53afc 1217->1222 1223 b4f8e1-b4f8e6 1218->1223 1221->1216 1224 b4f91a-b4f91d 1221->1224 1222->1216 1230 b4f938-b4f93e 1222->1230 1223->1223 1226 b4f8e8-b4f8f4 call b4f6a4 1223->1226 1224->1222 1227 b4f91f-b4f926 1224->1227 1226->1210 1227->1222 1230->1209
                                                                                      APIs
                                                                                      • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00B4F870
                                                                                      • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 00B4F8AE
                                                                                      • GetLastError.KERNEL32 ref: 00B4F90F
                                                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00B4F946
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ChangeCloseControlCreateDeviceErrorFileFindLastNotification
                                                                                      • String ID: \\.\PhysicalDrive0
                                                                                      • API String ID: 3786717961-1180397377
                                                                                      • Opcode ID: 2f58a588217da73d52b3283c43bdf14edcdc861ee6bd5809bc4653df96a25bf9
                                                                                      • Instruction ID: c5e57bcfc635345b9023f764b80e5eeadd7a26197bd4a4a6b296991df400ffd0
                                                                                      • Opcode Fuzzy Hash: 2f58a588217da73d52b3283c43bdf14edcdc861ee6bd5809bc4653df96a25bf9
                                                                                      • Instruction Fuzzy Hash: 6C317071E0421AEBDB14CF94D884BBEBBF9EB05754F2041A9E505A7280DB745F05EBA0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1232 401a4f-401a77 CreateFileA 1233 401b45-401b4a 1232->1233 1234 401a7d-401a91 1232->1234 1235 401a98-401ac0 DeviceIoControl 1234->1235 1236 401ac2-401aca 1235->1236 1237 401af3-401afb 1235->1237 1238 401ad4-401ad9 1236->1238 1239 401acc-401ad2 1236->1239 1240 401b04-401b07 1237->1240 1241 401afd-401b03 call 402ce6 1237->1241 1238->1237 1244 401adb-401af1 call 402d00 call 4018cc 1238->1244 1239->1237 1242 401b09-401b0c 1240->1242 1243 401b3a-401b44 FindCloseChangeNotification 1240->1243 1241->1240 1247 401b27-401b34 call 402cd8 1242->1247 1248 401b0e-401b17 GetLastError 1242->1248 1243->1233 1244->1237 1247->1235 1247->1243 1248->1243 1250 401b19-401b1c 1248->1250 1250->1247 1253 401b1e-401b24 1250->1253 1253->1247
                                                                                      APIs
                                                                                      • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                                      • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                                      • GetLastError.KERNEL32 ref: 00401B0E
                                                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00401B3D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChangeCloseControlCreateDeviceErrorFileFindLastNotification
                                                                                      • String ID: \\.\PhysicalDrive0
                                                                                      • API String ID: 3786717961-1180397377
                                                                                      • Opcode ID: 87e5aa96cf8bbfa53ba141c063bc04efd036a70200bde10c5f99651d25558048
                                                                                      • Instruction ID: 04828827cee311aa1ccd055820d70034eb57b3ddca3c9d8c28a7d5788a1782d0
                                                                                      • Opcode Fuzzy Hash: 87e5aa96cf8bbfa53ba141c063bc04efd036a70200bde10c5f99651d25558048
                                                                                      • Instruction Fuzzy Hash: 43318D71D00118EADB21AFA5CD849EFBBB9FF41750F20407AE554B22A0E7785E45CB98

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 213 b46443-b4646d 214 b4649f-b464e8 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 213->214 215 b4646f-b46486 213->215 216 b464ef-b466ed GetTickCount call b4605a GetVersionExA call b54aa0 call b52f5c * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call b54aa0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call b52f5c * 4 QueryPerformanceCounter Sleep call b52f5c * 2 call b54aa0 * 2 214->216 217 b464ea call b442c7 214->217 260 b466f0-b466f2 216->260 217->216 261 b466f4-b466f9 260->261 262 b466fb-b466fd 260->262 265 b46704 Sleep 261->265 263 b466ff 262->263 264 b4670a-b4673e RtlEnterCriticalSection RtlLeaveCriticalSection 262->264 263->265 266 b46740-b4674c 264->266 267 b4678e 264->267 265->264 266->267 268 b4674e-b4675b 266->268 269 b46792-b472bf InternetOpenA 267->269 271 b46763-b46764 268->271 272 b4675d-b46761 268->272 273 b47385-b4738b 269->273 274 b472c5-b4733c InternetSetOptionA * 3 call b54aa0 InternetOpenUrlA 269->274 275 b46768-b4678c call b54aa0 * 2 271->275 272->275 277 b473a7-b473b5 273->277 278 b4738d-b47393 273->278 288 b4737e-b4737f InternetCloseHandle 274->288 289 b4733e 274->289 275->269 277->260 281 b473bb-b473df call b54aa0 call b4439c 277->281 283 b47395-b47397 278->283 284 b47399-b473a6 call b453ec 278->284 281->260 298 b473e5-b47413 RtlEnterCriticalSection RtlLeaveCriticalSection call b522ec 281->298 283->277 284->277 288->273 293 b47342-b47368 InternetReadFile 289->293 295 b47373-b4737a InternetCloseHandle 293->295 296 b4736a-b47371 293->296 295->288 296->293 301 b47415-b47427 call b522ec 298->301 302 b47469-b47484 call b522ec 298->302 301->302 309 b47429-b4743b call b522ec 301->309 307 b4773e-b47750 call b522ec 302->307 308 b4748a-b4748c 302->308 317 b47752-b47754 307->317 318 b47799-b477ab call b522ec 307->318 308->307 312 b47492-b47544 call b52f5c RtlEnterCriticalSection RtlLeaveCriticalSection call b54aa0 * 5 call b4439c * 2 308->312 309->302 316 b4743d-b4744f call b522ec 309->316 375 b47546-b47548 312->375 376 b47581 312->376 316->302 330 b47451-b47463 call b522ec 316->330 317->318 322 b47756-b47794 call b54aa0 RtlEnterCriticalSection RtlLeaveCriticalSection 317->322 331 b477cc-b477de call b522ec 318->331 332 b477ad-b477c7 call b461f1 call b462ff call b4640a 318->332 322->260 330->260 330->302 343 b477e4-b477e6 331->343 344 b47afc-b47b0e call b522ec 331->344 332->260 343->344 345 b477ec-b47803 call b4439c 343->345 344->260 356 b47b14-b47b42 call b52f5c call b54aa0 call b4439c 344->356 345->260 357 b47809-b478d7 call b523c8 call b41ba7 345->357 377 b47b44-b47b46 call b4534d 356->377 378 b47b4b-b47b52 call b52f24 356->378 373 b478de-b478ff RtlEnterCriticalSection 357->373 374 b478d9 call b4143f 357->374 381 b47901-b47908 373->381 382 b4790b-b4796f RtlLeaveCriticalSection call b43c67 call b43d7e call b482e9 373->382 374->373 375->376 383 b4754a-b4755c call b522ec 375->383 379 b47585-b475b3 call b52f5c call b54aa0 call b4439c 376->379 377->378 378->260 406 b475f4-b475fd call b52f24 379->406 407 b475b5-b475c4 call b53596 379->407 381->382 404 b47975-b479bd call b4a6d3 382->404 405 b47ae3-b47af7 call b48fb1 382->405 383->376 393 b4755e-b4757f call b4439c 383->393 393->379 416 b479c3-b479ca 404->416 417 b47aad-b47ade call b48398 call b433b2 404->417 405->260 418 b47734-b47737 406->418 419 b47603-b4761b call b53afc 406->419 407->406 420 b475c6 407->420 423 b479cd-b479d2 416->423 417->405 418->307 432 b47627 419->432 433 b4761d-b47625 call b496e5 419->433 421 b475cb-b475dd call b52800 420->421 435 b475e2-b475f2 call b53596 421->435 436 b475df 421->436 423->423 427 b479d4-b47a1f call b4a6d3 423->427 427->417 441 b47a25-b47a2b 427->441 434 b47629-b476e1 call b4a7fd call b43863 call b45119 call b43863 call b4aaa3 call b4abbd 432->434 433->434 462 b476e3 call b4380b 434->462 463 b476e8-b47713 Sleep call b518a0 434->463 435->406 435->421 436->435 445 b47a2e-b47a33 441->445 445->445 447 b47a35-b47a70 call b4a6d3 445->447 447->417 452 b47a72-b47aac call b4d0c5 447->452 452->417 462->463 467 b47715-b4771e call b44100 463->467 468 b4771f-b4772d 463->468 467->468 468->418 470 b4772f call b4380b 468->470 470->418
                                                                                      APIs
                                                                                      • RtlInitializeCriticalSection.NTDLL(00B771D8), ref: 00B464B6
                                                                                      • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 00B464CD
                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B464D6
                                                                                      • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 00B464E5
                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B464E8
                                                                                      • GetTickCount.KERNEL32 ref: 00B464F4
                                                                                      • GetVersionExA.KERNEL32(00B77030), ref: 00B46521
                                                                                      • _memset.LIBCMT ref: 00B46540
                                                                                      • _malloc.LIBCMT ref: 00B4654D
                                                                                      • _malloc.LIBCMT ref: 00B4655D
                                                                                      • _malloc.LIBCMT ref: 00B46568
                                                                                      • _malloc.LIBCMT ref: 00B46573
                                                                                      • _malloc.LIBCMT ref: 00B4657E
                                                                                      • _malloc.LIBCMT ref: 00B46589
                                                                                      • _malloc.LIBCMT ref: 00B46594
                                                                                      • _malloc.LIBCMT ref: 00B465A3
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000004), ref: 00B465BA
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00B465C3
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000400), ref: 00B465D2
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00B465D5
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000400), ref: 00B465E0
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00B465E3
                                                                                      • _memset.LIBCMT ref: 00B465F6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _malloc$Heap$AllocateProcess$AddressHandleModuleProc_memset$CountCriticalInitializeSectionTickVersion
                                                                                      • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat$zGi
                                                                                      • API String ID: 3095297975-1892911702
                                                                                      • Opcode ID: 00f8fd22287712c616db3cec4d99f3e52e111fe7b1c12eb12934597ba3bd7c9a
                                                                                      • Instruction ID: f211870dadaec9cf56bb2920304bfe8125e368099e096b3f68361f86b2a97633
                                                                                      • Opcode Fuzzy Hash: 00f8fd22287712c616db3cec4d99f3e52e111fe7b1c12eb12934597ba3bd7c9a
                                                                                      • Instruction Fuzzy Hash: E381D771A8D3409FD3106F75AC45B5B7BE4AF86314F0008AEF94997292DFB84849CBA6

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00B41D11
                                                                                      • GetLastError.KERNEL32 ref: 00B41D23
                                                                                        • Part of subcall function 00B41712: __EH_prolog.LIBCMT ref: 00B41717
                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 00B41D59
                                                                                      • GetLastError.KERNEL32 ref: 00B41D6B
                                                                                      • __beginthreadex.LIBCMT ref: 00B41DB1
                                                                                      • GetLastError.KERNEL32 ref: 00B41DC6
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B41DDD
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B41DEC
                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00B41E14
                                                                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00B41E1B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseErrorLast$CreateEventHandle$ChangeFindH_prologNotificationObjectSingleWait__beginthreadex
                                                                                      • String ID: thread$thread.entry_event$thread.exit_event
                                                                                      • API String ID: 4246062733-3017686385
                                                                                      • Opcode ID: 29ae36bb53e6bdad6db3117828aa0bb534164350db5c0af0d56373f3d828e6c6
                                                                                      • Instruction ID: f5923474fa971112001ae3332181151ab2605bb3235778e86cb58ed21bb65cd2
                                                                                      • Opcode Fuzzy Hash: 29ae36bb53e6bdad6db3117828aa0bb534164350db5c0af0d56373f3d828e6c6
                                                                                      • Instruction Fuzzy Hash: 51318B71A043019FD700EF24C848B2BBBE5FB84755F1049ADF9558B2A1DB749D89CBA2

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B44D8B
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B44DB7
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B44DC3
                                                                                        • Part of subcall function 00B44BED: __EH_prolog.LIBCMT ref: 00B44BF2
                                                                                        • Part of subcall function 00B44BED: InterlockedExchange.KERNEL32(?,00000000), ref: 00B44CF2
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B44E93
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B44E99
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B44EA0
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B44EA6
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B450A7
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B450AD
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B450B8
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B450C1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                      • String ID:
                                                                                      • API String ID: 2062355503-0
                                                                                      • Opcode ID: a844a4f10fadb17461deec65689c91ad8ff45b3d921ef0c8003526d291bf1a96
                                                                                      • Instruction ID: 5025b14d37636d88a91ec3bc92258dbdb51dc7845bcf4488927568c5f055df2c
                                                                                      • Opcode Fuzzy Hash: a844a4f10fadb17461deec65689c91ad8ff45b3d921ef0c8003526d291bf1a96
                                                                                      • Instruction Fuzzy Hash: 22B14771D4425DAFDF25DFA0C841BEDBBF4AF04304F14409AE808B6281DBB85A49DFA2

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 858 b47b9f 860 b47b44-b47b46 call b4534d 858->860 861 b47b4b-b47b52 call b52f24 858->861 860->861 865 b466f0-b466f2 861->865 866 b466f4-b466f9 865->866 867 b466fb-b466fd 865->867 870 b46704 Sleep 866->870 868 b466ff 867->868 869 b4670a-b4673e RtlEnterCriticalSection RtlLeaveCriticalSection 867->869 868->870 871 b46740-b4674c 869->871 872 b4678e 869->872 870->869 871->872 873 b4674e-b4675b 871->873 874 b46792-b472bf InternetOpenA 872->874 876 b46763-b46764 873->876 877 b4675d-b46761 873->877 878 b47385-b4738b 874->878 879 b472c5-b4733c InternetSetOptionA * 3 call b54aa0 InternetOpenUrlA 874->879 880 b46768-b4678c call b54aa0 * 2 876->880 877->880 882 b473a7-b473b5 878->882 883 b4738d-b47393 878->883 893 b4737e-b4737f InternetCloseHandle 879->893 894 b4733e 879->894 880->874 882->865 886 b473bb-b473df call b54aa0 call b4439c 882->886 888 b47395-b47397 883->888 889 b47399-b473a6 call b453ec 883->889 886->865 903 b473e5-b47413 RtlEnterCriticalSection RtlLeaveCriticalSection call b522ec 886->903 888->882 889->882 893->878 898 b47342-b47368 InternetReadFile 894->898 900 b47373-b4737a InternetCloseHandle 898->900 901 b4736a-b47371 898->901 900->893 901->898 906 b47415-b47427 call b522ec 903->906 907 b47469-b47484 call b522ec 903->907 906->907 914 b47429-b4743b call b522ec 906->914 912 b4773e-b47750 call b522ec 907->912 913 b4748a-b4748c 907->913 922 b47752-b47754 912->922 923 b47799-b477ab call b522ec 912->923 913->912 917 b47492-b47544 call b52f5c RtlEnterCriticalSection RtlLeaveCriticalSection call b54aa0 * 5 call b4439c * 2 913->917 914->907 921 b4743d-b4744f call b522ec 914->921 980 b47546-b47548 917->980 981 b47581 917->981 921->907 935 b47451-b47463 call b522ec 921->935 922->923 927 b47756-b47794 call b54aa0 RtlEnterCriticalSection RtlLeaveCriticalSection 922->927 936 b477cc-b477de call b522ec 923->936 937 b477ad-b477bb call b461f1 call b462ff 923->937 927->865 935->865 935->907 948 b477e4-b477e6 936->948 949 b47afc-b47b0e call b522ec 936->949 952 b477c0-b477c7 call b4640a 937->952 948->949 950 b477ec-b47803 call b4439c 948->950 949->865 961 b47b14-b47b42 call b52f5c call b54aa0 call b4439c 949->961 950->865 962 b47809-b478d7 call b523c8 call b41ba7 950->962 952->865 961->860 961->861 978 b478de-b478ff RtlEnterCriticalSection 962->978 979 b478d9 call b4143f 962->979 984 b47901-b47908 978->984 985 b4790b-b4796f RtlLeaveCriticalSection call b43c67 call b43d7e call b482e9 978->985 979->978 980->981 986 b4754a-b4755c call b522ec 980->986 982 b47585-b475b3 call b52f5c call b54aa0 call b4439c 981->982 1006 b475f4-b475fd call b52f24 982->1006 1007 b475b5-b475c4 call b53596 982->1007 984->985 1004 b47975-b479bd call b4a6d3 985->1004 1005 b47ae3-b47af7 call b48fb1 985->1005 986->981 993 b4755e-b4757f call b4439c 986->993 993->982 1016 b479c3-b479ca 1004->1016 1017 b47aad-b47ade call b48398 call b433b2 1004->1017 1005->865 1018 b47734-b47737 1006->1018 1019 b47603-b4761b call b53afc 1006->1019 1007->1006 1020 b475c6 1007->1020 1023 b479cd-b479d2 1016->1023 1017->1005 1018->912 1032 b47627 1019->1032 1033 b4761d-b47625 call b496e5 1019->1033 1021 b475cb-b475dd call b52800 1020->1021 1035 b475e2-b475f2 call b53596 1021->1035 1036 b475df 1021->1036 1023->1023 1027 b479d4-b47a1f call b4a6d3 1023->1027 1027->1017 1041 b47a25-b47a2b 1027->1041 1034 b47629-b476cb call b4a7fd call b43863 call b45119 call b43863 call b4aaa3 call b4abbd 1032->1034 1033->1034 1061 b476d0-b476e1 1034->1061 1035->1006 1035->1021 1036->1035 1045 b47a2e-b47a33 1041->1045 1045->1045 1047 b47a35-b47a70 call b4a6d3 1045->1047 1047->1017 1052 b47a72-b47aa6 call b4d0c5 1047->1052 1056 b47aab-b47aac 1052->1056 1056->1017 1062 b476e3 call b4380b 1061->1062 1063 b476e8-b47713 Sleep call b518a0 1061->1063 1062->1063 1067 b47715-b4771e call b44100 1063->1067 1068 b4771f-b4772d 1063->1068 1067->1068 1068->1018 1070 b4772f call b4380b 1068->1070 1070->1018
                                                                                      APIs
                                                                                      • Sleep.KERNELBASE(0000EA60), ref: 00B46704
                                                                                      • RtlEnterCriticalSection.NTDLL(00B771D8), ref: 00B4670F
                                                                                      • RtlLeaveCriticalSection.NTDLL(00B771D8), ref: 00B46720
                                                                                      • _memset.LIBCMT ref: 00B46775
                                                                                      • _memset.LIBCMT ref: 00B46784
                                                                                      • _free.LIBCMT ref: 00B47B4C
                                                                                        • Part of subcall function 00B4534D: _malloc.LIBCMT ref: 00B4535D
                                                                                        • Part of subcall function 00B4534D: SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 00B4536F
                                                                                      Strings
                                                                                      • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 00B46735
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection_memset$EnterFolderLeavePathSleepSpecial_free_malloc
                                                                                      • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                      • API String ID: 3548789407-1923541051
                                                                                      • Opcode ID: 63faa01204cd44fd439316d86050b5127c545a009451e200bf428863ac66011c
                                                                                      • Instruction ID: fe4ed3476006b73bd41763129f88a73fd3592ff006cbcf74f7864dfd0640b656
                                                                                      • Opcode Fuzzy Hash: 63faa01204cd44fd439316d86050b5127c545a009451e200bf428863ac66011c
                                                                                      • Instruction Fuzzy Hash: A411363194C3409FD711AF209C8476E7BE0EF57714F6008E9F982AB292CBA05E04E753

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1073 401f64-401f84 FindResourceA 1074 401f86-401f9d GetLastError SizeofResource 1073->1074 1075 401f9f-401fa1 1073->1075 1074->1075 1077 401fa6-401fec LoadResource LockResource GlobalAlloc call 402940 * 2 1074->1077 1076 402096-40209a 1075->1076 1082 401fee-401ff9 1077->1082 1082->1082 1083 401ffb-402003 GetTickCount 1082->1083 1084 402032-402038 1083->1084 1085 402005-402007 1083->1085 1086 402053-402083 GlobalAlloc call 401c26 1084->1086 1088 40203a-40204a 1084->1088 1085->1086 1087 402009-40200f 1085->1087 1093 402088-402093 1086->1093 1087->1086 1092 402011-402023 1087->1092 1089 40204c 1088->1089 1090 40204e-402051 1088->1090 1089->1090 1090->1086 1090->1088 1094 402025 1092->1094 1095 402027-40202a 1092->1095 1093->1076 1094->1095 1095->1092 1096 40202c-40202e 1095->1096 1096->1087 1097 402030 1096->1097 1097->1086
                                                                                      APIs
                                                                                      • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                                      • GetLastError.KERNEL32 ref: 00401F86
                                                                                      • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                                      • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                                      • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                                      • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                                                      • GetTickCount.KERNEL32 ref: 00401FFB
                                                                                      • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                                      • String ID:
                                                                                      • API String ID: 564119183-0
                                                                                      • Opcode ID: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                                                      • Instruction ID: 6227662f3afde43d5576465443d89a1ce2d87db52467ebd9ddb435d6f9af9923
                                                                                      • Opcode Fuzzy Hash: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                                                      • Instruction Fuzzy Hash: 68316E31A00255AFDB105FB49F8896F7F68EF45344F10807AFE86F7291DA748845C7A8

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1098 b426db-b42726 RtlEnterCriticalSection 1099 b4277e-b42781 1098->1099 1100 b42728-b42736 CreateWaitableTimerA 1098->1100 1103 b427d5-b427f0 RtlLeaveCriticalSection 1099->1103 1104 b42783-b42798 call b53afc 1099->1104 1101 b42738-b42756 GetLastError call b50ac0 call b41712 1100->1101 1102 b4275b-b42778 SetWaitableTimer 1100->1102 1101->1102 1102->1099 1110 b427ca 1104->1110 1111 b4279a-b427ac call b53afc 1104->1111 1112 b427cc-b427d0 call b47db1 1110->1112 1116 b427ae-b427b7 1111->1116 1117 b427b9 1111->1117 1112->1103 1118 b427bb-b427c3 call b41cf8 1116->1118 1117->1118 1120 b427c8 1118->1120 1120->1112
                                                                                      APIs
                                                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 00B42706
                                                                                      • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 00B4272B
                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B65B03), ref: 00B42738
                                                                                        • Part of subcall function 00B41712: __EH_prolog.LIBCMT ref: 00B41717
                                                                                      • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 00B42778
                                                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 00B427D9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                      • String ID: timer
                                                                                      • API String ID: 4293676635-1792073242
                                                                                      • Opcode ID: 74c673c753815f64d8c2e2370af6553aa55a37d7510201a60f834a0f93791c99
                                                                                      • Instruction ID: 81357c5f7ac6c382653718f435eb6d12fabf12f0926e508c79b5c76a085151c7
                                                                                      • Opcode Fuzzy Hash: 74c673c753815f64d8c2e2370af6553aa55a37d7510201a60f834a0f93791c99
                                                                                      • Instruction Fuzzy Hash: 4331C1B1908701AFD310DF25C985B26BBE8FB48725F004AADF85583A80DB74EE04DBA1

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1149 b42b95-b42baf 1150 b42bc7-b42bcb 1149->1150 1151 b42bb1-b42bb9 call b50ac0 1149->1151 1153 b42bcd-b42bd0 1150->1153 1154 b42bdf 1150->1154 1159 b42bbf-b42bc2 1151->1159 1153->1154 1157 b42bd2-b42bdd call b50ac0 1153->1157 1155 b42be2-b42c11 WSASetLastError WSARecv call b4a4b7 1154->1155 1162 b42c16-b42c1d 1155->1162 1157->1159 1163 b42d30 1159->1163 1164 b42c2c-b42c32 1162->1164 1165 b42c1f-b42c2a call b50ac0 1162->1165 1166 b42d32-b42d38 1163->1166 1168 b42c34-b42c39 call b50ac0 1164->1168 1169 b42c46-b42c48 1164->1169 1175 b42c3f-b42c42 1165->1175 1168->1175 1172 b42c4f-b42c60 call b50ac0 1169->1172 1173 b42c4a-b42c4d 1169->1173 1172->1166 1177 b42c66-b42c69 1172->1177 1173->1177 1175->1169 1179 b42c73-b42c76 1177->1179 1180 b42c6b-b42c6d 1177->1180 1179->1163 1182 b42c7c-b42c9a call b50ac0 call b4166f 1179->1182 1180->1179 1181 b42d22-b42d2d call b41996 1180->1181 1181->1163 1189 b42cbc-b42cfa WSASetLastError select call b4a4b7 1182->1189 1190 b42c9c-b42cba call b50ac0 call b4166f 1182->1190 1195 b42cfc-b42d06 call b50ac0 1189->1195 1196 b42d08 1189->1196 1190->1163 1190->1189 1204 b42d19-b42d1d 1195->1204 1199 b42d15-b42d17 1196->1199 1200 b42d0a-b42d12 call b50ac0 1196->1200 1199->1163 1199->1204 1200->1199 1204->1155
                                                                                      APIs
                                                                                      • WSASetLastError.WS2_32(00000000), ref: 00B42BE4
                                                                                      • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 00B42C07
                                                                                        • Part of subcall function 00B4A4B7: WSAGetLastError.WS2_32(00000000,?,?,00B42A51), ref: 00B4A4C5
                                                                                      • WSASetLastError.WS2_32 ref: 00B42CD3
                                                                                      • select.WS2_32(?,?,00000000,00000000,00000000), ref: 00B42CE7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$Recvselect
                                                                                      • String ID: 3'
                                                                                      • API String ID: 886190287-280543908
                                                                                      • Opcode ID: a50250d7544b0801b818df0835d8a8186d82348a6e6cf0fc56b997941bb0629c
                                                                                      • Instruction ID: 08f87d3359292ffcacab6f4087871933dc0565c83470b929b6f2b56dfecf8231
                                                                                      • Opcode Fuzzy Hash: a50250d7544b0801b818df0835d8a8186d82348a6e6cf0fc56b997941bb0629c
                                                                                      • Instruction Fuzzy Hash: 0241BDB09193018FD710EF64C44476BBBE8FF84315F5009AEF895C3291EBB4DA44AB92

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetVersion.KERNEL32 ref: 00402F16
                                                                                        • Part of subcall function 00404034: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F4F,00000000), ref: 00404045
                                                                                        • Part of subcall function 00404034: HeapDestroy.KERNEL32 ref: 00404084
                                                                                      • GetCommandLineA.KERNEL32 ref: 00402F64
                                                                                      • GetStartupInfoA.KERNEL32(?), ref: 00402F8F
                                                                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402FB2
                                                                                        • Part of subcall function 0040300B: ExitProcess.KERNEL32 ref: 00403028
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                      • String ID: Y
                                                                                      • API String ID: 2057626494-4136946213
                                                                                      • Opcode ID: 2a5b16c506521380fd9b5f66b06519665ea10880a1b1eb47f363de886a19e373
                                                                                      • Instruction ID: 31bd938ea51fadde60a3d0ec437c396cd65a6e637b97124abe794e54387ab133
                                                                                      • Opcode Fuzzy Hash: 2a5b16c506521380fd9b5f66b06519665ea10880a1b1eb47f363de886a19e373
                                                                                      • Instruction Fuzzy Hash: 19216DB1800615AAD714AFA6DE49A6E7FB8EB44719F10413FF505BB2D1DB385500CA58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1285 b429ee-b42a06 1286 b42ab3-b42abb call b50ac0 1285->1286 1287 b42a0c-b42a10 1285->1287 1294 b42abe-b42ac6 1286->1294 1289 b42a12-b42a15 1287->1289 1290 b42a39-b42a4c WSASetLastError closesocket call b4a4b7 1287->1290 1289->1290 1293 b42a17-b42a36 call b50ac0 call b42f50 1289->1293 1295 b42a51-b42a55 1290->1295 1293->1290 1295->1286 1298 b42a57-b42a5f call b50ac0 1295->1298 1303 b42a61-b42a67 1298->1303 1304 b42a69-b42a71 call b50ac0 1298->1304 1303->1304 1305 b42a7b-b42aad ioctlsocket WSASetLastError closesocket call b4a4b7 1303->1305 1310 b42a73-b42a79 1304->1310 1311 b42aaf-b42ab1 1304->1311 1305->1311 1310->1305 1310->1311 1311->1286 1311->1294
                                                                                      APIs
                                                                                      • WSASetLastError.WS2_32(00000000), ref: 00B42A3B
                                                                                      • closesocket.WS2_32 ref: 00B42A42
                                                                                      • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 00B42A89
                                                                                      • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 00B42A97
                                                                                      • closesocket.WS2_32 ref: 00B42A9E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLastclosesocket$ioctlsocket
                                                                                      • String ID:
                                                                                      • API String ID: 1561005644-0
                                                                                      • Opcode ID: 646a83dccd4749a29b929bcc98fec35fb0a139c60d1e7f15acf2869740f35cdf
                                                                                      • Instruction ID: a421d66e2ef23a3701ba9cbae69614fb01e4809df09b36617ddf82344dd40a5b
                                                                                      • Opcode Fuzzy Hash: 646a83dccd4749a29b929bcc98fec35fb0a139c60d1e7f15acf2869740f35cdf
                                                                                      • Instruction Fuzzy Hash: 2D212575A00305ABDB20ABB88C08B6EB7E8EF44315F1545EAFD55C3291EEB4CE44EB51
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B41BAC
                                                                                      • RtlEnterCriticalSection.NTDLL ref: 00B41BBC
                                                                                      • RtlLeaveCriticalSection.NTDLL ref: 00B41BEA
                                                                                      • RtlEnterCriticalSection.NTDLL ref: 00B41C13
                                                                                      • RtlLeaveCriticalSection.NTDLL ref: 00B41C56
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 1633115879-0
                                                                                      • Opcode ID: 44dc98d814345a0d4780afbf9721fd8329688c26ccbd17ab5ad4849b989b4757
                                                                                      • Instruction ID: 78621855228a00d2b5efa24b42d997935d0609bba6882436890a4b3325b73d33
                                                                                      • Opcode Fuzzy Hash: 44dc98d814345a0d4780afbf9721fd8329688c26ccbd17ab5ad4849b989b4757
                                                                                      • Instruction Fuzzy Hash: 5F218B75A04214AFCB14CF68C88479ABBF8FF48714F108989E8559B342DBB4EE41CBA0
                                                                                      APIs
                                                                                      • GetCommandLineW.KERNEL32(?), ref: 004028F2
                                                                                      • CommandLineToArgvW.SHELL32(00000000), ref: 004028F9
                                                                                      • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D3C6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CommandLine$ArgvLocalTime
                                                                                      • String ID: /chk
                                                                                      • API String ID: 3768950922-3837807730
                                                                                      • Opcode ID: 58e77e24c0e44735d9c25947b9bd7a71b097def894af762cde97e617ba063816
                                                                                      • Instruction ID: f8a697a6ba56cfa0421d3161c88fb5920d4a750ed1aa0ba2803a0c5cf8bd7934
                                                                                      • Opcode Fuzzy Hash: 58e77e24c0e44735d9c25947b9bd7a71b097def894af762cde97e617ba063816
                                                                                      • Instruction Fuzzy Hash: 59E06D75C08202EEC7007BE0AF098AC77B4AA08301320817FE556B51D0CB7C548AAB2F
                                                                                      APIs
                                                                                      • WSASetLastError.WS2_32(00000000), ref: 00B42EEE
                                                                                      • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 00B42EFD
                                                                                      • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 00B42F0C
                                                                                      • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 00B42F36
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$Socketsetsockopt
                                                                                      • String ID:
                                                                                      • API String ID: 2093263913-0
                                                                                      • Opcode ID: cac4c65e60711e601544ece4b3d0f2308f3559f132f27540d944449bec6c9cce
                                                                                      • Instruction ID: 2778805bfba702345969a07abab7d50730d71ef2de0508b76fd6e937d925ab4f
                                                                                      • Opcode Fuzzy Hash: cac4c65e60711e601544ece4b3d0f2308f3559f132f27540d944449bec6c9cce
                                                                                      • Instruction Fuzzy Hash: 2001B571511204BBDB209F65DC88F9ABBA8EB8A721F0085A5F9188B191DAB489008BA0
                                                                                      APIs
                                                                                        • Part of subcall function 00B42D39: WSASetLastError.WS2_32(00000000), ref: 00B42D47
                                                                                        • Part of subcall function 00B42D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 00B42D5C
                                                                                      • WSASetLastError.WS2_32(00000000), ref: 00B42E6D
                                                                                      • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 00B42E83
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$Sendselect
                                                                                      • String ID: 3'
                                                                                      • API String ID: 2958345159-280543908
                                                                                      • Opcode ID: f893f37a923daa2b0fbe9ff24c91e73c713c96dbf554d623a599838d5fc41c1e
                                                                                      • Instruction ID: 0413e535f7645353a313f0a358e7b364edc5e2d295c10f270b123c711e7a6dae
                                                                                      • Opcode Fuzzy Hash: f893f37a923daa2b0fbe9ff24c91e73c713c96dbf554d623a599838d5fc41c1e
                                                                                      • Instruction Fuzzy Hash: 3E31C2B0E112099FDF10EFA4C845BEE7BE9EF05314F4445E9FC0597281E7749A44ABA0
                                                                                      APIs
                                                                                      • WSASetLastError.WS2_32(00000000), ref: 00B42AEA
                                                                                      • connect.WS2_32(?,?,?), ref: 00B42AF5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLastconnect
                                                                                      • String ID: 3'
                                                                                      • API String ID: 374722065-280543908
                                                                                      • Opcode ID: e5f540aa8c9792cf0dc5c26aa137976627127986e4e1b0379a955e4dd4c1fd7b
                                                                                      • Instruction ID: b318ce7b8f999233fa95160c665f69d99ad91c763724ad5428750f14abee1711
                                                                                      • Opcode Fuzzy Hash: e5f540aa8c9792cf0dc5c26aa137976627127986e4e1b0379a955e4dd4c1fd7b
                                                                                      • Instruction Fuzzy Hash: 7721A470E11204ABCF10AFA8C415ABEBBF9EF44324F5485D9FC1993381DBB48B05AB91
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 3519838083-0
                                                                                      • Opcode ID: 0f4b2e5c1e9efb2d09c90cfaa38843a313baafe71ca6ae62b935dea1ee2e5f27
                                                                                      • Instruction ID: 69dbe524deaa5f79490b32d6dea68a39d3932c37985d0e5596c016e2007059a3
                                                                                      • Opcode Fuzzy Hash: 0f4b2e5c1e9efb2d09c90cfaa38843a313baafe71ca6ae62b935dea1ee2e5f27
                                                                                      • Instruction Fuzzy Hash: 52514CB1905216DFCB08DF68C441AAABBF0FF18720F15819EF8299B391D7749A10DFA1
                                                                                      APIs
                                                                                      • InterlockedIncrement.KERNEL32(?), ref: 00B436A7
                                                                                        • Part of subcall function 00B42420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 00B42432
                                                                                        • Part of subcall function 00B42420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 00B42445
                                                                                        • Part of subcall function 00B42420: RtlEnterCriticalSection.NTDLL(?), ref: 00B42454
                                                                                        • Part of subcall function 00B42420: InterlockedExchange.KERNEL32(?,00000001), ref: 00B42469
                                                                                        • Part of subcall function 00B42420: RtlLeaveCriticalSection.NTDLL(?), ref: 00B42470
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                      • String ID:
                                                                                      • API String ID: 1601054111-0
                                                                                      • Opcode ID: 83b1d17cdc21bb210cca1a4b1cddda973b8f0371331308f6ac206335290259f8
                                                                                      • Instruction ID: 5c94a6cabfef0ae6db3c501b968d8e6fbaf95ef49adad31ef8157339b06598f0
                                                                                      • Opcode Fuzzy Hash: 83b1d17cdc21bb210cca1a4b1cddda973b8f0371331308f6ac206335290259f8
                                                                                      • Instruction Fuzzy Hash: 4011C4B5104209ABDF218F14CC85FAA3BE5EF40B64F144056FA96C72D0CB74DF60AB95
                                                                                      APIs
                                                                                      • __beginthreadex.LIBCMT ref: 00B520B6
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000002,00B4A937,00000000), ref: 00B520E7
                                                                                      • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,00B4A937,00000000), ref: 00B520F5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandleResumeThread__beginthreadex
                                                                                      • String ID:
                                                                                      • API String ID: 1685284544-0
                                                                                      • Opcode ID: 4190d4cedecf1f8b634e06fe9bf557666fb42b18edbc282fd5741541fa1f6ba4
                                                                                      • Instruction ID: 76680cba8370a0564095044e2ee332122b2997bca8c7a47472ded3fd22b4202a
                                                                                      • Opcode Fuzzy Hash: 4190d4cedecf1f8b634e06fe9bf557666fb42b18edbc282fd5741541fa1f6ba4
                                                                                      • Instruction Fuzzy Hash: 77F0C8702412005BD7209F5CDC80F9173D8EF49725F14459AF944D73D1C7B1AC86CA90
                                                                                      APIs
                                                                                      • InterlockedIncrement.KERNEL32(00B7729C), ref: 00B41ABA
                                                                                      • WSAStartup.WS2_32(00000002,00000000), ref: 00B41ACB
                                                                                      • InterlockedExchange.KERNEL32(00B772A0,00000000), ref: 00B41AD7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Interlocked$ExchangeIncrementStartup
                                                                                      • String ID:
                                                                                      • API String ID: 1856147945-0
                                                                                      • Opcode ID: 0328f15bb9361777ff98533b70b1c8ab31f1d8e0df5029b3439cbf8db0f24fae
                                                                                      • Instruction ID: 6e4066079f12bf23bc53545de87f6d0032ae8a78e8e76ce29656a0d5aad8bf3b
                                                                                      • Opcode Fuzzy Hash: 0328f15bb9361777ff98533b70b1c8ab31f1d8e0df5029b3439cbf8db0f24fae
                                                                                      • Instruction Fuzzy Hash: 48D05E319DC2085BD22067B4AC0EA7877ACE706729F400292FD79C20E1EE946A1089A6
                                                                                      APIs
                                                                                      • RegSetValueExA.KERNELBASE ref: 0040D460
                                                                                      • RegCloseKey.KERNELBASE(?), ref: 0040D469
                                                                                        • Part of subcall function 004022CB: WaitForSingleObject.KERNEL32(00000000,004090A8), ref: 0040D307
                                                                                      • ExitProcess.KERNEL32 ref: 0040DA91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseExitObjectProcessSingleValueWait
                                                                                      • String ID:
                                                                                      • API String ID: 2192842637-0
                                                                                      • Opcode ID: 1b9f23a41c0e40b0f9311fce3c8bd035e8c111fac712162ec3806c88e8d3c095
                                                                                      • Instruction ID: 6b2c0eb9daf1d9ed9b036e29818b5d03816b1997dab4dfffd8741184c018fce9
                                                                                      • Opcode Fuzzy Hash: 1b9f23a41c0e40b0f9311fce3c8bd035e8c111fac712162ec3806c88e8d3c095
                                                                                      • Instruction Fuzzy Hash: EBC048B5804400ABC7402BF0AF5D91D3E68BB0830AB12587DB682B00A28E7840499F2D
                                                                                      APIs
                                                                                      • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D3C6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: LocalTime
                                                                                      • String ID: /chk
                                                                                      • API String ID: 481472006-3837807730
                                                                                      • Opcode ID: 719ccb32c6d0f1224c08b4e1637f7109be7b56e533cc931ac7d4392f13334026
                                                                                      • Instruction ID: bfeb034239b7c7118683ac587487231c4a8ae608a4ee2d3b9eda992131e4dc08
                                                                                      • Opcode Fuzzy Hash: 719ccb32c6d0f1224c08b4e1637f7109be7b56e533cc931ac7d4392f13334026
                                                                                      • Instruction Fuzzy Hash: 4CE08630C18743E9D7117BA0CD088987FB1AB51314760463FE1A2754E1D73D549AEF4E
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B44BF2
                                                                                        • Part of subcall function 00B41BA7: __EH_prolog.LIBCMT ref: 00B41BAC
                                                                                        • Part of subcall function 00B41BA7: RtlEnterCriticalSection.NTDLL ref: 00B41BBC
                                                                                        • Part of subcall function 00B41BA7: RtlLeaveCriticalSection.NTDLL ref: 00B41BEA
                                                                                        • Part of subcall function 00B41BA7: RtlEnterCriticalSection.NTDLL ref: 00B41C13
                                                                                        • Part of subcall function 00B41BA7: RtlLeaveCriticalSection.NTDLL ref: 00B41C56
                                                                                        • Part of subcall function 00B4E0A6: __EH_prolog.LIBCMT ref: 00B4E0AB
                                                                                        • Part of subcall function 00B4E0A6: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00B4E12A
                                                                                      • InterlockedExchange.KERNEL32(?,00000000), ref: 00B44CF2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                      • String ID:
                                                                                      • API String ID: 1927618982-0
                                                                                      • Opcode ID: 753151d662c19d2cbde4d0eaeabdf10dfbc9244e91e596a6f85c9926ab0d5069
                                                                                      • Instruction ID: f0cfd7ff87b0a45baec5fbf273bfa9810343fb4fddbb50f4a11f72aeaf4b01d3
                                                                                      • Opcode Fuzzy Hash: 753151d662c19d2cbde4d0eaeabdf10dfbc9244e91e596a6f85c9926ab0d5069
                                                                                      • Instruction Fuzzy Hash: 7A512771D042489FDB15DFA8C885AEEBBF4FF18310F1480AAE805AB352DB709A44DB50
                                                                                      APIs
                                                                                      • WSASetLastError.WS2_32(00000000), ref: 00B42D47
                                                                                      • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 00B42D5C
                                                                                        • Part of subcall function 00B4A4B7: WSAGetLastError.WS2_32(00000000,?,?,00B42A51), ref: 00B4A4C5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$Send
                                                                                      • String ID:
                                                                                      • API String ID: 1282938840-0
                                                                                      • Opcode ID: 2e0cc2a8b90d7fd01dfd0ddfffaf39319bdf88aaad3bb0c110ee4b36a3444cb4
                                                                                      • Instruction ID: cafb647a51f3300382b0a20864f751feecdd752fe0d2b75bfba9c76d1ba40979
                                                                                      • Opcode Fuzzy Hash: 2e0cc2a8b90d7fd01dfd0ddfffaf39319bdf88aaad3bb0c110ee4b36a3444cb4
                                                                                      • Instruction Fuzzy Hash: B401A7B5905205EFD7206F94C88486BBBFCFF45365B2005BEF85993250DF749E00ABA1
                                                                                      APIs
                                                                                      • WSASetLastError.WS2_32(00000000), ref: 00B483B5
                                                                                      • shutdown.WS2_32(?,00000002), ref: 00B483BE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLastshutdown
                                                                                      • String ID:
                                                                                      • API String ID: 1920494066-0
                                                                                      • Opcode ID: ef8c223e745f5f85b0933c6eadd5106798f23e04e60defda418fda80de318c6f
                                                                                      • Instruction ID: e16cf82ac89b71f2e0cdeb7e06654636eb599633ed4924eb0b5fa491472709bf
                                                                                      • Opcode Fuzzy Hash: ef8c223e745f5f85b0933c6eadd5106798f23e04e60defda418fda80de318c6f
                                                                                      • Instruction Fuzzy Hash: DDF0FA71604310CFC720AF28E811B5A77E4FF08720F014888FDA5933D1CBB0AC008BA1
                                                                                      APIs
                                                                                      • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F4F,00000000), ref: 00404045
                                                                                        • Part of subcall function 00403EEC: GetVersionExA.KERNEL32 ref: 00403F0B
                                                                                      • HeapDestroy.KERNEL32 ref: 00404084
                                                                                        • Part of subcall function 0040440B: HeapAlloc.KERNEL32(00000000,00000140,0040406D,000003F8), ref: 00404418
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocCreateDestroyVersion
                                                                                      • String ID:
                                                                                      • API String ID: 2507506473-0
                                                                                      • Opcode ID: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                                                      • Instruction ID: 795a75c142ce263548137c971673ec0d69254cf7c95aacf64765c85fef2462b4
                                                                                      • Opcode Fuzzy Hash: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                                                      • Instruction Fuzzy Hash: E9F065F060530199DB205F749F45B2A35989BC0765F10453FFB40F41D0EB788481990E
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4511E
                                                                                        • Part of subcall function 00B43D7E: htons.WS2_32(?), ref: 00B43DA2
                                                                                        • Part of subcall function 00B43D7E: htonl.WS2_32(00000000), ref: 00B43DB9
                                                                                        • Part of subcall function 00B43D7E: htonl.WS2_32(00000000), ref: 00B43DC0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: htonl$H_prologhtons
                                                                                      • String ID:
                                                                                      • API String ID: 4039807196-0
                                                                                      • Opcode ID: 118c025f7a56e9b6b96b8e05b4a3b6834db219742291d5ace53bc8560a441fad
                                                                                      • Instruction ID: cae347e9eecaef7a100b5900c66096742f4ae71a9f9e546d6b0ba16674602893
                                                                                      • Opcode Fuzzy Hash: 118c025f7a56e9b6b96b8e05b4a3b6834db219742291d5ace53bc8560a441fad
                                                                                      • Instruction Fuzzy Hash: 478133B1C0460E8FCF15DFA8D0809EEBBF5EB48310F1481AAE851B7241EA755B05EFA5
                                                                                      APIs
                                                                                      • FindCloseChangeNotification.KERNELBASE(?,16049F3D), ref: 00B9F814
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B7A000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b7a000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChangeCloseFindNotification
                                                                                      • String ID:
                                                                                      • API String ID: 2591292051-0
                                                                                      • Opcode ID: 3c4d18e7bfe1cd9132d015755601739588dfa2b39a92e35f03a92d99e666ccc2
                                                                                      • Instruction ID: e2fc46ae09bd88c8fa4bf0162a953cb229e88131ea1b76d04580cd822f0ac339
                                                                                      • Opcode Fuzzy Hash: 3c4d18e7bfe1cd9132d015755601739588dfa2b39a92e35f03a92d99e666ccc2
                                                                                      • Instruction Fuzzy Hash: 8B416CB250C6049FE709BF29DCD5779BBE5EB54310F16093DE6C293340EA3569448B8B
                                                                                      APIs
                                                                                      • FindCloseChangeNotification.KERNELBASE(?,16049F3D), ref: 00B9F814
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B7A000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b7a000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChangeCloseFindNotification
                                                                                      • String ID:
                                                                                      • API String ID: 2591292051-0
                                                                                      • Opcode ID: 172c2e20020e0095825ac449459bebe9d73a3d856d639e3976f14e1e61c77f24
                                                                                      • Instruction ID: d77acd300fbed5944d23cb5544c3bb5124d32685a9600c825791669f165811fe
                                                                                      • Opcode Fuzzy Hash: 172c2e20020e0095825ac449459bebe9d73a3d856d639e3976f14e1e61c77f24
                                                                                      • Instruction Fuzzy Hash: 15314CB251C6009FE70DBF28CC95679BBE5FB68310F060A3DE6D683350EA3564448B4B
                                                                                      APIs
                                                                                      • FindCloseChangeNotification.KERNELBASE(?,16049F3D), ref: 00B9F814
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B7A000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b7a000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChangeCloseFindNotification
                                                                                      • String ID:
                                                                                      • API String ID: 2591292051-0
                                                                                      • Opcode ID: 4e9b365c04a151068604c5e9ae79ebc7b4e58fc521cce118266fe5f1124640d2
                                                                                      • Instruction ID: 4a5d5da7002d03d18692e7c565facb9b377a04e2f80244d1aa7514913a6ad229
                                                                                      • Opcode Fuzzy Hash: 4e9b365c04a151068604c5e9ae79ebc7b4e58fc521cce118266fe5f1124640d2
                                                                                      • Instruction Fuzzy Hash: FB215EB251D6009FE70DBF28D89567ABBE5FB58210F06093DEAC283340EA356554C78B
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4E974
                                                                                        • Part of subcall function 00B41A01: TlsGetValue.KERNEL32 ref: 00B41A0A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prologValue
                                                                                      • String ID:
                                                                                      • API String ID: 3700342317-0
                                                                                      • Opcode ID: a42a2aa5daf7ff508375e57dbbea60b1c3189117e00fad5e24e6495471646218
                                                                                      • Instruction ID: c0ef50bb48a91f9059c9a7d84680798d0446d755d9aedd2827fd2576e9744776
                                                                                      • Opcode Fuzzy Hash: a42a2aa5daf7ff508375e57dbbea60b1c3189117e00fad5e24e6495471646218
                                                                                      • Instruction Fuzzy Hash: 95214CB2904219AFDB04DFA8D581AFEBBF8FF48310F10416AE915A7241D771EA01DBA1
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B7A000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b7a000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite
                                                                                      • String ID:
                                                                                      • API String ID: 3934441357-0
                                                                                      • Opcode ID: 9689b5320f7d83666dfa80ad1824c8e75f1bfb00e509ed712c9617442d363f13
                                                                                      • Instruction ID: 37b3d24475a9f9689ebb51c97cf571fbc4f23450f82d02ef48d2b5dcbcdc60ba
                                                                                      • Opcode Fuzzy Hash: 9689b5320f7d83666dfa80ad1824c8e75f1bfb00e509ed712c9617442d363f13
                                                                                      • Instruction Fuzzy Hash: 0611E2F3908624AFD3016A19DC40BBABBE8DF94771F17052EEBC8D3740EA71484086D6
                                                                                      APIs
                                                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00B433CC
                                                                                        • Part of subcall function 00B432AB: __EH_prolog.LIBCMT ref: 00B432B0
                                                                                        • Part of subcall function 00B432AB: RtlEnterCriticalSection.NTDLL(?), ref: 00B432C3
                                                                                        • Part of subcall function 00B432AB: RtlLeaveCriticalSection.NTDLL(?), ref: 00B432EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                                      • String ID:
                                                                                      • API String ID: 1518410164-0
                                                                                      • Opcode ID: 58e4f9616e4cee7be32dbe0c1dd83adaec1a766aa41bb9a5c30e54a806b3716b
                                                                                      • Instruction ID: 11f464ddc9682f4fb2e56ecb4441bf95920c7184d4dad3a87625398db31ad9af
                                                                                      • Opcode Fuzzy Hash: 58e4f9616e4cee7be32dbe0c1dd83adaec1a766aa41bb9a5c30e54a806b3716b
                                                                                      • Instruction Fuzzy Hash: 47018071214606AFD704DF59D886F55BBE9FF44320B14835AE828872C0EB70EE11CBA4
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B7A000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b7a000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite
                                                                                      • String ID:
                                                                                      • API String ID: 3934441357-0
                                                                                      • Opcode ID: b7d4c12825b55ba4ab277430bda144fa6d94fb2f8286ff844c1a7990ea4778bf
                                                                                      • Instruction ID: fb137dc9da0a69ed58a0749a5f52a92b3db4b44a4c3df55c06602de0e9adc1a9
                                                                                      • Opcode Fuzzy Hash: b7d4c12825b55ba4ab277430bda144fa6d94fb2f8286ff844c1a7990ea4778bf
                                                                                      • Instruction Fuzzy Hash: FC0129B250C604EFE3046F09DC8166EFBE9EFA5710F06482DEAD483310E771A8509B57
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4E504
                                                                                        • Part of subcall function 00B426DB: RtlEnterCriticalSection.NTDLL(?), ref: 00B42706
                                                                                        • Part of subcall function 00B426DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 00B4272B
                                                                                        • Part of subcall function 00B426DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B65B03), ref: 00B42738
                                                                                        • Part of subcall function 00B426DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 00B42778
                                                                                        • Part of subcall function 00B426DB: RtlLeaveCriticalSection.NTDLL(?), ref: 00B427D9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                      • String ID:
                                                                                      • API String ID: 4293676635-0
                                                                                      • Opcode ID: 030972c7619218f8a109bd016ca18b35d3be15fb63b21aaeeb001e3c7f1ca299
                                                                                      • Instruction ID: 0115422a1b926eb4ad9071c279c26959fe31ab2b292b3799925b5c06bed2c320
                                                                                      • Opcode Fuzzy Hash: 030972c7619218f8a109bd016ca18b35d3be15fb63b21aaeeb001e3c7f1ca299
                                                                                      • Instruction Fuzzy Hash: 600190B1911B049FC718DF1AC544955FBF4EF88310B15C5AE94498B721E7B59A40DF90
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 028445289e1d17ca44fd6ddc857260208a147ec373c43258bce9f01103d35b43
                                                                                      • Instruction ID: 35407e72e644422b4f690bcc2f847b3216d51792f8b5999b125aecd84f82dc6f
                                                                                      • Opcode Fuzzy Hash: 028445289e1d17ca44fd6ddc857260208a147ec373c43258bce9f01103d35b43
                                                                                      • Instruction Fuzzy Hash: 9FE0C260659403AEE98229D04EA497B3F4CD94138C3704536E2F3B21D3C727CD0B61EE
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4E2E3
                                                                                        • Part of subcall function 00B53AFC: _malloc.LIBCMT ref: 00B53B14
                                                                                        • Part of subcall function 00B4E4FF: __EH_prolog.LIBCMT ref: 00B4E504
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog$_malloc
                                                                                      • String ID:
                                                                                      • API String ID: 4254904621-0
                                                                                      • Opcode ID: 874668bf94d4f9474ffa9a2972aaa5c9bea5f09f795cd3ad4fb6099ac6277073
                                                                                      • Instruction ID: d5a38d82d35902163584b81d8b8a4dba61c93c0b530bf2a14fa58151bede18ad
                                                                                      • Opcode Fuzzy Hash: 874668bf94d4f9474ffa9a2972aaa5c9bea5f09f795cd3ad4fb6099ac6277073
                                                                                      • Instruction Fuzzy Hash: 18E0C2B1A10249AFDF0DEF6CD80272D77E1EB04700F0041EDB809D6340DF749A009614
                                                                                      APIs
                                                                                        • Part of subcall function 00B55C0A: __getptd_noexit.LIBCMT ref: 00B55C0B
                                                                                        • Part of subcall function 00B55C0A: __amsg_exit.LIBCMT ref: 00B55C18
                                                                                        • Part of subcall function 00B53443: __getptd_noexit.LIBCMT ref: 00B53447
                                                                                        • Part of subcall function 00B53443: __freeptd.LIBCMT ref: 00B53461
                                                                                        • Part of subcall function 00B53443: RtlExitUserThread.NTDLL(?,00000000,?,00B53423,00000000), ref: 00B5346A
                                                                                      • __XcptFilter.LIBCMT ref: 00B5342F
                                                                                        • Part of subcall function 00B58D44: __getptd_noexit.LIBCMT ref: 00B58D48
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                      • String ID:
                                                                                      • API String ID: 1405322794-0
                                                                                      • Opcode ID: dda7035828d14a3b37c8cbeced5cb5602e7387e8b319936f60d4513efea73752
                                                                                      • Instruction ID: bb1dde10f84e25c31f6e637c39db9064d70cdcdf5b61f35cb18149d47cf54b14
                                                                                      • Opcode Fuzzy Hash: dda7035828d14a3b37c8cbeced5cb5602e7387e8b319936f60d4513efea73752
                                                                                      • Instruction Fuzzy Hash: BEE0ECB59056009FDB08BBA4D916F2D77F5EF04712F2104D8F501AB3B2DA7599449A21
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B7A000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b7a000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: 35cde6cefd71537a398ef40ed17dd88cd3098b09672855020db01a80ee65f499
                                                                                      • Instruction ID: f9a9bfe7306d5a5b5087896d0752156a416a27041cb34c81b40bf7b6dceb8956
                                                                                      • Opcode Fuzzy Hash: 35cde6cefd71537a398ef40ed17dd88cd3098b09672855020db01a80ee65f499
                                                                                      • Instruction Fuzzy Hash: 28D017F285C208EBD3123A45EC8176BB6A0AB15340F1A0968D79202250FA26AA249AD7
                                                                                      APIs
                                                                                      • LoadLibraryExA.KERNELBASE(?,00000000), ref: 0040DAAA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad
                                                                                      • String ID:
                                                                                      • API String ID: 1029625771-0
                                                                                      • Opcode ID: cb0e7b76a640d08c499b35eeede7cfcdb4648d5495989a2d1e2ae0225391a306
                                                                                      • Instruction ID: c516dca2397b2fac07020e058ced903cfa4834765396f8b763ac0801263e45c8
                                                                                      • Opcode Fuzzy Hash: cb0e7b76a640d08c499b35eeede7cfcdb4648d5495989a2d1e2ae0225391a306
                                                                                      • Instruction Fuzzy Hash: 29C01234614115DFD7005F74CD447653B70FF05740F000626A442A5190DB7484065A15
                                                                                      APIs
                                                                                      • RegCreateKeyExA.KERNELBASE(80000002), ref: 0040D82C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Create
                                                                                      • String ID:
                                                                                      • API String ID: 2289755597-0
                                                                                      • Opcode ID: eaf145f444873a6bff26022e61706261e4d44663e084ce3b01c6962bc98f21b3
                                                                                      • Instruction ID: 5ec97b2eb3e3170ad95daf285be8c754b41faf33349fba5b10927a7075397fb8
                                                                                      • Opcode Fuzzy Hash: eaf145f444873a6bff26022e61706261e4d44663e084ce3b01c6962bc98f21b3
                                                                                      • Instruction Fuzzy Hash: 58C08C20A08218D8D7D01AE52E0C7AE2A06AB043B4F30032AA633730C0CB348082A6BE
                                                                                      APIs
                                                                                        • Part of subcall function 00B515C0: OpenEventA.KERNEL32(00100002,00000000,00000000,8D94DE02), ref: 00B51660
                                                                                        • Part of subcall function 00B515C0: CloseHandle.KERNEL32(00000000), ref: 00B51675
                                                                                        • Part of subcall function 00B515C0: ResetEvent.KERNEL32(00000000,8D94DE02), ref: 00B5167F
                                                                                        • Part of subcall function 00B515C0: CloseHandle.KERNEL32(00000000,8D94DE02), ref: 00B516B4
                                                                                      • TlsSetValue.KERNEL32(00000026,?), ref: 00B5215A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseEventHandle$OpenResetValue
                                                                                      • String ID:
                                                                                      • API String ID: 1556185888-0
                                                                                      • Opcode ID: 65be1f49ed838a500f760dd9df2a24c85b81679fdebb26fb27b8d719fd5492e0
                                                                                      • Instruction ID: 64b23c0055a54850c78baa3d2f42ddb3a93fea947157ee954feaa56d971d31f6
                                                                                      • Opcode Fuzzy Hash: 65be1f49ed838a500f760dd9df2a24c85b81679fdebb26fb27b8d719fd5492e0
                                                                                      • Instruction Fuzzy Hash: B401A271A04604AFC710CFA8DC45B5ABBE8FB09771F104BAAF825D37D0DB7569048BA0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: 57a0741227dd9a16cd461ae8e65421ddc13f5886cd6de5791e0686322d83ea60
                                                                                      • Instruction ID: 646227f3fef1f343ab71bcb68da16975c72f4075c55f098b44a112a7cca5064b
                                                                                      • Opcode Fuzzy Hash: 57a0741227dd9a16cd461ae8e65421ddc13f5886cd6de5791e0686322d83ea60
                                                                                      • Instruction Fuzzy Hash: FCE08C31800701EBC7014BA0CA8A6AABBB0BB00314F00803AE809725C0C3BC91AACBDA
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Sleep
                                                                                      • String ID:
                                                                                      • API String ID: 3472027048-0
                                                                                      • Opcode ID: b4fe005c8e16b858d01d95fa0fd3f8ef258010f6ac9604675fd7048b94773a9b
                                                                                      • Instruction ID: e72a41b6dfdddac10ecd88bf8a051ea5708ec34d9fa41edd5dfe4d5b4977cec8
                                                                                      • Opcode Fuzzy Hash: b4fe005c8e16b858d01d95fa0fd3f8ef258010f6ac9604675fd7048b94773a9b
                                                                                      • Instruction Fuzzy Hash: D7C08C7880D800F2D20113502F0DBB83224A706308F30403BF806300D14AFE012BA98F
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Sleep
                                                                                      • String ID:
                                                                                      • API String ID: 3472027048-0
                                                                                      • Opcode ID: e68fd7fce66a6d94e974ea7a7509de7a7ac7b8a460bc7d90a9001f94097f8646
                                                                                      • Instruction ID: 5f572b3b01697d3602dd085a38fc554daa16ccd5b5a82f5d4f3345458a6bfba9
                                                                                      • Opcode Fuzzy Hash: e68fd7fce66a6d94e974ea7a7509de7a7ac7b8a460bc7d90a9001f94097f8646
                                                                                      • Instruction Fuzzy Hash: A1B01130888800EAC2000BA0AE08B303E30B30030AF20003AAA0A300E08A3A088EAA0F
                                                                                      APIs
                                                                                        • Part of subcall function 00B49A87: __EH_prolog.LIBCMT ref: 00B49A8C
                                                                                        • Part of subcall function 00B49A87: _Allocate.LIBCPMT ref: 00B49AE3
                                                                                        • Part of subcall function 00B49A87: _memmove.LIBCMT ref: 00B49B3A
                                                                                      • _memset.LIBCMT ref: 00B508E9
                                                                                      • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 00B50952
                                                                                      • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 00B5095A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocateErrorFormatH_prologLastMessage_memmove_memset
                                                                                      • String ID: Unknown error$invalid string position
                                                                                      • API String ID: 1854462395-1837348584
                                                                                      • Opcode ID: 6969b7fd472382d74edcd802d889abda4f3ad38123cc41d693a609a5e228b61a
                                                                                      • Instruction ID: ce9b0079d20dea95aace6f1342dbee5fa784d77d168b372407053246d3b9d5f7
                                                                                      • Opcode Fuzzy Hash: 6969b7fd472382d74edcd802d889abda4f3ad38123cc41d693a609a5e228b61a
                                                                                      • Instruction Fuzzy Hash: 9B51BD70218341DFEB14EF29C890B2FBBE4EB98744F5009ADF88597292D771D688CB52
                                                                                      APIs
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00B54E46,?,?,?,00000001), ref: 00B594DD
                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00B594E6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                      • String ID:
                                                                                      • API String ID: 3192549508-0
                                                                                      • Opcode ID: 153efa638e5de87395123b21be4e40c8865cfe00e60bd7c6a882096e875ec8c2
                                                                                      • Instruction ID: a664059e3bc77699b57ecf22727a106df8b001141832d96af4a2574ce2f122cd
                                                                                      • Opcode Fuzzy Hash: 153efa638e5de87395123b21be4e40c8865cfe00e60bd7c6a882096e875ec8c2
                                                                                      • Instruction Fuzzy Hash: 6DB0923109C208EBCB012BD1EC09B893F28EB0466AF004410F60D460A0CFA654209AB1
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B424E6
                                                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 00B424FC
                                                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 00B4250E
                                                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 00B4256D
                                                                                      • SetLastError.KERNEL32(00000000,?,7622DFB0), ref: 00B4257F
                                                                                      • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,7622DFB0), ref: 00B42599
                                                                                      • GetLastError.KERNEL32(?,7622DFB0), ref: 00B425A2
                                                                                      • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 00B425F0
                                                                                      • InterlockedDecrement.KERNEL32(00000002), ref: 00B4262F
                                                                                      • InterlockedExchange.KERNEL32(00000000,00000000), ref: 00B4268E
                                                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00B42699
                                                                                      • InterlockedExchange.KERNEL32(00000000,00000001), ref: 00B426AD
                                                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,7622DFB0), ref: 00B426BD
                                                                                      • GetLastError.KERNEL32(?,7622DFB0), ref: 00B426C7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                                      • String ID:
                                                                                      • API String ID: 1213838671-0
                                                                                      • Opcode ID: fc1dabadb10c8c057060da7a60fb1f831d0505343b09a57b0db1f77b67033ac1
                                                                                      • Instruction ID: 38487c6d674f567233f0adc85f0a3a31769e7ba4b578e9396e35025444b99311
                                                                                      • Opcode Fuzzy Hash: fc1dabadb10c8c057060da7a60fb1f831d0505343b09a57b0db1f77b67033ac1
                                                                                      • Instruction Fuzzy Hash: 3B614171904609EFCB10DFA4D985AAEBBF8FF08314F5045AAF516E3290DB749A44EF60
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B44608
                                                                                        • Part of subcall function 00B53AFC: _malloc.LIBCMT ref: 00B53B14
                                                                                      • htons.WS2_32(?), ref: 00B44669
                                                                                      • htonl.WS2_32(?), ref: 00B4468C
                                                                                      • htonl.WS2_32(00000000), ref: 00B44693
                                                                                      • htons.WS2_32(00000000), ref: 00B44747
                                                                                      • _sprintf.LIBCMT ref: 00B4475D
                                                                                        • Part of subcall function 00B4893A: _memmove.LIBCMT ref: 00B4895A
                                                                                      • htons.WS2_32(?), ref: 00B446B0
                                                                                        • Part of subcall function 00B496E5: __EH_prolog.LIBCMT ref: 00B496EA
                                                                                        • Part of subcall function 00B496E5: RtlEnterCriticalSection.NTDLL(00000020), ref: 00B49765
                                                                                        • Part of subcall function 00B496E5: RtlLeaveCriticalSection.NTDLL(00000020), ref: 00B49783
                                                                                        • Part of subcall function 00B41BA7: __EH_prolog.LIBCMT ref: 00B41BAC
                                                                                        • Part of subcall function 00B41BA7: RtlEnterCriticalSection.NTDLL ref: 00B41BBC
                                                                                        • Part of subcall function 00B41BA7: RtlLeaveCriticalSection.NTDLL ref: 00B41BEA
                                                                                        • Part of subcall function 00B41BA7: RtlEnterCriticalSection.NTDLL ref: 00B41C13
                                                                                        • Part of subcall function 00B41BA7: RtlLeaveCriticalSection.NTDLL ref: 00B41C56
                                                                                        • Part of subcall function 00B4DEA1: __EH_prolog.LIBCMT ref: 00B4DEA6
                                                                                      • htonl.WS2_32(?), ref: 00B4497C
                                                                                      • htonl.WS2_32(00000000), ref: 00B44983
                                                                                      • htonl.WS2_32(00000000), ref: 00B449C8
                                                                                      • htonl.WS2_32(00000000), ref: 00B449CF
                                                                                      • htons.WS2_32(?), ref: 00B449EF
                                                                                      • htons.WS2_32(?), ref: 00B449F9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                                      • String ID:
                                                                                      • API String ID: 1645262487-0
                                                                                      • Opcode ID: c4995788c41d911c8b1b857fd0ee227c4cf49a7d7c96e55bfcf9aa5ce9412e04
                                                                                      • Instruction ID: e9ffbcadb02ea1817fcb0527e1a8c3541a795b70267df912b5117f073895658c
                                                                                      • Opcode Fuzzy Hash: c4995788c41d911c8b1b857fd0ee227c4cf49a7d7c96e55bfcf9aa5ce9412e04
                                                                                      • Instruction Fuzzy Hash: 89024571C00259AEEF15DBA4C845BEEBBF8EF08304F14419AE505B7281DBB45B89DBA1
                                                                                      APIs
                                                                                      • RegisterServiceCtrlHandlerA.ADVAPI32(UID Finder 6.11.66,Function_0000235E), ref: 004023C1
                                                                                      • SetServiceStatus.ADVAPI32(0040C408), ref: 00402420
                                                                                      • GetLastError.KERNEL32 ref: 00402422
                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                                      • GetLastError.KERNEL32 ref: 00402450
                                                                                      • SetServiceStatus.ADVAPI32(0040C408), ref: 00402480
                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                                      • CloseHandle.KERNEL32 ref: 004024A1
                                                                                      • SetServiceStatus.ADVAPI32(0040C408), ref: 004024CA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                                      • String ID: UID Finder 6.11.66
                                                                                      • API String ID: 3346042915-245170862
                                                                                      • Opcode ID: 8481bbef3285b0f9ebce9f82f4e1eb68b4ac82d1f0eae4c5cd12d91383da07eb
                                                                                      • Instruction ID: 4f107cf957cbd680cd4d605db27ce117804603c61eb7b626b01e69dba3e91430
                                                                                      • Opcode Fuzzy Hash: 8481bbef3285b0f9ebce9f82f4e1eb68b4ac82d1f0eae4c5cd12d91383da07eb
                                                                                      • Instruction Fuzzy Hash: 3521C570441214EBC2105F16EFE9A267FA8FBC5794B11823EE544B22B2CBB90549CFAD
                                                                                      APIs
                                                                                      • RtlDecodePointer.NTDLL(?), ref: 00B582EA
                                                                                      • _free.LIBCMT ref: 00B58303
                                                                                        • Part of subcall function 00B52F24: HeapFree.KERNEL32(00000000,00000000,?,00B55C82,00000000,00000104,76230A60), ref: 00B52F38
                                                                                        • Part of subcall function 00B52F24: GetLastError.KERNEL32(00000000,?,00B55C82,00000000,00000104,76230A60), ref: 00B52F4A
                                                                                      • _free.LIBCMT ref: 00B58316
                                                                                      • _free.LIBCMT ref: 00B58334
                                                                                      • _free.LIBCMT ref: 00B58346
                                                                                      • _free.LIBCMT ref: 00B58357
                                                                                      • _free.LIBCMT ref: 00B58362
                                                                                      • _free.LIBCMT ref: 00B58386
                                                                                      • RtlEncodePointer.NTDLL(00A49120), ref: 00B5838D
                                                                                      • _free.LIBCMT ref: 00B583A2
                                                                                      • _free.LIBCMT ref: 00B583B8
                                                                                      • _free.LIBCMT ref: 00B583E0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 3064303923-0
                                                                                      • Opcode ID: b27faec356a46db731ff1b2ad173c747b60fa3ce6bacfeae8368dd2d52fc3af1
                                                                                      • Instruction ID: 78c24155c8636a59522d8d7558fea0068114406abf91c09c8b31956b36d85657
                                                                                      • Opcode Fuzzy Hash: b27faec356a46db731ff1b2ad173c747b60fa3ce6bacfeae8368dd2d52fc3af1
                                                                                      • Instruction Fuzzy Hash: 7C213D32906621DBCB266F14FC8165977E4FB06B2231900EAFC4CA72A1CF755C8DDBA4
                                                                                      APIs
                                                                                      • LCMapStringW.KERNEL32(00000000,00000100,00408650,00000001,00000000,00000000,00000103,00000001,00000000,?,00406357,00200020,00000000,?,00000000,00000000), ref: 004068D9
                                                                                      • LCMapStringA.KERNEL32(00000000,00000100,0040864C,00000001,00000000,00000000,?,00406357,00200020,00000000,?,00000000,00000000,00000001), ref: 004068F5
                                                                                      • LCMapStringA.KERNEL32(?,?,?,?,Wc@ ,?,00000103,00000001,00000000,?,00406357,00200020,00000000,?,00000000,00000000), ref: 0040693E
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406357,00200020,00000000,?,00000000,00000000), ref: 00406976
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 004069CE
                                                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406357,00200020,00000000,?,00000000), ref: 004069E4
                                                                                      • LCMapStringW.KERNEL32(?,?,?,00000000,Wc@ ,?,?,00406357,00200020,00000000,?,00000000), ref: 00406A17
                                                                                      • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 00406A7F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$ByteCharMultiWide
                                                                                      • String ID: Wc@
                                                                                      • API String ID: 352835431-4128830131
                                                                                      • Opcode ID: c59ed56cf9200d4eb4cbe2117608f716f3cf8688afb6deb225ba4043c85c6758
                                                                                      • Instruction ID: c30aaca26a5f6a0372154cda3c497b92e07e281ea3e6606adb1712902525b657
                                                                                      • Opcode Fuzzy Hash: c59ed56cf9200d4eb4cbe2117608f716f3cf8688afb6deb225ba4043c85c6758
                                                                                      • Instruction Fuzzy Hash: 8A517E71A00209EBCF219F94CD45ADF7FB5FB49750F11812AF911B12A0D7398921DF69
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F74), ref: 00403BFD
                                                                                      • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F74), ref: 00403C11
                                                                                      • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F74), ref: 00403C3D
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F74), ref: 00403C75
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F74), ref: 00403C97
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F74), ref: 00403CB0
                                                                                      • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F74), ref: 00403CC3
                                                                                      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403D01
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                      • String ID: t/@
                                                                                      • API String ID: 1823725401-3363397731
                                                                                      • Opcode ID: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                                                      • Instruction ID: 879d38be92084954eaea71e49c87bd85cc2f9a5de8a3f101a3316a48e994b743
                                                                                      • Opcode Fuzzy Hash: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                                                      • Instruction Fuzzy Hash: 3E31017350C2246EE7203F746CC483BBE9CEA4575AB15053FF982F3280DA398E8146AD
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B43428
                                                                                      • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 00B4346B
                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B43472
                                                                                      • GetLastError.KERNEL32 ref: 00B43486
                                                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00B434D7
                                                                                      • RtlEnterCriticalSection.NTDLL(00000018), ref: 00B434ED
                                                                                      • RtlLeaveCriticalSection.NTDLL(00000018), ref: 00B43518
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                                      • String ID: CancelIoEx$KERNEL32
                                                                                      • API String ID: 2902213904-434325024
                                                                                      • Opcode ID: 589098eed91f84a68e939206b454e52253106eeb0de618116d0def19d125a912
                                                                                      • Instruction ID: 09f4387011983e7f2273047a65b0a935c25381164725982a832d69786f55c998
                                                                                      • Opcode Fuzzy Hash: 589098eed91f84a68e939206b454e52253106eeb0de618116d0def19d125a912
                                                                                      • Instruction Fuzzy Hash: EE318DB1904305DFDB11AF64C884AAA7BF8FF48711F1984E9F9159B391CB74DA00DBA1
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,004043C1,?,Microsoft Visual C++ Runtime Library,00012010,?,00408584,?,004085D4,?,?,?,Runtime Error!Program: ), ref: 004065CA
                                                                                      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004065E2
                                                                                      • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004065F3
                                                                                      • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00406600
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad
                                                                                      • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                                                      • API String ID: 2238633743-4044615076
                                                                                      • Opcode ID: 1e827d42bf4979efd8fc0e05e1792a28396127eff3a42ececc528c363af0fc92
                                                                                      • Instruction ID: db39845ca5f1b339293cd545309a4189fd77c948f0b46f5b4ed21715b02f5541
                                                                                      • Opcode Fuzzy Hash: 1e827d42bf4979efd8fc0e05e1792a28396127eff3a42ececc528c363af0fc92
                                                                                      • Instruction Fuzzy Hash: 46018871A40611EFC7208FB5AFC49277EE99B587407061D3FA541F2291DE7B8811CB6D
                                                                                      APIs
                                                                                      • GetStringTypeW.KERNEL32(00000001,00408650,00000001,00000000,00000103,00000001,00000000,00406357,00200020,00000000,?,00000000,00000000,00000001), ref: 0040678D
                                                                                      • GetStringTypeA.KERNEL32(00000000,00000001,0040864C,00000001,?,?,00000000,00000000,00000001), ref: 004067A7
                                                                                      • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406357,00200020,00000000,?,00000000,00000000,00000001), ref: 004067DB
                                                                                      • MultiByteToWideChar.KERNEL32(Wc@ ,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406357,00200020,00000000,?,00000000,00000000,00000001), ref: 00406813
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 00406869
                                                                                      • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 0040687B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: StringType$ByteCharMultiWide
                                                                                      • String ID: Wc@
                                                                                      • API String ID: 3852931651-4128830131
                                                                                      • Opcode ID: 51aa12949cff19f931a0c8f8e78869120ffa08a7a0a03f1196022c1900c26aa0
                                                                                      • Instruction ID: 956ec2585e1336e719d8d065e8dcf62e24d3c9f54db028b8b8152b0cc77897f4
                                                                                      • Opcode Fuzzy Hash: 51aa12949cff19f931a0c8f8e78869120ffa08a7a0a03f1196022c1900c26aa0
                                                                                      • Instruction Fuzzy Hash: 3F419F72501209EFCF20AF94DD85EAF3B79FB04754F11453AF902F2290C73989248BA9
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040430A
                                                                                      • GetStdHandle.KERNEL32(000000F4,00408584,00000000,?,00000000,00000000), ref: 004043E0
                                                                                      • WriteFile.KERNEL32(00000000), ref: 004043E7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$HandleModuleNameWrite
                                                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                      • API String ID: 3784150691-4022980321
                                                                                      • Opcode ID: efc2387ad9e4ebc715aa49f254a253419fe4c6ba22f87958d70440b8e59437cd
                                                                                      • Instruction ID: d8635e2a7f81e525e6493e1b235b12eebf94c6aed7416e9ae0bb5a91e3b582aa
                                                                                      • Opcode Fuzzy Hash: efc2387ad9e4ebc715aa49f254a253419fe4c6ba22f87958d70440b8e59437cd
                                                                                      • Instruction Fuzzy Hash: ED318572601219AEDF20AA60DE46FDA336CAF85304F1004BFF944B61D1DA78DE448A5D
                                                                                      APIs
                                                                                      • OpenEventA.KERNEL32(00100002,00000000,00000000,8D94DE02), ref: 00B51660
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B51675
                                                                                      • ResetEvent.KERNEL32(00000000,8D94DE02), ref: 00B5167F
                                                                                      • CloseHandle.KERNEL32(00000000,8D94DE02), ref: 00B516B4
                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,8D94DE02), ref: 00B5172A
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B5173F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseEventHandle$CreateOpenReset
                                                                                      • String ID:
                                                                                      • API String ID: 1285874450-0
                                                                                      • Opcode ID: 67aac3b350ffc08d13fb8b19703e6dc776cc44bbe6e73be9277baf0b3589bdd8
                                                                                      • Instruction ID: 4f974c1bf72c9af683aa4dc4112e0a70832c24810c4341a47556e34c6b8c210e
                                                                                      • Opcode Fuzzy Hash: 67aac3b350ffc08d13fb8b19703e6dc776cc44bbe6e73be9277baf0b3589bdd8
                                                                                      • Instruction Fuzzy Hash: 6F413071D04358ABDF11DFA8C848B9DB7F8EF09715F144699E818AB280D7749D09CB61
                                                                                      APIs
                                                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 00B420AC
                                                                                      • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 00B420CD
                                                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00B420D8
                                                                                      • InterlockedDecrement.KERNEL32(?), ref: 00B4213E
                                                                                      • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 00B4217A
                                                                                      • InterlockedDecrement.KERNEL32(?), ref: 00B42187
                                                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00B421A6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                                      • String ID:
                                                                                      • API String ID: 1171374749-0
                                                                                      • Opcode ID: b495b3df417b36f368b4d2d0ea29b198683f9d4a957ec23187c2b8fe8ae9b1e8
                                                                                      • Instruction ID: e95679fa7a70dbc2cef6858ea6da5b7de4cf884e1016dc0cd0703cb2dbc12b99
                                                                                      • Opcode Fuzzy Hash: b495b3df417b36f368b4d2d0ea29b198683f9d4a957ec23187c2b8fe8ae9b1e8
                                                                                      • Instruction Fuzzy Hash: E54147755087019FC321DF25C885A6BBBF9EFC8754F000A5EF49693290DB34EA05EBA2
                                                                                      APIs
                                                                                        • Part of subcall function 00B51E80: OpenEventA.KERNEL32(00100002,00000000,?,?,?,00B516DE,?,?), ref: 00B51EAF
                                                                                        • Part of subcall function 00B51E80: CloseHandle.KERNEL32(00000000,?,?,00B516DE,?,?), ref: 00B51EC4
                                                                                        • Part of subcall function 00B51E80: SetEvent.KERNEL32(00000000,00B516DE,?,?), ref: 00B51ED7
                                                                                      • OpenEventA.KERNEL32(00100002,00000000,00000000,8D94DE02), ref: 00B51660
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B51675
                                                                                      • ResetEvent.KERNEL32(00000000,8D94DE02), ref: 00B5167F
                                                                                      • CloseHandle.KERNEL32(00000000,8D94DE02), ref: 00B516B4
                                                                                      • __CxxThrowException@8.LIBCMT ref: 00B516E5
                                                                                        • Part of subcall function 00B5450A: RaiseException.KERNEL32(?,?,00B4FB0D,?,?,?,?,?,?,?,00B4FB0D,?,00B70F68,?), ref: 00B5455F
                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,8D94DE02), ref: 00B5172A
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B5173F
                                                                                        • Part of subcall function 00B51BC0: GetCurrentProcessId.KERNEL32(?), ref: 00B51C19
                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,8D94DE02), ref: 00B5174F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                                      • String ID:
                                                                                      • API String ID: 2227236058-0
                                                                                      • Opcode ID: e0bb5c9360107cc876e9fd3c76a11ed48031a1a2c9d33130e362444ac4590727
                                                                                      • Instruction ID: 90e3df77e38679b4a0d6d80c0f0cff824902bb9605f3de3e2d6197e35bdb7d48
                                                                                      • Opcode Fuzzy Hash: e0bb5c9360107cc876e9fd3c76a11ed48031a1a2c9d33130e362444ac4590727
                                                                                      • Instruction Fuzzy Hash: 02315E71D00309ABDF21DBA88C49BADB7F8EF05316F1406D9EC18AB281DB609D098B61
                                                                                      APIs
                                                                                      • __init_pointers.LIBCMT ref: 00B55D44
                                                                                        • Part of subcall function 00B584B2: RtlEncodePointer.NTDLL(00000000), ref: 00B584B5
                                                                                        • Part of subcall function 00B584B2: __initp_misc_winsig.LIBCMT ref: 00B584D0
                                                                                        • Part of subcall function 00B584B2: GetModuleHandleW.KERNEL32(kernel32.dll,?,00B71568,00000008,00000003,00B70F4C,?,00000001), ref: 00B59231
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00B59245
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00B59258
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00B5926B
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00B5927E
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00B59291
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00B592A4
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00B592B7
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00B592CA
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00B592DD
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00B592F0
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00B59303
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00B59316
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00B59329
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00B5933C
                                                                                        • Part of subcall function 00B584B2: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00B5934F
                                                                                      • __mtinitlocks.LIBCMT ref: 00B55D49
                                                                                      • __mtterm.LIBCMT ref: 00B55D52
                                                                                        • Part of subcall function 00B55DBA: RtlDeleteCriticalSection.NTDLL(00000000), ref: 00B588E8
                                                                                        • Part of subcall function 00B55DBA: _free.LIBCMT ref: 00B588EF
                                                                                        • Part of subcall function 00B55DBA: RtlDeleteCriticalSection.NTDLL(00B73978), ref: 00B58911
                                                                                      • __calloc_crt.LIBCMT ref: 00B55D77
                                                                                      • __initptd.LIBCMT ref: 00B55D99
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00B55DA0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                      • String ID:
                                                                                      • API String ID: 3567560977-0
                                                                                      • Opcode ID: b4cbec8863986752a2a8a32cc14d8087984809cef04eb31395d13c5065c84b82
                                                                                      • Instruction ID: 8e8aa27e55e1d143c143a35916dfa5a9d0c4b64d8d933b4abcdead126a1b340b
                                                                                      • Opcode Fuzzy Hash: b4cbec8863986752a2a8a32cc14d8087984809cef04eb31395d13c5065c84b82
                                                                                      • Instruction Fuzzy Hash: E0F0F633109F221AE63437B47C1BB8A27E2DB01733F1002E9FD94E61E1FF1488494644
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,00B53423,00000000), ref: 00B5348B
                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B53492
                                                                                      • RtlEncodePointer.NTDLL(00000000), ref: 00B5349E
                                                                                      • RtlDecodePointer.NTDLL(00000001), ref: 00B534BB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                      • String ID: RoInitialize$combase.dll
                                                                                      • API String ID: 3489934621-340411864
                                                                                      • Opcode ID: a845a50bff3cd14853a1e971767e28be1ef0c0a1892174aa036d7ae59a6c302e
                                                                                      • Instruction ID: 22dc1af34191e1ad474928a62a96dc1c00aec6b4b5acda7c466f2105b4a0a54c
                                                                                      • Opcode Fuzzy Hash: a845a50bff3cd14853a1e971767e28be1ef0c0a1892174aa036d7ae59a6c302e
                                                                                      • Instruction Fuzzy Hash: C5E0E5706D4740AADA105B71EC89F1637A4A711B0AF0041A4F90AE22E0CEB951888F20
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00B53460), ref: 00B53560
                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B53567
                                                                                      • RtlEncodePointer.NTDLL(00000000), ref: 00B53572
                                                                                      • RtlDecodePointer.NTDLL(00B53460), ref: 00B5358D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                      • String ID: RoUninitialize$combase.dll
                                                                                      • API String ID: 3489934621-2819208100
                                                                                      • Opcode ID: f1801bd7ddbdc5b09c7b96b250e5d9aafd00d811ca58f37783410ec82f9de69e
                                                                                      • Instruction ID: 05fd6690b95ccaffd6883904bf1c4a4cde33988a17f71d41d646b78168e37135
                                                                                      • Opcode Fuzzy Hash: f1801bd7ddbdc5b09c7b96b250e5d9aafd00d811ca58f37783410ec82f9de69e
                                                                                      • Instruction Fuzzy Hash: 81E0B6B05D4704ABDB109F70AD4DB063BA4B725B4AF1055A5F50BE32F0EFB85648CB10
                                                                                      APIs
                                                                                      • TlsGetValue.KERNEL32(00000026,8D94DE02,?,?,?,?,00000000,00B66A68,000000FF,00B5217A), ref: 00B51F1A
                                                                                      • TlsSetValue.KERNEL32(00000026,00B5217A,?,?,00000000), ref: 00B51F87
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B51FB1
                                                                                      • HeapFree.KERNEL32(00000000), ref: 00B51FB4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: HeapValue$FreeProcess
                                                                                      • String ID:
                                                                                      • API String ID: 1812714009-0
                                                                                      • Opcode ID: 4faa813172bdcbbc510f0a6e6f4ee19567efe6ad97aa7aac4135db66a030ee3a
                                                                                      • Instruction ID: 959f297aa193c3c9391ae482acbbc432e253281a0f7fba54d3926dbc5ebd9efa
                                                                                      • Opcode Fuzzy Hash: 4faa813172bdcbbc510f0a6e6f4ee19567efe6ad97aa7aac4135db66a030ee3a
                                                                                      • Instruction Fuzzy Hash: C351AF315093049FDB20DF29C884B16BBE4FB45765F098AE8EC69972D0DB75EC08CB91
                                                                                      APIs
                                                                                      • _ValidateScopeTableHandlers.LIBCMT ref: 00B65740
                                                                                      • __FindPESection.LIBCMT ref: 00B6575A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FindHandlersScopeSectionTableValidate
                                                                                      • String ID:
                                                                                      • API String ID: 876702719-0
                                                                                      • Opcode ID: 3b47df28c4a0a526a9f279a58272a53bf192ce4351f07697f76ae7d1ee2cbc7b
                                                                                      • Instruction ID: 073b786f9743c2cdb5d367108052eebf90d2d3ea660eb1a304337a8e52abcaa5
                                                                                      • Opcode Fuzzy Hash: 3b47df28c4a0a526a9f279a58272a53bf192ce4351f07697f76ae7d1ee2cbc7b
                                                                                      • Instruction Fuzzy Hash: FAA1A171A04A158FCB20CF18D880B6DB7E5FB45320F6542A9EC19EB391EB39ED51CB90
                                                                                      APIs
                                                                                      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 00B41CB1
                                                                                      • CloseHandle.KERNEL32(?), ref: 00B41CBA
                                                                                      • InterlockedExchangeAdd.KERNEL32(00B77264,00000000), ref: 00B41CC6
                                                                                      • TerminateThread.KERNEL32(?,00000000), ref: 00B41CD4
                                                                                      • QueueUserAPC.KERNEL32(00B41E7C,?,00000000), ref: 00B41CE1
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B41CEC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                                      • String ID:
                                                                                      • API String ID: 1946104331-0
                                                                                      • Opcode ID: 772e72f0dccb2d70a9c60509ebfde2b990ab89464a072d6a7994f35471ec367d
                                                                                      • Instruction ID: 24ce10019442d6ca242d72d7032e9eb363ecab237792d35799092d122a4a5a99
                                                                                      • Opcode Fuzzy Hash: 772e72f0dccb2d70a9c60509ebfde2b990ab89464a072d6a7994f35471ec367d
                                                                                      • Instruction Fuzzy Hash: 4EF08C31588204BFD7205B9ADD0DC5BBBFCEB85B20B004299F56AC21E0DFA0AA008B30
                                                                                      APIs
                                                                                      • GetVersionExA.KERNEL32 ref: 00403F0B
                                                                                      • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403F40
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403FA0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                      • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                      • API String ID: 1385375860-4131005785
                                                                                      • Opcode ID: 902e60ade4d92a6391f73bc102fd9c1f1b848196a8b58942b8a92e566e39241b
                                                                                      • Instruction ID: f9b557e5926ae0cb1bea86ca91105dc92f8de38cdcecb6fe0ade7bda32980430
                                                                                      • Opcode Fuzzy Hash: 902e60ade4d92a6391f73bc102fd9c1f1b848196a8b58942b8a92e566e39241b
                                                                                      • Instruction Fuzzy Hash: B6312571D412886DEB319A705C45ADE7F7C8B06309F2400FBE685F62C2E6388FC98B19
                                                                                      APIs
                                                                                      • std::exception::exception.LIBCMT ref: 00B5192F
                                                                                        • Part of subcall function 00B52483: std::exception::_Copy_str.LIBCMT ref: 00B5249C
                                                                                        • Part of subcall function 00B50D00: __CxxThrowException@8.LIBCMT ref: 00B50D5E
                                                                                      • std::exception::exception.LIBCMT ref: 00B5198E
                                                                                      Strings
                                                                                      • $, xrefs: 00B51993
                                                                                      • boost unique_lock owns already the mutex, xrefs: 00B5197D
                                                                                      • boost unique_lock has no mutex, xrefs: 00B5191E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                                      • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                                      • API String ID: 2140441600-46888669
                                                                                      • Opcode ID: 2f0cd1cb4adcd3e04e6d285b5504987f402458aa3ee769afa1387c9b3d374a3a
                                                                                      • Instruction ID: 6d8417576c2f882838a7ad3f414ecd108fa97190077dddd26e9ffd28d7c7dc6b
                                                                                      • Opcode Fuzzy Hash: 2f0cd1cb4adcd3e04e6d285b5504987f402458aa3ee769afa1387c9b3d374a3a
                                                                                      • Instruction Fuzzy Hash: 952126B14193809FD721EF24C45575BBBE4BB89B08F004E9DF8A587391DBB99908CB92
                                                                                      APIs
                                                                                      • __getptd_noexit.LIBCMT ref: 00B54A30
                                                                                        • Part of subcall function 00B55C22: GetLastError.KERNEL32(76230A60,7622F550,00B55E10,00B52FE3,7622F550,?,00B4606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,00B46504), ref: 00B55C24
                                                                                        • Part of subcall function 00B55C22: __calloc_crt.LIBCMT ref: 00B55C45
                                                                                        • Part of subcall function 00B55C22: __initptd.LIBCMT ref: 00B55C67
                                                                                        • Part of subcall function 00B55C22: GetCurrentThreadId.KERNEL32 ref: 00B55C6E
                                                                                        • Part of subcall function 00B55C22: SetLastError.KERNEL32(00000000,00B4606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,00B46504), ref: 00B55C86
                                                                                      • __calloc_crt.LIBCMT ref: 00B54A53
                                                                                      • __get_sys_err_msg.LIBCMT ref: 00B54A71
                                                                                      • __invoke_watson.LIBCMT ref: 00B54A8E
                                                                                      Strings
                                                                                      • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00B54A3B, 00B54A61
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__initptd__invoke_watson
                                                                                      • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                                                      • API String ID: 109275364-798102604
                                                                                      • Opcode ID: edf314b8fc8d6ac4d6092a01268b42c72d2494df2c3e732e2499b56ba449fc46
                                                                                      • Instruction ID: a41fd87abb00db81d02f499141a1316860649e7b8b3c5256476f402829559ec7
                                                                                      • Opcode Fuzzy Hash: edf314b8fc8d6ac4d6092a01268b42c72d2494df2c3e732e2499b56ba449fc46
                                                                                      • Instruction Fuzzy Hash: 75F05933AC0B146BE732A51A5C8172B72CCDB907AFB0005F6FD4597102EB21CD8A029D
                                                                                      APIs
                                                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 00B42350
                                                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 00B42360
                                                                                      • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B42370
                                                                                      • GetLastError.KERNEL32 ref: 00B4237A
                                                                                        • Part of subcall function 00B41712: __EH_prolog.LIBCMT ref: 00B41717
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                                      • String ID: pqcs
                                                                                      • API String ID: 1619523792-2559862021
                                                                                      • Opcode ID: ea1c21a017bc7dbbe7a17afe4fd57270cf118a626c956a8eb9b5cdc889517603
                                                                                      • Instruction ID: 1c31d4a8fa961c31fedcabde228d7020e5e8f70444fb4261f18531f4c01aa9fd
                                                                                      • Opcode Fuzzy Hash: ea1c21a017bc7dbbe7a17afe4fd57270cf118a626c956a8eb9b5cdc889517603
                                                                                      • Instruction Fuzzy Hash: 32F05471944304AFD710AF749C0AAAB7BFCEB04705F0045A9F905D3150EFB4DA049BA1
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B44035
                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00B44042
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00B44049
                                                                                      • std::exception::exception.LIBCMT ref: 00B44063
                                                                                        • Part of subcall function 00B4A678: __EH_prolog.LIBCMT ref: 00B4A67D
                                                                                        • Part of subcall function 00B4A678: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 00B4A68C
                                                                                        • Part of subcall function 00B4A678: __CxxThrowException@8.LIBCMT ref: 00B4A6AB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                                      • String ID: bad allocation
                                                                                      • API String ID: 3112922283-2104205924
                                                                                      • Opcode ID: cc54330edd6dfe666e8db10a8bb7c6037ca1663e44eab29d6a74dd644ea9f6e7
                                                                                      • Instruction ID: 909e6e7f4eb28d90f8a054ebee44453401fbc2a6cbbc1ae7890b5b85a34a0bed
                                                                                      • Opcode Fuzzy Hash: cc54330edd6dfe666e8db10a8bb7c6037ca1663e44eab29d6a74dd644ea9f6e7
                                                                                      • Instruction Fuzzy Hash: 17F08C72D44209ABDB10EFE0C809BAEBBB8EB04705F404598FA15A2280DBB85618CB61
                                                                                      APIs
                                                                                      • GetStartupInfoA.KERNEL32(?), ref: 00403D6D
                                                                                      • GetFileType.KERNEL32(00000800), ref: 00403E13
                                                                                      • GetStdHandle.KERNEL32(-000000F6), ref: 00403E6C
                                                                                      • GetFileType.KERNEL32(00000000), ref: 00403E7A
                                                                                      • SetHandleCount.KERNEL32 ref: 00403EB1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileHandleType$CountInfoStartup
                                                                                      • String ID:
                                                                                      • API String ID: 1710529072-0
                                                                                      • Opcode ID: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                                                      • Instruction ID: 9dbc4695f3205ced207c781c98d2c2eecf37425ec268f2c04ee58d1a3995b9ba
                                                                                      • Opcode Fuzzy Hash: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                                                      • Instruction Fuzzy Hash: 7C5143716046458BD7218F38CD887663FA8AF02B26F15473EE4A2FB2E0C7389A45C74D
                                                                                      APIs
                                                                                        • Part of subcall function 00B51A00: CloseHandle.KERNEL32(00000000,8D94DE02), ref: 00B51A51
                                                                                        • Part of subcall function 00B51A00: WaitForSingleObject.KERNEL32(?,000000FF,8D94DE02,?,?,?,?,8D94DE02,00B519D3,8D94DE02), ref: 00B51A68
                                                                                      • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 00B51CCE
                                                                                      • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 00B51CEE
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00B51D27
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00B51D7B
                                                                                      • SetEvent.KERNEL32(?), ref: 00B51D82
                                                                                        • Part of subcall function 00B4418C: CloseHandle.KERNEL32(00000000,?,00B51CB5), ref: 00B441B0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                                      • String ID:
                                                                                      • API String ID: 4166353394-0
                                                                                      • Opcode ID: 699947bcfe1365255abd37b2ac5ea3fbe4ad4caa6149a7da235c079703b2521a
                                                                                      • Instruction ID: 519689dc209f8b5a464241369e01e849c55ff8324f2be6d02770cc6cf764defc
                                                                                      • Opcode Fuzzy Hash: 699947bcfe1365255abd37b2ac5ea3fbe4ad4caa6149a7da235c079703b2521a
                                                                                      • Instruction Fuzzy Hash: 3241CE71640311ABDB259F2CCC80B1677E4EF45725F140AE8EC29DB2D5DB35DC0A8BA5
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4E0AB
                                                                                        • Part of subcall function 00B41A01: TlsGetValue.KERNEL32 ref: 00B41A0A
                                                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00B4E12A
                                                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 00B4E146
                                                                                      • InterlockedIncrement.KERNEL32(00B75190), ref: 00B4E16B
                                                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 00B4E180
                                                                                        • Part of subcall function 00B427F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 00B4284E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                                      • String ID:
                                                                                      • API String ID: 1578506061-0
                                                                                      • Opcode ID: 78785e7bc9ebd58947075e412aaf1740fbda6496b432f35846ab5f1aad40299e
                                                                                      • Instruction ID: 6e705c4dee9dff82262556b930734d4af2108feacfee4df99058054533d75286
                                                                                      • Opcode Fuzzy Hash: 78785e7bc9ebd58947075e412aaf1740fbda6496b432f35846ab5f1aad40299e
                                                                                      • Instruction Fuzzy Hash: 70313AB1D453059FCB10DF68C944AAEBBF8FF08310F14499EE459E7641E774AA04DBA0
                                                                                      APIs
                                                                                      • _malloc.LIBCMT ref: 00B60360
                                                                                        • Part of subcall function 00B52F5C: __FF_MSGBANNER.LIBCMT ref: 00B52F73
                                                                                        • Part of subcall function 00B52F5C: __NMSG_WRITE.LIBCMT ref: 00B52F7A
                                                                                        • Part of subcall function 00B52F5C: RtlAllocateHeap.NTDLL(00A40000,00000000,00000001), ref: 00B52F9F
                                                                                      • _free.LIBCMT ref: 00B60373
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap_free_malloc
                                                                                      • String ID:
                                                                                      • API String ID: 1020059152-0
                                                                                      • Opcode ID: 36ef5d16de61f897a0cb3970c1a4464fa1fba487922210e1b0f9c78c79845eae
                                                                                      • Instruction ID: 86dfaa10f44492248d03bdf9cc2e28686e305dd1673997c27f8fb66562c9bdd3
                                                                                      • Opcode Fuzzy Hash: 36ef5d16de61f897a0cb3970c1a4464fa1fba487922210e1b0f9c78c79845eae
                                                                                      • Instruction Fuzzy Hash: 1911A332519A11ABCB313B71AC4575B3BD8EB08367B1045E5FD499B2A0DF3889448AA8
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B421DA
                                                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00B421ED
                                                                                      • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 00B42224
                                                                                      • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 00B42237
                                                                                      • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B42261
                                                                                        • Part of subcall function 00B42341: InterlockedExchange.KERNEL32(?,00000001), ref: 00B42350
                                                                                        • Part of subcall function 00B42341: InterlockedExchange.KERNEL32(?,00000001), ref: 00B42360
                                                                                        • Part of subcall function 00B42341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B42370
                                                                                        • Part of subcall function 00B42341: GetLastError.KERNEL32 ref: 00B4237A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                      • String ID:
                                                                                      • API String ID: 1856819132-0
                                                                                      • Opcode ID: 440aae11e65d27884e2c1429a53eebad1d87ebd568aff504a5618365e5cd16bf
                                                                                      • Instruction ID: 459b5b654a9870d592c972372751a0e3babb3fcf064f664293428ab8a6665494
                                                                                      • Opcode Fuzzy Hash: 440aae11e65d27884e2c1429a53eebad1d87ebd568aff504a5618365e5cd16bf
                                                                                      • Instruction Fuzzy Hash: 77117271D08124EBCB11AFA4DC446AEBBF9FF44314F5041AAF815932A1DFB54A51EB90
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4229D
                                                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00B422B0
                                                                                      • TlsGetValue.KERNEL32 ref: 00B422E7
                                                                                      • TlsSetValue.KERNEL32(?), ref: 00B42300
                                                                                      • TlsSetValue.KERNEL32(?,?,?), ref: 00B4231C
                                                                                        • Part of subcall function 00B42341: InterlockedExchange.KERNEL32(?,00000001), ref: 00B42350
                                                                                        • Part of subcall function 00B42341: InterlockedExchange.KERNEL32(?,00000001), ref: 00B42360
                                                                                        • Part of subcall function 00B42341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B42370
                                                                                        • Part of subcall function 00B42341: GetLastError.KERNEL32 ref: 00B4237A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                      • String ID:
                                                                                      • API String ID: 1856819132-0
                                                                                      • Opcode ID: 622e140985eedaaac25dc7b0e1f5fed37394ebb4562533e7dc103f3257753d92
                                                                                      • Instruction ID: a7530a115aee682fd941f725bab1d0bebae2152643277450db8cc00508b6a48d
                                                                                      • Opcode Fuzzy Hash: 622e140985eedaaac25dc7b0e1f5fed37394ebb4562533e7dc103f3257753d92
                                                                                      • Instruction Fuzzy Hash: 08116371D04118AFCB029FA4DC449AEBFF9FF44310F0441AAF81593261DF754A51EB90
                                                                                      APIs
                                                                                        • Part of subcall function 00B4B113: __EH_prolog.LIBCMT ref: 00B4B118
                                                                                      • __CxxThrowException@8.LIBCMT ref: 00B4BCDD
                                                                                        • Part of subcall function 00B5450A: RaiseException.KERNEL32(?,?,00B4FB0D,?,?,?,?,?,?,?,00B4FB0D,?,00B70F68,?), ref: 00B5455F
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00B71D84,?,00000001), ref: 00B4BCF3
                                                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 00B4BD06
                                                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,00B71D84,?,00000001), ref: 00B4BD16
                                                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 00B4BD24
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                                      • String ID:
                                                                                      • API String ID: 2725315915-0
                                                                                      • Opcode ID: e9f9062c50ca671942388f1c6e2bbc24635fae6655f1fad84e812b0da3f91a12
                                                                                      • Instruction ID: 81e90c2cad39382d1c23e46efce0addc8bb0e5f1a89c90af6997e18b22d56864
                                                                                      • Opcode Fuzzy Hash: e9f9062c50ca671942388f1c6e2bbc24635fae6655f1fad84e812b0da3f91a12
                                                                                      • Instruction Fuzzy Hash: E101D1B2604204BFCB109BA4ECC9F9677ECEB04719F0444A4F625D71D0DFA4E9049B20
                                                                                      APIs
                                                                                      • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 00B42432
                                                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 00B42445
                                                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 00B42454
                                                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 00B42469
                                                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 00B42470
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                                      • String ID:
                                                                                      • API String ID: 747265849-0
                                                                                      • Opcode ID: 1b65befc9a88a49291b89c048c64fa8e53f23598f1a6355fe7c0c8c7dde94445
                                                                                      • Instruction ID: 33d3e94388dd8df252becce8ba28d3a64781f95cb468f572d8a931554fb31ec1
                                                                                      • Opcode Fuzzy Hash: 1b65befc9a88a49291b89c048c64fa8e53f23598f1a6355fe7c0c8c7dde94445
                                                                                      • Instruction Fuzzy Hash: 49F01D72284214BBDA009BA0ED89F9A776CFB44715F804051F701D7491DFA5AA10DBB1
                                                                                      APIs
                                                                                      • InterlockedIncrement.KERNEL32(?), ref: 00B41ED2
                                                                                      • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 00B41EEA
                                                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 00B41EF9
                                                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 00B41F0E
                                                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 00B41F15
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                                      • String ID:
                                                                                      • API String ID: 830998967-0
                                                                                      • Opcode ID: 79ba8932905dc56a3732c05c6d832b6258a5fca95b6c6e673d62c6c48072acd9
                                                                                      • Instruction ID: 9754865e83a8b1347cb85d08492f35c6988e4e50d4b18aa549fac252b2a87297
                                                                                      • Opcode Fuzzy Hash: 79ba8932905dc56a3732c05c6d832b6258a5fca95b6c6e673d62c6c48072acd9
                                                                                      • Instruction Fuzzy Hash: 8FF04932158205BBDB00AFA0ED88BDA776CFB04305F000011F20187491DFA5AA258BB0
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _memmove
                                                                                      • String ID: invalid string position$string too long
                                                                                      • API String ID: 4104443479-4289949731
                                                                                      • Opcode ID: 2b4760768514b7a0f45ecef29bb4eab23c0b8e53b6dada22903ac0ec4d5dd683
                                                                                      • Instruction ID: bc8d3643959572b50db907bc89b5af30c6c5c2c3a39e1ab332100dfd57b5f860
                                                                                      • Opcode Fuzzy Hash: 2b4760768514b7a0f45ecef29bb4eab23c0b8e53b6dada22903ac0ec4d5dd683
                                                                                      • Instruction Fuzzy Hash: 0B41D231700305AFDB349E69D890A6EB7E9EB41750B2409ADF9568B681CF70EE04E7A0
                                                                                      APIs
                                                                                      • WSASetLastError.WS2_32(00000000), ref: 00B430C3
                                                                                      • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 00B43102
                                                                                      • _memcmp.LIBCMT ref: 00B43141
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressErrorLastString_memcmp
                                                                                      • String ID: 255.255.255.255
                                                                                      • API String ID: 1618111833-2422070025
                                                                                      • Opcode ID: e3547ecd7e212132156d4096aea97e37ea07c35ca2dd4031a24a215493b8f803
                                                                                      • Instruction ID: ba8c1a194a1cdb71399e3067179222be7f117b0d61ae719e45f75d1cf3abe221
                                                                                      • Opcode Fuzzy Hash: e3547ecd7e212132156d4096aea97e37ea07c35ca2dd4031a24a215493b8f803
                                                                                      • Instruction Fuzzy Hash: 8731EF71A003089FDB20AF64C881B6EB7E5FF41721F1885E9EC65A7390DB729B458B90
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B41F5B
                                                                                      • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 00B41FC5
                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 00B41FD2
                                                                                        • Part of subcall function 00B41712: __EH_prolog.LIBCMT ref: 00B41717
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                                      • String ID: iocp
                                                                                      • API String ID: 998023749-976528080
                                                                                      • Opcode ID: 3b81df5b0676e66c583a6c85ec45398bf0292e383957563216b9d759a13be568
                                                                                      • Instruction ID: 15879b95bb67e22c5223ce3c2113fad949d37db207b50d0b4c2d396db535187a
                                                                                      • Opcode Fuzzy Hash: 3b81df5b0676e66c583a6c85ec45398bf0292e383957563216b9d759a13be568
                                                                                      • Instruction Fuzzy Hash: AC21E5B1801B449FC720DF6AC50455AFBF8FFA4710B108A5FE8A683AA0D7B4A644CF91
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 004069CE
                                                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406357,00200020,00000000,?,00000000), ref: 004069E4
                                                                                      • LCMapStringW.KERNEL32(?,?,?,00000000,Wc@ ,?,?,00406357,00200020,00000000,?,00000000), ref: 00406A17
                                                                                      • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 00406A7F
                                                                                      • WideCharToMultiByte.KERNEL32(?,00000220,?,00000000,Wc@ ,?,00000000,00000000,?,00000000,?,00406357,00200020,00000000,?,00000000), ref: 00406AA4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$ByteCharMultiWide
                                                                                      • String ID: Wc@
                                                                                      • API String ID: 352835431-4128830131
                                                                                      • Opcode ID: 1312c45284bb9b0df6438f0e9267380287f1a9abf6012680dfeac5a7f92326d3
                                                                                      • Instruction ID: 95b79f799a9dc74ab8783d7474949c37cbdd673329ec6272a6b224a97d77f72f
                                                                                      • Opcode Fuzzy Hash: 1312c45284bb9b0df6438f0e9267380287f1a9abf6012680dfeac5a7f92326d3
                                                                                      • Instruction Fuzzy Hash: C2113A32A00209ABCF229F98CD04ADEBFB6FF49350F11816AF911722A0D3368D61DF54
                                                                                      APIs
                                                                                      • _malloc.LIBCMT ref: 00B53B14
                                                                                        • Part of subcall function 00B52F5C: __FF_MSGBANNER.LIBCMT ref: 00B52F73
                                                                                        • Part of subcall function 00B52F5C: __NMSG_WRITE.LIBCMT ref: 00B52F7A
                                                                                        • Part of subcall function 00B52F5C: RtlAllocateHeap.NTDLL(00A40000,00000000,00000001), ref: 00B52F9F
                                                                                      • std::exception::exception.LIBCMT ref: 00B53B32
                                                                                      • __CxxThrowException@8.LIBCMT ref: 00B53B47
                                                                                        • Part of subcall function 00B5450A: RaiseException.KERNEL32(?,?,00B4FB0D,?,?,?,?,?,?,?,00B4FB0D,?,00B70F68,?), ref: 00B5455F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                                      • String ID: bad allocation
                                                                                      • API String ID: 3074076210-2104205924
                                                                                      • Opcode ID: b28cdd144111ceecafcd92a3fe096499038bfde9c529c9764b119743bd7ebb00
                                                                                      • Instruction ID: 06df940667c5135d2d21d938d2884bd5c5a8efdf2ea0a2ebf414560353366793
                                                                                      • Opcode Fuzzy Hash: b28cdd144111ceecafcd92a3fe096499038bfde9c529c9764b119743bd7ebb00
                                                                                      • Instruction Fuzzy Hash: 3FE0A031501209AACF00FF50DC42BAE7BF8EB00742F0045D1FC18A5291DF709A1CC690
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B437B6
                                                                                      • __localtime64.LIBCMT ref: 00B437C1
                                                                                        • Part of subcall function 00B525B0: __gmtime64_s.LIBCMT ref: 00B525C3
                                                                                      • std::exception::exception.LIBCMT ref: 00B437D9
                                                                                        • Part of subcall function 00B52483: std::exception::_Copy_str.LIBCMT ref: 00B5249C
                                                                                        • Part of subcall function 00B4A4D6: __EH_prolog.LIBCMT ref: 00B4A4DB
                                                                                        • Part of subcall function 00B4A4D6: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 00B4A4EA
                                                                                        • Part of subcall function 00B4A4D6: __CxxThrowException@8.LIBCMT ref: 00B4A509
                                                                                      Strings
                                                                                      • could not convert calendar time to UTC time, xrefs: 00B437CE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                                      • String ID: could not convert calendar time to UTC time
                                                                                      • API String ID: 1963798777-2088861013
                                                                                      • Opcode ID: fb521b73bb65e010a55907f3d6ceb7fe30d00ab6e85fea8cc8f987045c434dd0
                                                                                      • Instruction ID: 44b632f8ea46c20cac3ff29bfdbfb44e79fca5dc638ee21b5072ed55e1a9627b
                                                                                      • Opcode Fuzzy Hash: fb521b73bb65e010a55907f3d6ceb7fe30d00ab6e85fea8cc8f987045c434dd0
                                                                                      • Instruction Fuzzy Hash: 60E06DB6C0120A9BCB10EF90D8057AEB7F8FB15304F0085D9E911A2241EBB847198A90
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(KERNEL32,00402EAA), ref: 0040319F
                                                                                      • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 004031AF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                      • API String ID: 1646373207-3105848591
                                                                                      • Opcode ID: 748c3a06171c204e9a1fd50ae91f73f3c4da2d806122e1fde3641ea021038800
                                                                                      • Instruction ID: 8ffc782c345fbc4a568335a89d7931e33654b4b0dba7f91db9b0a41dc5523864
                                                                                      • Opcode Fuzzy Hash: 748c3a06171c204e9a1fd50ae91f73f3c4da2d806122e1fde3641ea021038800
                                                                                      • Instruction Fuzzy Hash: 25C08C70381B01A6EE602FB22F09B172C0C1B48B43F1800BE7A89F81C0CE7CC208813D
                                                                                      APIs
                                                                                      • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040407A), ref: 00404C7D
                                                                                      • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040407A), ref: 00404CA1
                                                                                      • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040407A), ref: 00404CBB
                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040407A), ref: 00404D7C
                                                                                      • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040407A), ref: 00404D93
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual$FreeHeap
                                                                                      • String ID:
                                                                                      • API String ID: 714016831-0
                                                                                      • Opcode ID: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                                                      • Instruction ID: 2da35cf39901cd0166ef30884cd3fae4f1f30d489fd3d975fdb0eff0fbde1f7b
                                                                                      • Opcode Fuzzy Hash: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                                                      • Instruction Fuzzy Hash: 5531E2B15017019BE3208F28EE44B22B7A4EBC8754F11863EEA55B73E1E778AC44CB5C
                                                                                      APIs
                                                                                      • VirtualFree.KERNEL32(?,00008000,00004000,7622DFF0,?,00000000), ref: 004046D6
                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00404731
                                                                                      • HeapFree.KERNEL32(00000000,?), ref: 00404743
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$Virtual$Heap
                                                                                      • String ID: t/@
                                                                                      • API String ID: 2016334554-3363397731
                                                                                      • Opcode ID: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                                                      • Instruction ID: 8d17195ec0ccff2424cf6b57804f20dfeb37273885bc82fd82189131503ce94b
                                                                                      • Opcode Fuzzy Hash: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                                                      • Instruction Fuzzy Hash: 3EB19EB4A01205DFDB14CF44CAD0A69BBA1FB88314F25C1AEDA596F3A2D735ED41CB84
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AdjustPointer_memmove
                                                                                      • String ID:
                                                                                      • API String ID: 1721217611-0
                                                                                      • Opcode ID: c97ab1566d170f771daeb105bbfb1e209366cda2527cc4e2b89dc1b12975440a
                                                                                      • Instruction ID: 5820a28f357a41c6dec1ed86d5407c14e211b5931c71354f505865fe76271a1b
                                                                                      • Opcode Fuzzy Hash: c97ab1566d170f771daeb105bbfb1e209366cda2527cc4e2b89dc1b12975440a
                                                                                      • Instruction Fuzzy Hash: D44135356043025EEB245E68F842B7A7BF6DF64761F2404DDED46861D1EB31F988CA11
                                                                                      APIs
                                                                                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00B44149), ref: 00B5136F
                                                                                        • Part of subcall function 00B43FDC: __EH_prolog.LIBCMT ref: 00B43FE1
                                                                                        • Part of subcall function 00B43FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 00B43FF3
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B51364
                                                                                      • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,00B44149), ref: 00B513B0
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00B44149), ref: 00B51481
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandle$Event$CreateH_prolog
                                                                                      • String ID:
                                                                                      • API String ID: 2825413587-0
                                                                                      • Opcode ID: 84798d2a2f43daf2f6b88fa1c03d8e7025107ab8a9e30c6ec29c243109aa78a3
                                                                                      • Instruction ID: fbc57622d542ef90cd4bb199daf8fc8a55360e12b12a2ddef06757f383b56d52
                                                                                      • Opcode Fuzzy Hash: 84798d2a2f43daf2f6b88fa1c03d8e7025107ab8a9e30c6ec29c243109aa78a3
                                                                                      • Instruction Fuzzy Hash: DD5100B1600345ABDB11CF28C894B5A77E4FF48329F190AA8FC6997390DB35DD09CB95
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                      • String ID:
                                                                                      • API String ID: 2782032738-0
                                                                                      • Opcode ID: 535039d8e7933aaddd12432e96c3b7a4be113f1a95e655b1b9895bf12f0f7668
                                                                                      • Instruction ID: 6fa04b36ea4c717daa54193eabddc01857623df10958497c5889e0cfbb210198
                                                                                      • Opcode Fuzzy Hash: 535039d8e7933aaddd12432e96c3b7a4be113f1a95e655b1b9895bf12f0f7668
                                                                                      • Instruction Fuzzy Hash: A74184B5A006059BDF2D8E69C890B6EB7E5EF44BA2B1481FDFC1587340D670DF498B50
                                                                                      APIs
                                                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00B5FEFB
                                                                                      • __isleadbyte_l.LIBCMT ref: 00B5FF29
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 00B5FF57
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 00B5FF8D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                      • String ID:
                                                                                      • API String ID: 3058430110-0
                                                                                      • Opcode ID: 3b68f9932149fee0ea7ca10772f14eb6162cc8728385d265468438def003aff2
                                                                                      • Instruction ID: 64fcd1ed532b50d5b919fc90823579a91aef817d4dca3f6e2d8a793be6b231c0
                                                                                      • Opcode Fuzzy Hash: 3b68f9932149fee0ea7ca10772f14eb6162cc8728385d265468438def003aff2
                                                                                      • Instruction Fuzzy Hash: 6131DC31601347AFDB219F64C845BBABBE9FF42312F1540E9EC64975A0DB30D859CB90
                                                                                      APIs
                                                                                      • htons.WS2_32(?), ref: 00B43DA2
                                                                                        • Part of subcall function 00B43BD3: __EH_prolog.LIBCMT ref: 00B43BD8
                                                                                        • Part of subcall function 00B43BD3: std::bad_exception::bad_exception.LIBCMT ref: 00B43BED
                                                                                      • htonl.WS2_32(00000000), ref: 00B43DB9
                                                                                      • htonl.WS2_32(00000000), ref: 00B43DC0
                                                                                      • htons.WS2_32(?), ref: 00B43DD4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                                      • String ID:
                                                                                      • API String ID: 3882411702-0
                                                                                      • Opcode ID: d64381878b97c034d0ccf49b0699fe87360c67993531b46e079330bd6d9b33d7
                                                                                      • Instruction ID: fbe4e8f5e95887ce18dd5d5408c2dcf2ae8c0d3bc32c78ac7d8287eef2cfe7e1
                                                                                      • Opcode Fuzzy Hash: d64381878b97c034d0ccf49b0699fe87360c67993531b46e079330bd6d9b33d7
                                                                                      • Instruction Fuzzy Hash: D3118E35604309EFDF019F64D885AAAB7F8EF09714F0480A6FC09DF251DAB19E14DBA1
                                                                                      APIs
                                                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 00B423D0
                                                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 00B423DE
                                                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 00B42401
                                                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 00B42408
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                      • String ID:
                                                                                      • API String ID: 4018804020-0
                                                                                      • Opcode ID: ad69a58123dbd20601d8a41348959a992c74341bd6d1bbdb221ec1a364338976
                                                                                      • Instruction ID: 86cbafa12a5d22f2ecde27c1a8da7910882b78170be1d64b0e885e972f1aa0c1
                                                                                      • Opcode Fuzzy Hash: ad69a58123dbd20601d8a41348959a992c74341bd6d1bbdb221ec1a364338976
                                                                                      • Instruction Fuzzy Hash: 2B11C231140204AFDB109F50D984B6ABBF8FF50708F1040ADF6019B150DBB5FE01EBA0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                      • String ID:
                                                                                      • API String ID: 3016257755-0
                                                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                      • Instruction ID: 1d2302d1eb9dd4531df576eee70f17eb11816609dab50d83bb47457470335d20
                                                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                      • Instruction Fuzzy Hash: 4401403200024EBFCF126E84DC419EE3FB7BB19755B5885A5FE1959031D336C9B9AB81
                                                                                      APIs
                                                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 00B424A9
                                                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 00B424B8
                                                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 00B424CD
                                                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 00B424D4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                      • String ID:
                                                                                      • API String ID: 4018804020-0
                                                                                      • Opcode ID: 7e5adb443d7700c8f15d9cc06db2ed43c7f17fd0888fa561ae0d80434c99e737
                                                                                      • Instruction ID: 6038ce5bd2919361c1e768f1474019b736f1669e02f9f5c111e18f6f8a0e038a
                                                                                      • Opcode Fuzzy Hash: 7e5adb443d7700c8f15d9cc06db2ed43c7f17fd0888fa561ae0d80434c99e737
                                                                                      • Instruction Fuzzy Hash: 4EF01972144205AFDB00AF69EC85B9ABBACFF44715F004059FA05CB191DBB5AA508BA0
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B42009
                                                                                      • RtlDeleteCriticalSection.NTDLL(?), ref: 00B42028
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B42037
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00B4204E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                                      • String ID:
                                                                                      • API String ID: 2456309408-0
                                                                                      • Opcode ID: 381b7034ba625272309143025368b462fe12f1017015c116596366e943424acb
                                                                                      • Instruction ID: 217f01e2e4edf3fe4b9f7b03d4f31f496db4049650c13864dd12480d38b8e709
                                                                                      • Opcode Fuzzy Hash: 381b7034ba625272309143025368b462fe12f1017015c116596366e943424acb
                                                                                      • Instruction Fuzzy Hash: E701D1B14047049FC3349F54E808BA9B7F4FF04705F0046ADF44683690CFB86A48DB54
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Event$H_prologSleep
                                                                                      • String ID:
                                                                                      • API String ID: 1765829285-0
                                                                                      • Opcode ID: ea1b9fd97d37f619e81c82b281cde561f8ad85c0bcec2663580b7177742edae5
                                                                                      • Instruction ID: 2ac428fbe4da74de34990b96c45b854ab67044503df8109abc1223d4309f8072
                                                                                      • Opcode Fuzzy Hash: ea1b9fd97d37f619e81c82b281cde561f8ad85c0bcec2663580b7177742edae5
                                                                                      • Instruction Fuzzy Hash: 9AF03A36644514EFCB109FA4D8C8B88BBA4FF09311F1081A9FA1ADB2D1CB799844CB61
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog_memmove
                                                                                      • String ID: &'
                                                                                      • API String ID: 3529519853-655172784
                                                                                      • Opcode ID: 8eda71911d924345173985342953a8a4317c3abd8942527df2fcdfa87949ade8
                                                                                      • Instruction ID: a599b9dac3eccae83607b9a5d5b6c83a0b8d78f3e26bee924adc115b6bb58af8
                                                                                      • Opcode Fuzzy Hash: 8eda71911d924345173985342953a8a4317c3abd8942527df2fcdfa87949ade8
                                                                                      • Instruction Fuzzy Hash: 19619F71D00209DFCF20EFA4C981AEEBBF5EF58310F10819AE515AB281DB70AB45DB61
                                                                                      APIs
                                                                                      • GetCPInfo.KERNEL32(?,00000000), ref: 00406083
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Info
                                                                                      • String ID: $
                                                                                      • API String ID: 1807457897-3032137957
                                                                                      • Opcode ID: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                                                      • Instruction ID: 3e87ef9e1105c78bb2f85cebc7c09ea1e0cb28c4563d123519c4b9c13c46ffd4
                                                                                      • Opcode Fuzzy Hash: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                                                      • Instruction Fuzzy Hash: 0C414831004258AAEB119B54CD99BFB3FE9DB06704F1501F6D587FB1D3C23949648BAE
                                                                                      APIs
                                                                                      • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,00B48381,?,?,00000000), ref: 00B4967E
                                                                                      • getsockname.WS2_32(?,?,?), ref: 00B49694
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ErrorLastgetsockname
                                                                                      • String ID: &'
                                                                                      • API String ID: 566540725-655172784
                                                                                      • Opcode ID: b6def39255e3b0e6f7a489ed14b4ee614a9392b8931f3d80a2b2e0c06071447b
                                                                                      • Instruction ID: 22c0fd6fe2b911faa5e45cea769d0e3306f9334b8bccc8819c54ab0f21843e08
                                                                                      • Opcode Fuzzy Hash: b6def39255e3b0e6f7a489ed14b4ee614a9392b8931f3d80a2b2e0c06071447b
                                                                                      • Instruction Fuzzy Hash: 52219571A012089FDB10DF68D845ACEB7F5FF4C324F1185AAF819EB281DB34EA459B50
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4CC62
                                                                                        • Part of subcall function 00B4D23E: std::exception::exception.LIBCMT ref: 00B4D26D
                                                                                        • Part of subcall function 00B4D9F4: __EH_prolog.LIBCMT ref: 00B4D9F9
                                                                                        • Part of subcall function 00B53AFC: _malloc.LIBCMT ref: 00B53B14
                                                                                        • Part of subcall function 00B4D29D: __EH_prolog.LIBCMT ref: 00B4D2A2
                                                                                      Strings
                                                                                      • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 00B4CC98
                                                                                      • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 00B4CC9F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog$_mallocstd::exception::exception
                                                                                      • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                                      • API String ID: 1953324306-1943798000
                                                                                      • Opcode ID: 26478c12593e79d80317134e9f765659f867322629a05b9d9ea60a0422c3a6c4
                                                                                      • Instruction ID: 48ecb44de363ec4e7ce752003fd62b4aba87b586c3c9d256cab5c17ecba30e0b
                                                                                      • Opcode Fuzzy Hash: 26478c12593e79d80317134e9f765659f867322629a05b9d9ea60a0422c3a6c4
                                                                                      • Instruction Fuzzy Hash: F521BF71E012489ADB04EFE8D855AADBBF4EF55700F0440EDF815A7291DFB09B44DB90
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4CD57
                                                                                        • Part of subcall function 00B4D315: std::exception::exception.LIBCMT ref: 00B4D342
                                                                                        • Part of subcall function 00B4DB2B: __EH_prolog.LIBCMT ref: 00B4DB30
                                                                                        • Part of subcall function 00B53AFC: _malloc.LIBCMT ref: 00B53B14
                                                                                        • Part of subcall function 00B4D372: __EH_prolog.LIBCMT ref: 00B4D377
                                                                                      Strings
                                                                                      • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 00B4CD8D
                                                                                      • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 00B4CD94
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog$_mallocstd::exception::exception
                                                                                      • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                                      • API String ID: 1953324306-412195191
                                                                                      • Opcode ID: 02ba35d95dfb9b5cde03832ed714d7f23b1eac56d204dab08f43e569554f584a
                                                                                      • Instruction ID: 871da3c3560f290c52fcdc706c5c2ffb179e3961c90315702888e5bba8236e8e
                                                                                      • Opcode Fuzzy Hash: 02ba35d95dfb9b5cde03832ed714d7f23b1eac56d204dab08f43e569554f584a
                                                                                      • Instruction Fuzzy Hash: CB21A071E042149ADB04EFE4D855AADBBF4EF05700F0441ADF90AA7392CF745B44DB91
                                                                                      APIs
                                                                                      • _malloc.LIBCMT ref: 00B4535D
                                                                                        • Part of subcall function 00B52F5C: __FF_MSGBANNER.LIBCMT ref: 00B52F73
                                                                                        • Part of subcall function 00B52F5C: __NMSG_WRITE.LIBCMT ref: 00B52F7A
                                                                                        • Part of subcall function 00B52F5C: RtlAllocateHeap.NTDLL(00A40000,00000000,00000001), ref: 00B52F9F
                                                                                      • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 00B4536F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                                      • String ID: \save.dat
                                                                                      • API String ID: 4128168839-3580179773
                                                                                      • Opcode ID: 0c2ad58a9294f6048351962d909f35832aeb7bcf23bfd0274cc8d0bc31d03306
                                                                                      • Instruction ID: 96dfc2d75cbdeae1b13019253c28db1a08dce5856b23f171ea10ddd5824e5d7d
                                                                                      • Opcode Fuzzy Hash: 0c2ad58a9294f6048351962d909f35832aeb7bcf23bfd0274cc8d0bc31d03306
                                                                                      • Instruction Fuzzy Hash: D71171729056402BDB258E658C81E5FBFF7DF83790B1001E8FC8567203D6A20E06D260
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4396A
                                                                                      • std::runtime_error::runtime_error.LIBCPMT ref: 00B439C1
                                                                                        • Part of subcall function 00B41410: std::exception::exception.LIBCMT ref: 00B41428
                                                                                        • Part of subcall function 00B4A5CC: __EH_prolog.LIBCMT ref: 00B4A5D1
                                                                                        • Part of subcall function 00B4A5CC: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 00B4A5E0
                                                                                        • Part of subcall function 00B4A5CC: __CxxThrowException@8.LIBCMT ref: 00B4A5FF
                                                                                      Strings
                                                                                      • Day of month is not valid for year, xrefs: 00B439AC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                      • String ID: Day of month is not valid for year
                                                                                      • API String ID: 1404951899-1521898139
                                                                                      • Opcode ID: 8c19000a72615073a8fa9bae5b53be8740fdcdf868a865325e64fbfe31b46060
                                                                                      • Instruction ID: ebf01110fccab1e9eef2d94dd04a6a8413c40f9114fe082947bf492b54e0f857
                                                                                      • Opcode Fuzzy Hash: 8c19000a72615073a8fa9bae5b53be8740fdcdf868a865325e64fbfe31b46060
                                                                                      • Instruction Fuzzy Hash: 93018876914209AACF04EF94D5469EEB7F4FF14710F40459AFC00A3350EB744B55DB95
                                                                                      APIs
                                                                                      • std::exception::exception.LIBCMT ref: 00B4FAC5
                                                                                      • __CxxThrowException@8.LIBCMT ref: 00B4FADA
                                                                                        • Part of subcall function 00B53AFC: _malloc.LIBCMT ref: 00B53B14
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                                      • String ID: bad allocation
                                                                                      • API String ID: 4063778783-2104205924
                                                                                      • Opcode ID: c097bcaab18a75b0ce6bd921880f79204b19355248122050a1fc0511a8dde2b1
                                                                                      • Instruction ID: e01cd34dd214cca0821845dee4d2f1aed919619e6eae8dd04b1e7fc60bae1cdd
                                                                                      • Opcode Fuzzy Hash: c097bcaab18a75b0ce6bd921880f79204b19355248122050a1fc0511a8dde2b1
                                                                                      • Instruction Fuzzy Hash: C8F08270900309A69F04FAA88856AAF73ECEB04716B5005E6BA25D23C1EFB0EA089195
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B43C1B
                                                                                      • std::bad_exception::bad_exception.LIBCMT ref: 00B43C30
                                                                                        • Part of subcall function 00B52467: std::exception::exception.LIBCMT ref: 00B52471
                                                                                        • Part of subcall function 00B4A605: __EH_prolog.LIBCMT ref: 00B4A60A
                                                                                        • Part of subcall function 00B4A605: __CxxThrowException@8.LIBCMT ref: 00B4A633
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                      • String ID: bad cast
                                                                                      • API String ID: 1300498068-3145022300
                                                                                      • Opcode ID: 9789b900725ed6471ec5a16353da69161fdb62d4e4cfd9d12c0e8217fc38db49
                                                                                      • Instruction ID: eff7af5637a07f9db05dc65b137c497aeeeb8a0bbcf3ce5736787f0213105be8
                                                                                      • Opcode Fuzzy Hash: 9789b900725ed6471ec5a16353da69161fdb62d4e4cfd9d12c0e8217fc38db49
                                                                                      • Instruction Fuzzy Hash: 45F05532900604CBC708DF48D441AEAB7F4EF12311F0040EEFD05AB381CBB29A46CAD0
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B43886
                                                                                      • std::runtime_error::runtime_error.LIBCPMT ref: 00B438A5
                                                                                        • Part of subcall function 00B41410: std::exception::exception.LIBCMT ref: 00B41428
                                                                                        • Part of subcall function 00B4893A: _memmove.LIBCMT ref: 00B4895A
                                                                                      Strings
                                                                                      • Day of month value is out of range 1..31, xrefs: 00B43894
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                      • String ID: Day of month value is out of range 1..31
                                                                                      • API String ID: 3258419250-1361117730
                                                                                      • Opcode ID: eae7ae2ee4959861e38d3c40ce5db7513fa88f8243029c173fb4c4966abd81f2
                                                                                      • Instruction ID: e1ac20744359e3fbb6964a3dd66bfa6af176b403a9ae22d9bf6c1c9c4d664e35
                                                                                      • Opcode Fuzzy Hash: eae7ae2ee4959861e38d3c40ce5db7513fa88f8243029c173fb4c4966abd81f2
                                                                                      • Instruction Fuzzy Hash: 32E0D832E4051497D724AB94C912BEC77F4DB08B50F4045DAF801733C1DFB91A50D795
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B438D2
                                                                                      • std::runtime_error::runtime_error.LIBCPMT ref: 00B438F1
                                                                                        • Part of subcall function 00B41410: std::exception::exception.LIBCMT ref: 00B41428
                                                                                        • Part of subcall function 00B4893A: _memmove.LIBCMT ref: 00B4895A
                                                                                      Strings
                                                                                      • Year is out of valid range: 1400..10000, xrefs: 00B438E0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                      • String ID: Year is out of valid range: 1400..10000
                                                                                      • API String ID: 3258419250-2344417016
                                                                                      • Opcode ID: 402af5572cd9638aa362f9e32dd0d998e0e4a92f16681202638647245f7ec402
                                                                                      • Instruction ID: bfc11c187f15fbc9f3df3a5014be43acf70212ee4a3557023c8df7d0e02cec1e
                                                                                      • Opcode Fuzzy Hash: 402af5572cd9638aa362f9e32dd0d998e0e4a92f16681202638647245f7ec402
                                                                                      • Instruction Fuzzy Hash: 6CE0DF72E406149BDB24EB98C822BECB7F8DB0CB20F0045DAF801A72C1DFB91A50C795
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B4391E
                                                                                      • std::runtime_error::runtime_error.LIBCPMT ref: 00B4393D
                                                                                        • Part of subcall function 00B41410: std::exception::exception.LIBCMT ref: 00B41428
                                                                                        • Part of subcall function 00B4893A: _memmove.LIBCMT ref: 00B4895A
                                                                                      Strings
                                                                                      • Month number is out of range 1..12, xrefs: 00B4392C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                      • String ID: Month number is out of range 1..12
                                                                                      • API String ID: 3258419250-4198407886
                                                                                      • Opcode ID: 06bbc03e274e01ef799e906fb204c034e833f0f5a48699130aa975177805ac18
                                                                                      • Instruction ID: 463375a96e1ace4dc05a67d962a670b8e720438a5c4fb9f2b2eef3d0c6ea0a34
                                                                                      • Opcode Fuzzy Hash: 06bbc03e274e01ef799e906fb204c034e833f0f5a48699130aa975177805ac18
                                                                                      • Instruction Fuzzy Hash: 3EE09232E405149BD724AB948812BED77E4DB08710F0445DAE80563281DEB91A508795
                                                                                      APIs
                                                                                      • TlsAlloc.KERNEL32 ref: 00B419CC
                                                                                      • GetLastError.KERNEL32 ref: 00B419D9
                                                                                        • Part of subcall function 00B41712: __EH_prolog.LIBCMT ref: 00B41717
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocErrorH_prologLast
                                                                                      • String ID: tss
                                                                                      • API String ID: 249634027-1638339373
                                                                                      • Opcode ID: fd8353b49e35c7a53d6ee760fc97886380a2f77051ac77fbdc33bbe03c4ea4f2
                                                                                      • Instruction ID: 76527b943eb994a02211cd0442625bd177f62b98a34343d21f8e4e01bedd401d
                                                                                      • Opcode Fuzzy Hash: fd8353b49e35c7a53d6ee760fc97886380a2f77051ac77fbdc33bbe03c4ea4f2
                                                                                      • Instruction Fuzzy Hash: 77E08632D142105B83007B78EC0909BBBE49A44335F108BA6FDBA832E0EE7449449BD2
                                                                                      APIs
                                                                                      • __EH_prolog.LIBCMT ref: 00B43BD8
                                                                                      • std::bad_exception::bad_exception.LIBCMT ref: 00B43BED
                                                                                        • Part of subcall function 00B52467: std::exception::exception.LIBCMT ref: 00B52471
                                                                                        • Part of subcall function 00B4A605: __EH_prolog.LIBCMT ref: 00B4A60A
                                                                                        • Part of subcall function 00B4A605: __CxxThrowException@8.LIBCMT ref: 00B4A633
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3442121569.0000000000B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_b41000_recordpadsoundrecorder32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                      • String ID: bad cast
                                                                                      • API String ID: 1300498068-3145022300
                                                                                      • Opcode ID: 88bef0334837af587b1af51757fd34a98d6990af5122dacaf4e08fa11a4d494c
                                                                                      • Instruction ID: bf48a7057c9af89c197855b1310069af10c57c426e2ca4c20a654dca799abd21
                                                                                      • Opcode Fuzzy Hash: 88bef0334837af587b1af51757fd34a98d6990af5122dacaf4e08fa11a4d494c
                                                                                      • Instruction Fuzzy Hash: 40E01A71901108DBC714EF54D652BA8BBF4EB15701F0481EDE90657390CB795A55CA85
                                                                                      APIs
                                                                                      • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404878,?,?,?,00000100,?,00000000), ref: 00404AD8
                                                                                      • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404878,?,?,?,00000100,?,00000000), ref: 00404B0C
                                                                                      • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404878,?,?,?,00000100,?,00000000), ref: 00404B26
                                                                                      • HeapFree.KERNEL32(00000000,?,?,00000000,00404878,?,?,?,00000100,?,00000000), ref: 00404B3D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.3436759372.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000004.00000002.3436759372.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_400000_recordpadsoundrecorder32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocHeap$FreeVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 3499195154-0
                                                                                      • Opcode ID: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                                                      • Instruction ID: e332c3e7fbabb4a530177a7352d9393d0fbd82ec7ab2db7e11d44f19093e014a
                                                                                      • Opcode Fuzzy Hash: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                                                      • Instruction Fuzzy Hash: 611116B0201601DFC7219F19EE85E22BBB5FB84720711463AF292E65F0D771A845CF5C