Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1467823
MD5:619f9806ab2fad61f931922dd30ede7f
SHA1:e37a5d0abee7f33f31001dfb6352f7282fae174a
SHA256:6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 1476 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 619F9806AB2FAD61F931922DD30EDE7F)
    • chrome.exe (PID: 6844 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 1756 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 8128 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4476 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 8136 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: file.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49731 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.6:49758 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49764 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49768 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.6:49769 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49773 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49778 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FC2A2 FindFirstFileExW,0_2_000FC2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001368EE FindFirstFileW,FindClose,0_2_001368EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0013698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0012D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0012D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00139642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00139642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0013979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00139B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00139B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0012DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00135C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00135C97
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.113.103.199
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0013CE44
Source: global trafficHTTP traffic detected: GET /account HTTP/1.1Host: www.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-1296713850&timestamp=1720118100616 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=515=YobLsI1MOFaaDYrrYufgYj5r0J6p-BD456iKrsY_TLlr7TxcJuRccSbEolIdWocqVL6dWbu54RxyR5IAT_9xWUfsmQWKH1e5F3x-JLslaVIE1CBvWu0SNoZ0HiA72SFQ_G_T9rdbJlWQZhZB97MHZSDZDjWQbS1gDGbkmZCJ7To
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=a+mBd8HZOS6O9l4&MD=cuxxAeMC HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=a+mBd8HZOS6O9l4&MD=cuxxAeMC HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: file.exe, 00000000.00000003.2338978041.0000000000F54000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2341053404.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2339390207.0000000000F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account equals www.youtube.com (Youtube)
Source: chromecache_82.4.drString found in binary or memory: _.$w(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.$w(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.$w(_.ix(c))+"&hl="+_.$w(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.$w(m)+"/chromebook/termsofservice.html?languageCode="+_.$w(d)+"&regionCode="+_.$w(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded":"")+"?hl="+_.$w(d)+"&gl="+_.$w(c)+(g?"&color_scheme="+ equals www.youtube.com (Youtube)
Source: file.exe, 00000000.00000002.2343450949.0000000003882000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2338630817.000000000386C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2338404888.000000000386B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account equals www.youtube.com (Youtube)
Source: file.exe, 00000000.00000003.2334965604.00000000037D2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335182728.00000000037EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2340164444.00000000037F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account6 equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: www.youtube.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 522sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: chromecache_82.4.drString found in binary or memory: https://accounts.google.com
Source: chromecache_82.4.drString found in binary or memory: https://accounts.google.com/TOS?loc=
Source: chromecache_89.4.drString found in binary or memory: https://apis.google.com/js/api.js
Source: chromecache_82.4.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
Source: chromecache_82.4.drString found in binary or memory: https://families.google.com/intl/
Source: chromecache_82.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
Source: chromecache_82.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
Source: chromecache_82.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
Source: chromecache_82.4.drString found in binary or memory: https://g.co/recover
Source: chromecache_82.4.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: chromecache_82.4.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
Source: chromecache_82.4.drString found in binary or memory: https://play.google/intl/
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/privacy
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/privacy/additional
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/privacy/additional/embedded?gl=kr
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/privacy/google-partners
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/technologies/cookies
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/technologies/location-data
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/terms
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/terms/location/embedded
Source: chromecache_82.4.drString found in binary or memory: https://policies.google.com/terms/service-specific
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_v1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/get_family_link_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/get_family_link_dark_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_fork_who_will_use_dark_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_fork_who_will_use_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_0.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_0.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/alreadyinstalledfamilylink.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/alreadyinstalledfamilylink_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/installfamilylink.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/installfamilylink_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
Source: chromecache_82.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
Source: chromecache_82.4.drString found in binary or memory: https://support.google.com/accounts?hl=
Source: chromecache_82.4.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
Source: chromecache_82.4.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
Source: chromecache_89.4.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
Source: chromecache_82.4.drString found in binary or memory: https://www.google.com
Source: chromecache_82.4.drString found in binary or memory: https://www.google.com/intl/
Source: chromecache_82.4.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
Source: chromecache_82.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
Source: chromecache_82.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
Source: chromecache_82.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
Source: chromecache_82.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
Source: chromecache_82.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
Source: chromecache_82.4.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
Source: file.exe, 00000000.00000002.2343450949.0000000003882000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2338978041.0000000000F54000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2338630817.000000000386C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2341053404.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2338404888.000000000386B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2339717634.000000000387D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2340090144.000000000387E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2339390207.0000000000F56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account
Source: file.exe, 00000000.00000003.2334965604.00000000037D2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335182728.00000000037EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2340164444.00000000037F2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335152801.00000000037DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account6
Source: chromecache_82.4.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
Source: chromecache_82.4.drString found in binary or memory: https://youtube.com/t/terms?gl=
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49731 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.6:49758 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49764 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49768 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.6:49769 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49773 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.103.199:443 -> 192.168.2.6:49778 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0013EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0013ED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0013EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0012AA57
Source: file.exe, 00000000.00000003.2338083196.0000000000F14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _WINAPI_REGISTERRAWINPUTDEVICESmemstr_3283203f-7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00159576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00159576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_32df50eb-1
Source: file.exe, 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0eed06c5-c
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1eb1c9b6-8
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_dce97568-d
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0012D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00121201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00121201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0012E8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001320460_2_00132046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C80600_2_000C8060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001282980_2_00128298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FE4FF0_2_000FE4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000F676B0_2_000F676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001548730_2_00154873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000ECAA00_2_000ECAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000CCAF00_2_000CCAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000DCC390_2_000DCC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000F6DD90_2_000F6DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000DB1190_2_000DB119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C91C00_2_000C91C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E13940_2_000E1394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E781B0_2_000E781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C79200_2_000C7920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000D997D0_2_000D997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E7A4A0_2_000E7A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E7CA70_2_000E7CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014BE440_2_0014BE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000F9EEE0_2_000F9EEE
Source: C:\Users\user\Desktop\file.exeCode function: String function: 000C9CB3 appears 31 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 000DF9F2 appears 40 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 000E0A30 appears 46 times
Source: file.exe, 00000000.00000003.2338083196.0000000000F14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs file.exe
Source: file.exe, 00000000.00000003.2338044215.0000000000FA4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs file.exe
Source: file.exe, 00000000.00000003.2338044215.0000000000FA4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTF8 vs file.exe
Source: file.exe, 00000000.00000003.2338115921.0000000000FA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs file.exe
Source: file.exe, 00000000.00000003.2338115921.0000000000FA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTF8 vs file.exe
Source: file.exe, 00000000.00000003.2335450246.00000000036BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ents|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildUnkno++ vs file.exe
Source: file.exe, 00000000.00000003.2335450246.00000000036BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ents|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildlatfoqn vs file.exe
Source: file.exe, 00000000.00000002.2343195661.00000000036DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ents|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildUnkno++ vs file.exe
Source: file.exe, 00000000.00000002.2343195661.00000000036DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ents|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildlatfoqn vs file.exe
Source: file.exe, 00000000.00000002.2341021919.0000000000F23000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs file.exe
Source: file.exe, 00000000.00000003.2337970446.0000000000FA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs file.exe
Source: file.exe, 00000000.00000003.2337970446.0000000000FA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTF8 vs file.exe
Source: file.exe, 00000000.00000003.2338354543.0000000000F1A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs file.exe
Source: file.exe, 00000000.00000003.2335547303.00000000036CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ents|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildUnkno++ vs file.exe
Source: file.exe, 00000000.00000003.2335547303.00000000036CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ents|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildlatfoqn vs file.exe
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal76.evad.winEXE@37/30@10/6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001337B5 GetLastError,FormatMessageW,0_2_001337B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001210BF AdjustTokenPrivileges,CloseHandle,0_2_001210BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001216C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001216C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001351CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_001351CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0014A67C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0013648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_000C42A2
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeFile read: C:\Program Files\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 42%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4476 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/accountJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4476 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic file information: File size 1166336 > 1048576
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000C42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E0A76 push ecx; ret 0_2_000E0A89
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000DF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_000DF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00151C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00151C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97380
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1449Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 953Jump to behavior
Source: C:\Users\user\Desktop\file.exeAPI coverage: 4.2 %
Source: C:\Users\user\Desktop\file.exeThread sleep count: Count: 1449 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FC2A2 FindFirstFileExW,0_2_000FC2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001368EE FindFirstFileW,FindClose,0_2_001368EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0013698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0012D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0012D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00139642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00139642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0013979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00139B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00139B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0012DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00135C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00135C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000C42DE

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-97907
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013EAA2 BlockInput,0_2_0013EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000F2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000C42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E4CE8 mov eax, dword ptr fs:[00000030h]0_2_000E4CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00120B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00120B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000F2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000E083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E09D5 SetUnhandledExceptionFilter,0_2_000E09D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000E0C21
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00121201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00121201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00102BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00102BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0012B226 SendInput,keybd_event,0_2_0012B226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001422DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_001422DA
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/accountJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00120B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00120B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00121663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00121663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E0698 cpuid 0_2_000E0698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00138195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00138195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0011D27A GetUserNameW,0_2_0011D27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_000FB952
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000C42DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exe, 00000000.00000003.2338541226.0000000000FF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00141204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00141204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00141806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00141806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
31
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol31
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
2
Valid Accounts
LSA Secrets22
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
Virtualization/Sandbox Evasion
Cached Domain Credentials21
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Access Token Manipulation
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
Process Injection
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe42%ReversingLabsWin32.Trojan.AutoitInject
file.exe100%AviraTR/AutoIt.zstul
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://play.google/intl/0%URL Reputationsafe
https://families.google.com/intl/0%URL Reputationsafe
https://youtube.com/t/terms?gl=0%URL Reputationsafe
https://policies.google.com/technologies/location-data0%URL Reputationsafe
https://apis.google.com/js/api.js0%URL Reputationsafe
https://policies.google.com/privacy/google-partners0%URL Reputationsafe
https://policies.google.com/terms/service-specific0%URL Reputationsafe
https://g.co/recover0%URL Reputationsafe
https://policies.google.com/privacy/additional0%URL Reputationsafe
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
https://policies.google.com/technologies/cookies0%URL Reputationsafe
https://policies.google.com/terms0%URL Reputationsafe
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
https://policies.google.com/privacy/additional/embedded?gl=kr0%URL Reputationsafe
https://policies.google.com/terms/location/embedded0%URL Reputationsafe
https://www.youtube.com/t/terms?chromeless=1&hl=0%URL Reputationsafe
https://support.google.com/accounts?hl=0%URL Reputationsafe
https://policies.google.com/privacy0%URL Reputationsafe
https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
https://www.google.com/intl/0%Avira URL Cloudsafe
https://play.google.com/work/enroll?identifier=0%Avira URL Cloudsafe
https://www.youtube.com/account0%Avira URL Cloudsafe
https://play.google.com/log?format=json&hasfast=true&authuser=00%Avira URL Cloudsafe
https://www.google.com0%Avira URL Cloudsafe
https://play.google.com/log?format=json&hasfast=true0%Avira URL Cloudsafe
https://www.google.com/favicon.ico0%Avira URL Cloudsafe
https://www.youtube.com/account60%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
youtube-ui.l.google.com
142.250.185.206
truefalse
    unknown
    www3.l.google.com
    142.250.185.206
    truefalse
      unknown
      play.google.com
      142.250.185.238
      truefalse
        unknown
        www.google.com
        142.250.186.68
        truefalse
          unknown
          accounts.youtube.com
          unknown
          unknownfalse
            unknown
            www.youtube.com
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://play.google.com/log?format=json&hasfast=true&authuser=0false
              • Avira URL Cloud: safe
              unknown
              https://www.youtube.com/accountfalse
              • Avira URL Cloud: safe
              unknown
              https://www.google.com/favicon.icofalse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://play.google/intl/chromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://families.google.com/intl/chromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://youtube.com/t/terms?gl=chromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://policies.google.com/technologies/location-datachromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://www.google.com/intl/chromecache_82.4.drfalse
              • Avira URL Cloud: safe
              unknown
              https://apis.google.com/js/api.jschromecache_89.4.drfalse
              • URL Reputation: safe
              unknown
              https://policies.google.com/privacy/google-partnerschromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://play.google.com/work/enroll?identifier=chromecache_82.4.drfalse
              • Avira URL Cloud: safe
              unknown
              https://policies.google.com/terms/service-specificchromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://g.co/recoverchromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://policies.google.com/privacy/additionalchromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://policies.google.com/technologies/cookieschromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://policies.google.com/termschromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_89.4.drfalse
              • URL Reputation: safe
              unknown
              https://www.google.comchromecache_82.4.drfalse
              • Avira URL Cloud: safe
              unknown
              https://play.google.com/log?format=json&hasfast=truechromecache_82.4.drfalse
              • Avira URL Cloud: safe
              unknown
              https://policies.google.com/privacy/additional/embedded?gl=krchromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://policies.google.com/terms/location/embeddedchromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://support.google.com/accounts?hl=chromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://www.youtube.com/account6file.exe, 00000000.00000003.2334965604.00000000037D2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335182728.00000000037EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2340164444.00000000037F2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335152801.00000000037DF000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://policies.google.com/privacychromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://support.google.com/accounts?p=new-si-uichromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_82.4.drfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              142.250.186.68
              www.google.comUnited States
              15169GOOGLEUSfalse
              142.250.185.206
              youtube-ui.l.google.comUnited States
              15169GOOGLEUSfalse
              142.250.185.238
              play.google.comUnited States
              15169GOOGLEUSfalse
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              142.250.185.174
              unknownUnited States
              15169GOOGLEUSfalse
              IP
              192.168.2.6
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1467823
              Start date and time:2024-07-04 20:34:04 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 57s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:11
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:file.exe
              Detection:MAL
              Classification:mal76.evad.winEXE@37/30@10/6
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 97%
              • Number of executed functions: 50
              • Number of non-executed functions: 302
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 172.217.18.110, 74.125.206.84, 142.250.185.227, 34.104.35.123, 142.250.185.99, 142.250.186.138, 142.250.184.202, 142.250.185.202, 216.58.206.74, 142.250.185.234, 216.58.206.42, 142.250.181.234, 142.250.185.138, 142.250.184.234, 142.250.185.74, 216.58.212.170, 142.250.185.106, 172.217.16.138, 142.250.186.74, 142.250.185.170, 142.250.186.42, 216.58.206.35, 142.250.186.106, 172.217.18.10, 142.250.74.202, 192.229.221.95, 88.221.110.96, 142.250.186.163, 142.251.173.84, 173.222.108.226
              • Excluded domains from analysis (whitelisted): clients1.google.com, client.wns.windows.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              • VT rate limit hit for: file.exe
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              239.255.255.250https://chorbie.com/services/Get hashmaliciousUnknownBrowse
                http://79.141.36.131Get hashmaliciousUnknownBrowse
                  https://share.mindmanager.com/#publish/mnPTcUqLfLnU6HRHMb6xC3qXYGZYU6tmBtOy3sS6Get hashmaliciousHTMLPhisherBrowse
                    hANEXOPDF.PDF40 234057.msiGet hashmaliciousUnknownBrowse
                      Invoice - 06736833774062515586349558087774116555577037575401 - Daiichi-sankyo.pdfGet hashmaliciousHTMLPhisherBrowse
                        https://gateway.lighthouse.storage/ipfs/bafkreidrnkion27ep4wvaru45atnhtlbackpdwtf5j73djqjbyjdzvzmdm#mez.jiwaji@nic.bc.caGet hashmaliciousUnknownBrowse
                          http://nassascha.synology.me/Photo.scrGet hashmaliciousUnknownBrowse
                            file.exeGet hashmaliciousUnknownBrowse
                              http://circulaires.infoGet hashmaliciousUnknownBrowse
                                https://iriss.online/i/ontransfer_pathways/login?p=loginGet hashmaliciousUnknownBrowse
                                  No context
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  28a2c9bd18a11de089ef85a160da29e4https://chorbie.com/services/Get hashmaliciousUnknownBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  http://79.141.36.131Get hashmaliciousUnknownBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  hANEXOPDF.PDF40 234057.msiGet hashmaliciousUnknownBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  Invoice - 06736833774062515586349558087774116555577037575401 - Daiichi-sankyo.pdfGet hashmaliciousHTMLPhisherBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  Zz3h8cOX1E.exeGet hashmaliciousQuasarBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  Zz3h8cOX1E.exeGet hashmaliciousQuasarBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  http://circulaires.infoGet hashmaliciousUnknownBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  https://iriss.online/i/ontransfer_pathways/login?p=loginGet hashmaliciousUnknownBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  https://vi-822.pages.dev/robots.txtGet hashmaliciousHTMLPhisherBrowse
                                  • 40.68.123.157
                                  • 184.28.90.27
                                  3b5074b1b5d032e5620f69f9f700ff0eTahsilatMakbuzu.cmd.exeGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  TahsilatMakbuzu.cmd.exeGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  hANEXOPDF.PDF40 234057.msiGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  0001.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 40.113.103.199
                                  Luciana Alvarez CV.exeGet hashmaliciousAgentTeslaBrowse
                                  • 40.113.103.199
                                  Acal BFi UK - Products List 020240704.exeGet hashmaliciousAgentTesla, RedLine, StormKitty, XWormBrowse
                                  • 40.113.103.199
                                  Zz3h8cOX1E.exeGet hashmaliciousQuasarBrowse
                                  • 40.113.103.199
                                  5gO02Ijl9V.exeGet hashmaliciousGuLoaderBrowse
                                  • 40.113.103.199
                                  0NJYTCJYLo.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 40.113.103.199
                                  https://ipfs.io/ipfs/bafkreigwisqonlsn4eyx5zphwwujk5meihuzc6poy64tunmtpozna4a4cqGet hashmaliciousUnknownBrowse
                                  • 40.113.103.199
                                  No context
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:HTML document, ASCII text, with very long lines (687)
                                  Category:downloaded
                                  Size (bytes):4140
                                  Entropy (8bit):5.371702264924607
                                  Encrypted:false
                                  SSDEEP:96:GPWUbFMvF/ygbQgs8qUoaCyPj8LvUe8tOFw:SWIF1R8qUVCywzzgt
                                  MD5:7DD911B1022E2F37811F8AAEEB74862E
                                  SHA1:36F79706B7E839CFF0DE16EE9CC7B026EE5019A2
                                  SHA-256:DD48C9475C9D2B02ED29382E9DD32791D671004BB217DB0B0F6750DA3011CD66
                                  SHA-512:03996AD04C65D47A9C364C63AEBCB3F58F41CCCE4DAD70840316853BEF2967A38797744FE62BFFF418B799EC71476DC6B49CFE3053F2B9BEBE62CF5A30EA7847
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,VwDzFe,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,bm51tf,byfTOb,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,lRrMHd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,r1n9ec,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                  Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.xf(_.Joa);._.k("sOXFj");.var Wq=function(a){_.J.call(this,a.Fa)};_.B(Wq,_.J);Wq.Na=_.J.Na;Wq.Ba=_.J.Ba;Wq.prototype.aa=function(a){return a()};_.Pq(_.Ioa,Wq);._.l();._.k("oGtAuc");._.Dua=new _.Ce(_.Joa);._.l();._.k("q0xTif");.var Bva=function(a){var b=function(d){_.Wl(d)&&(_.Wl(d).Cc=null,_.ir(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},ur=function(a){_.up.call(this,a.Fa);this.Pa=this.dom=null;if(this.Ei()){var b=_.qk(this.Of(),[_.Ok,_.Nk]);b=_.vh([b[_.Ok],b[_.Nk]]).then(function(c){this.Pa=c[0];this.dom=c[1]},null,this);_.Jq(this,b)}this.Oa=a.Ih.Y8};_.B(ur,_.up);ur.Ba=function(){return{Ih:{Y8:function(){return _.nf(this)}}}};ur.prototype.getContext=function(a){return this.Oa.getContext(a)};.ur.prototype.getData=function(a){return this.Oa.getData(a)};ur.protot
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (1192)
                                  Category:downloaded
                                  Size (bytes):96558
                                  Entropy (8bit):5.542959034430961
                                  Encrypted:false
                                  SSDEEP:1536:h5K9QgDoJZFMZZMR3Du4JnSyg/FyO7D4yQFPA0tEFHvnAwDyHK:K9rYFjDu4Jnzg/AO7hWPA0tE9vGHK
                                  MD5:E020446EC64C78D8127C8E4D0C8D08DB
                                  SHA1:6447A74183CD590FAB25C008E60F838D09BF12E1
                                  SHA-256:32779135C0EC086DA69B2DC597A8620CAEE8E104E079B5A02D98A8676712577E
                                  SHA-512:08348FAF64E033574D45446D75B8DFA01EE111C0FEE508ECE2E685C7C4986B833594279BD681E5DA2A02C5FB27DF039DF7E9751BB63A115AF4D3BB0688EA7659
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=AvtSve,CMcBD,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,eVCnO,gJzDyc,hc6Ubd,inNHtf,lRrMHd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qmdT9,r1n9ec,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,qPfo0c,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ltDFwf");.var jxb=_.y("ltDFwf");var CU=function(a){_.K.call(this,a.Fa);var b=this.oa();this.xb=this.Sa("P1ekSe");this.mb=this.Sa("cQwEuf");this.da=b.getData("progressvalue").number(0);this.ja=b.getData("buffervalue").number(1);this.Ca=b.Cb("B6Vhqe");this.Oa=b.Cb("juhVM");this.wa=b.Cb("D6TUi");this.aa=b.Cb("qdulke");this.La=this.da!==0;this.Ka=this.ja!==1;this.Ga=[];this.ea=_.is(this).Vb(function(){this.Ga.length&&(this.Ga.forEach(this.g$,this),this.Ga=[]);this.La&&(this.La=!1,this.xb.rb("transform","scaleX("+this.da+")"));this.Ka&&.(this.Ka=!1,this.mb.rb("transform","scaleX("+this.ja+")"));_.er(b,"B6Vhqe",this.Ca);_.er(b,"D6TUi",this.wa);_.er(b,"juhVM",this.Oa);_.er(b,"qdulke",this.aa)}).build();this.ea();_.Fg&&_.is(this).Vb(function(){b.tb("ieri7c")}).Fe().build()();_.bA(this.oa().el(),this.Ta.bind(this))};_.B(CU,_.K);CU.Ba=_.K.Ba;.CU.prototype.Ta=function(a,b){kxb(this
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (44533)
                                  Category:downloaded
                                  Size (bytes):836241
                                  Entropy (8bit):5.751370782507753
                                  Encrypted:false
                                  SSDEEP:6144:PLTYSPd+lWTqKZF8hmDrIMmqu3+jgX0BWj4+X+bW1wp8S+lo:PLTYSF+lWTASNjGXLC9
                                  MD5:775F8A77AAE74DB7478D5EDADF67460A
                                  SHA1:740A72415AC75C2F1E08654386BC7B1B5E21BC5C
                                  SHA-256:01917BB57EA57B80D14AD3FACD6560106AA6935A26077C0AD13BF460751D8A65
                                  SHA-512:E8FFE4E59CC021EB2DC32B7050922BA61EC75A17C40245F399AE4064BBCD2029DA014E5D33D44F8447120DA2727ACC55DB6838A75563F6E7C276462907F92679
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,STuCOe,njlZCf,m9oV,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,lRrMHd,xBaz7b,F6sNGb,eVCnO,r1n9ec,LDQI"
                                  Preview:"use strict";_F_installCss(".VfPpkd-Sx9Kwc .VfPpkd-P5QLlc{background-color:#fff;background-color:var(--mdc-theme-surface,#fff)}.VfPpkd-Sx9Kwc .VfPpkd-IE5DDf,.VfPpkd-Sx9Kwc .VfPpkd-P5QLlc-GGAcbc{background-color:rgba(0,0,0,.32)}.VfPpkd-Sx9Kwc .VfPpkd-k2Wrsb{color:rgba(0,0,0,.87)}.VfPpkd-Sx9Kwc .VfPpkd-cnG4Wd{color:rgba(0,0,0,.6)}.VfPpkd-Sx9Kwc .VfPpkd-zMU9ub{color:#000;color:var(--mdc-theme-on-surface,#000)}.VfPpkd-Sx9Kwc .VfPpkd-zMU9ub .VfPpkd-Bz112c-Jh9lGc::before,.VfPpkd-Sx9Kwc .VfPpkd-zMU9ub .VfPpkd-Bz112c-Jh9lGc::after{background-color:#000;background-color:var(--mdc-ripple-color,var(--mdc-theme-on-surface,#000))}.VfPpkd-Sx9Kwc .VfPpkd-zMU9ub:hover .VfPpkd-Bz112c-Jh9lGc::before,.VfPpkd-Sx9Kwc .VfPpkd-zMU9ub.VfPpkd-ksKsZd-XxIAqe-OWXEXe-ZmdkE .VfPpkd-Bz112c-Jh9lGc::before{opacity:.04;opacity:var(--mdc-ripple-hover-opacity,.04)}.VfPpkd-Sx9Kwc .VfPpkd-zMU9ub.VfPpkd-ksKsZd-mWPk3d-OWXEXe-AHe6Kc-XpnDCe .VfPpkd-Bz112c-Jh9lGc::before,.VfPpkd-Sx9Kwc .VfPpkd-zMU9ub:not(.VfPpkd-ksKsZd-mWPk3d):
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                  Category:downloaded
                                  Size (bytes):5430
                                  Entropy (8bit):3.6534652184263736
                                  Encrypted:false
                                  SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                  MD5:F3418A443E7D841097C714D69EC4BCB8
                                  SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                  SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                  SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  URL:https://www.google.com/favicon.ico
                                  Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                  Category:downloaded
                                  Size (bytes):52280
                                  Entropy (8bit):7.995413196679271
                                  Encrypted:true
                                  SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                  MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                  SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                  SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                  SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                  Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (467)
                                  Category:downloaded
                                  Size (bytes):1884
                                  Entropy (8bit):5.280363294341128
                                  Encrypted:false
                                  SSDEEP:48:o74b7AJ0qbL3AUFQp9/j7kOXTf43Z/rm7ZbZrw:oKFSLrFw/3FXjaeZbVw
                                  MD5:6759666E5C2624986C2FBE9208D39C80
                                  SHA1:4732C0CE332CEED1414CD2A6D4BEBEFD06A59115
                                  SHA-256:C0F98E792B9160E018D61998788E81396C68FB14E058C168E538A9AD6167533F
                                  SHA-512:BCF00B74425A487A6F378FDEBAE1591E1FF6EF50B065850182ADDF239FFDBBA1882E96EF54775AB490CC4F4342337AA9E01286F85424856836082B33866FA26D
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,VwDzFe,YHI3We,YTxL4,YgOFye,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,bm51tf,byfTOb,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,lRrMHd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,r1n9ec,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.DY=function(a){_.J.call(this,a.Fa);this.window=a.Da.window.get();this.Dc=a.Da.Dc};_.B(_.DY,_.J);_.DY.Na=_.J.Na;_.DY.Ba=function(){return{Da:{window:_.Tq,Dc:_.mC}}};_.DY.prototype.wo=function(){};_.DY.prototype.addEncryptionRecoveryMethod=function(){};_.EY=function(a){return(a==null?void 0:a.Bq)||function(){}};_.FY=function(a){return(a==null?void 0:a.vda)||function(){}};_.GY=function(a){return(a==null?void 0:a.oo)||function(){}};._.IDb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.JDb=function(a){setTimeout(function(){throw a;},0)};_.DY.prototype.lK=function(){return!0};_.Pq(_.Fl,_.DY);._.l();._.k("ziXSP");.var eZ=function(a){_.DY.call(this,a.Fa)};_.B(eZ,_.DY);eZ.Na=_.DY.Na;eZ.Ba=_.DY.Ba;eZ.prototype.wo=function(a,b,c){var d;
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (4478)
                                  Category:downloaded
                                  Size (bytes):19418
                                  Entropy (8bit):5.379195390856238
                                  Encrypted:false
                                  SSDEEP:384:gJEePjmMfOH3Qm45RAGSeIMPW2NYZvnXYv3HAEfqwuhU3p9uj9QtJg:oROXQm456AYZvoPhfVIUSj9QtJg
                                  MD5:9CE9445F24BFC74018956880D606553C
                                  SHA1:ECF89E11E2091ACB1AF6735C9AF94AB19984F602
                                  SHA-256:797EF136123058C1D54A0AE365896D4E56FB3D84E83D60EF840D16BBAD8AC6BB
                                  SHA-512:7B25B6EB9B03A2118AE112AE00E774CBD9928DF69F49DA762D88255F30533CD3E6F576C82F0220FC393FA5E08544188ED210135CE17FB03B76505BF03F48A9BE
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,lRrMHd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,r1n9ec,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var HDa=_.ca.URL,IDa,JDa,LDa,KDa;try{new HDa("http://example.com"),IDa=!0}catch(a){IDa=!1}JDa=IDa;.LDa=function(a){var b=_.hh("A");try{_.Jb(b,new _.xb(a));var c=b.protocol}catch(e){throw Error("qc`"+a);}if(c===""||c===":"||c[c.length-1]!=":")throw Error("qc`"+a);if(!KDa.has(c))throw Error("qc`"+a);if(!b.hostname)throw Error("qc`"+a);var d=b.href;a={href:d,protocol:b.protocol,username:"",password:"",hostname:b.hostname,pathname:"/"+b.pathname,search:b.search,hash:b.hash,toString:function(){return d}};KDa.get(b.protocol)===b.port?(a.host=a.hostname,a.port="",a.origin=a.protocol+"//"+a.hostname):.(a.host=b.host,a.port=b.port,a.origin=a.protocol+"//"+a.hostname+":"+a.port);return a};._.MDa=function(a){if(JDa){try{var b=new HDa(a)}catch(d){throw Error("qc`"+a);}var c=KDa.get(b.protocol);if(!c)throw Error("qc`"+a);if(!b.hostname)throw Error("qc`"+a);b.origin=="null"&&(a={href:b.hre
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (777)
                                  Category:downloaded
                                  Size (bytes):1481
                                  Entropy (8bit):5.316577802144649
                                  Encrypted:false
                                  SSDEEP:24:kMYD7xmEu0IvxqcNzoYcurO/qb99nyobhzWuNA+CkadpUGbX7MNa4VGbwCSF57M8:o7xmR0I5kc7b91xbf0dpUGbYNa4VGbwl
                                  MD5:FC2DC9D5B7292B603D399F3E3046665B
                                  SHA1:92D25D672FDDD209D97ED306541CE686B6FD51CE
                                  SHA-256:614049A345B7E332826D74B79163DF74EDDE93CA1A661EE468352D4E5F94574C
                                  SHA-512:7348DBAF2A5A1FC87E3017B9E504EF22A3EBA65EC6FD255DD127DB78384B56B80A101BE9101F5BADBA4717FBE460C6A8DBE07DBA5F918413BE36EF0D88716C50
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,lRrMHd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,r1n9ec,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=bm51tf"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("kMFpHd");._.FWa=new _.Ce(_.Kk);._.l();._.k("bm51tf");.var IWa=!!(_.$f[0]>>26&1);var KWa=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ja=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=JWa(this)},LWa=function(a){var b={};_.Ma(a.xO(),function(e){b[e]=!0});var c=a.jO(),d=a.pO();return new KWa(a.dL(),c.aa()*1E3,a.NN(),d.aa()*1E3,b)},JWa=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ja,a.aa),a.Ca)},oE=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var pE=function(a){_.J.call(this,a.Fa);this.Jc=null;this.ea=a.Da.sR;this.ja=a.Da.metadata;a=a.Da.Faa;this.da=a.ea.bind(a)};_.B(pE,_.J);pE.Na=_.J.Na;pE.Ba=function(){return{Da:{sR:_.GWa,metadata:_.FWa,Faa:_.zWa}}};pE.prototype.aa=function(a,b){if(this.ja.getType(a.Hd())!=1)return _.Vk(a);var c=this.ea.aa;return(c=c?LWa(c):null)&&oE(c)?_.Aua(a,MWa(this,a,b,c)):_.Vk(a)};.var MWa=function(a,b,c,d){return c.then(function(e)
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (1694)
                                  Category:downloaded
                                  Size (bytes):30637
                                  Entropy (8bit):5.379716376439597
                                  Encrypted:false
                                  SSDEEP:768:ciVQqn5YPB1v2C82vd9BvjT4spXo6PVS+B3BWvJB6VSiV:cYYn2CzBvjT4GHPD00V
                                  MD5:1522EC1FD2855DE971E2341EA0A137BB
                                  SHA1:2E7564BBD084594968A105D2EBA5053A69F51F48
                                  SHA-256:B942FFA89D4E8337AE16D76A6D571DC0652D28D179D5B1BE9456D6967431FAEA
                                  SHA-512:5D35B151BE7A2D0D46E326A058622DF12FAE12687F0BC78C3E89CC1F65BC9043FEBE513FFAEF812BCEAB340F27EB16642545AE7AED4FAB1C820F9A76E2CC8619
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Bqa=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.An("//www.google.com/images/cleardot.gif");_.Ln(c)}this.ja=c};_.h=Bqa.prototype;_.h.Jc=null;_.h.UU=1E4;_.h.Nx=!1;_.h.fM=0;_.h.pG=null;_.h.QQ=null;_.h.setTimeout=function(a){this.UU=a};_.h.start=function(){if(this.Nx)throw Error("lb");this.Nx=!0;this.fM=0;Cqa(this)};_.h.stop=function(){Dqa(this);this.Nx=!1};.var Cqa=function(a){a.fM++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.Ik((0,_.vf)(a.dE,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.vf)(a.tda,a),a.aa.onerror=(0,_.vf)(a.sda,a),a.aa.onabort=(0,_.vf)(a.rda,a),a.pG=_.Ik(a.uda,a.UU,a),a.aa.src=String(a.ja))};_.h=Bqa.prototype;_.h.tda=function(){this.dE(!0)};_.h.sda=function(){this.dE(!1)};_.h.rda=function(){this.dE(!1)};_.h.uda=function(){this.dE(!1)};._.h.dE=function(a){Dqa(this);a?(this.Nx=!1,this.da.call(this.ea,!0)):this.fM<=0?Cqa(this):(this.Nx=!1,
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (2362)
                                  Category:downloaded
                                  Size (bytes):233234
                                  Entropy (8bit):5.4611037721061075
                                  Encrypted:false
                                  SSDEEP:3072:TSX0CBd2Buj8T4HvzoHfKxTadov0roCsu29d4XB:TA0CBd2BhT4EHS8rYEXB
                                  MD5:C1544473B310EC2623BC2BCABC3945D2
                                  SHA1:0CACCE70EAF08EEB64B2D96FD8D3EF09D97ABEFB
                                  SHA-256:D2DD3595FA23A5565F0E2D4BD6E4B36ACE3987FD2C942DF3C298A010FD84B92D
                                  SHA-512:CA6EA5ED5ADB531D0A9B7AF5A7F547AC7481063039591ECB3225EC68082DB3AE78B80D6118A225013638AAA24DA789D551ABBE03418F695219FEDF66A533D48E
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlEyIpqkGROwjeIZ9SCPrKCNVnFaYg/m=_b,_tp"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x818601e, 0x51cf74, 0x739cf10, 0xa500f8, 0x321, 0x0, 0x19680000, 0xcc80, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/.var baa,eaa,haa,laa,Va,Xa,Ya,maa,naa,Za,oaa,paa,qaa,db,vaa,yaa,vb,wb,zb,Iaa,Kaa,Oaa,Wb,Xb,Qaa,Raa,Waa,dba,eba,iba,lba,fba,kba,jba,hba,gba,mba,pc,rba,sba,pba,tba,xba,yba,zba,Dba,Eba,Fba,Gba,Hba,Kba,Xc,Nba,Mba,Pba,ad,Zc,Rba,Qba,Uba,Tba,dd,Xba,Yba,aca,bca,nd,dca,eca,Ed,md,rd,rca,oca,sca,tca,wca,yca,zca,mca,Lca,he,Nca,ie,Oca,Qca,Sca,Wca,Xca,Yca,Zca,bda,dda,kda,lda,mda,qda,zda,vda,Cda,$e,Fda,Gda,Hda,Kda,Mda,Pda,Qda,Rda,Sda,Tda,Wda,Xda,Yda,dea,fea,gea,hea
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (574)
                                  Category:downloaded
                                  Size (bytes):3477
                                  Entropy (8bit):5.499342889552936
                                  Encrypted:false
                                  SSDEEP:96:oIByrBKfKVHcikUJFtlPMETAKv78pUCCjIw:INKS/vP3hv7mUbZ
                                  MD5:E18219F32F2747C14548BCFEE58B13CD
                                  SHA1:85307A7D3376A623245EB21D245B8BC4FA481908
                                  SHA-256:6479CFCD0C8840DD31DA0C55F596BDA37C28074517B5F063F5A5830EC27D0280
                                  SHA-512:EFE83897B3C1EE154EA3C14B3FFB4C242C065303F3F5A3DFA3E6E26C154B44509FE8E580D2402553CCDFABACEDD3F000FAC9171E861BBF22E6D56C5A6355CF47
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,VwDzFe,YHI3We,YTxL4,YgOFye,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,bm51tf,byfTOb,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,lRrMHd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,r1n9ec,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var jua=function(){var a=_.ge();return _.Bi(a,1)};var wq=function(a){this.Ea=_.t(a,0,wq.messageId)};_.B(wq,_.v);wq.prototype.Ha=function(){return _.ti(this,1)};wq.prototype.Za=function(a){return _.Ki(this,1,a)};wq.messageId="f.bo";var xq=function(){_.Fk.call(this)};_.B(xq,_.Fk);xq.prototype.Yc=function(){this.BP=!1;kua(this);_.Fk.prototype.Yc.call(this)};xq.prototype.aa=function(){lua(this);if(this.nA)return mua(this),!1;if(!this.xR)return yq(this),!0;this.dispatchEvent("p");if(!this.hL)return yq(this),!0;this.fJ?(this.dispatchEvent("r"),yq(this)):mua(this);return!1};.var nua=function(a){var b=new _.An(a.J0);a.iM!=null&&_.Ml(b,"authuser",a.iM);return b},mua=function(a){a.nA=!0;var b=nua(a),c="rt=r&f_uid="+_.Sg(a.hL);_.jl(b,(0,_.vf)(a.ea,a),"POST",c)};.xq.prototype.ea=function(a){a=a.target;lua(this);if(_.ml(a)){this.hH=0;if(this.fJ)this.nA=!1,this.dispatchEvent
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (693)
                                  Category:downloaded
                                  Size (bytes):3143
                                  Entropy (8bit):5.37079395351489
                                  Encrypted:false
                                  SSDEEP:48:o7gbuQLkZHPLbrzOw3KP757NQ8jsKyYqb6f4np/EkGuf/x06IZ2rw:orQGXJaT57OMNwp/kufJRgqw
                                  MD5:DB38B407EAF251C03254DA070DF97E29
                                  SHA1:440A9FE061A55A3C2E20FC8D5421CB89B691C4D5
                                  SHA-256:7071B6E12C5D15142A9D5EF16103678A3038B6D8FFDCDCE248C9E26B9D4D0E81
                                  SHA-512:B99B5DDA32BACF2C79CB23FFD9EC624AD678243C6DBEC19409C298C09486E8F38F31AD658A23BC9D5E249E7D906BA66C303EA3B84F63FD6B053CF588B718F377
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,lRrMHd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,r1n9ec,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gw=function(a){_.J.call(this,a.Fa)};_.B(gw,_.J);gw.Na=_.J.Na;gw.Ba=_.J.Ba;gw.prototype.aO=function(a){return _.qe(this,{ab:{hP:_.zj}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.sh(function(e){window._wjdc=function(f){d(f);e(EFa(f,b,a))}}):EFa(c,b,a)})};var EFa=function(a,b,c){return(a=a&&a[c])?a:b.ab.hP.aO(c)};.gw.prototype.aa=function(a,b){var c=_.Vta(b).Fi;if(c.startsWith("$")){var d=_.Zl.get(a);_.$p[b]&&(d||(d={},_.Zl.set(a,d)),d[c]=_.$p[b],delete _.$p[b],_.aq--);if(d)if(a=d[c])b=_.pe(a);else throw Error("Xb`"+b);else b=null}else b=null;return b};_.Pq(_.mea,gw);._.l();._.k("SNUn3");._.DFa=new _.Ce(_.yf);._.l();._.k("RMhBfe");.var FFa=function(a,b){a=_.msa(a,b);return a.length==0?null:a[0].ctor},GFa=function(){return Object.values(_.Yo).reduce(function(a,b){return a+Object.keys(b).length},0)},HFa=function(){return Object.entries
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (777)
                                  Category:downloaded
                                  Size (bytes):7624
                                  Entropy (8bit):5.356859202879639
                                  Encrypted:false
                                  SSDEEP:192:mnwTgK8AwrKbbW8UFBlkU+/IrlQFsq1o98fYlp2PDYGym4nV9U:9ZwrKbaV/38xW8jn
                                  MD5:23ED78C00699D0EF97404A3901525DD3
                                  SHA1:09125039F07B8B3DE33761BFEBB4E0754AEA6738
                                  SHA-256:B21A2E0BD7B733D42DB2FBC676E0710D00CF95491967ED46C8A204605DBFDA29
                                  SHA-512:22AE4F4142F19399EE8C5ACF4EED70F9D91C41E3BB138522F340684CBA2C4E1FFF5233950DC9328861F79970ACABE2F5A28B396392AA72AD1A92429D61425D67
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,VwDzFe,YHI3We,YTxL4,YgOFye,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,bm51tf,byfTOb,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,lRrMHd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,r1n9ec,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.ENa=_.y("wg1P6b",[_.Nx,_.Hl,_.Ol]);._.k("wg1P6b");.var K2a=function(a,b){b=b||_.Ha;for(var c=0,d=a.length,e;c<d;){var f=c+(d-c>>>1);var g=b(0,a[f]);g>0?c=f+1:(d=f,e=!g)}return e?c:-c-1},L2a=function(a,b){for(;b=b.previousSibling;)if(b==a)return-1;return 1},M2a=function(a,b){var c=a.parentNode;if(c==b)return-1;for(;b.parentNode!=c;)b=b.parentNode;return L2a(b,a)},N2a=function(a,b){if(a==b)return 0;if(a.compareDocumentPosition)return a.compareDocumentPosition(b)&2?1:-1;if("sourceIndex"in a||a.parentNode&&"sourceIndex"in a.parentNode){var c=a.nodeType==.1,d=b.nodeType==1;if(c&&d)return a.sourceIndex-b.sourceIndex;var e=a.parentNode,f=b.parentNode;return e==f?L2a(a,b):!c&&_.lh(e,b)?-1*M2a(a,b):!d&&_.lh(f,a)?M2a(b,a):(c?a.sourceIndex:e.sourceIndex)-(d?b.sourceIndex:f.sourceIndex)}d=_.ah(a);c=d.createRange();c.selectNode(a);c.collapse(!0);a=d.createRange();a.selectNode(b);a.colla
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:downloaded
                                  Size (bytes):44
                                  Entropy (8bit):4.453416561671607
                                  Encrypted:false
                                  SSDEEP:3:8VKJmQcwVbF7KnZ:BJmjwVbF7KZ
                                  MD5:491DC96011445194971CFAE6A7A0B191
                                  SHA1:74BD675A8CBC8AF507C0EB5509727EA3F9B85060
                                  SHA-256:C3BA6FCBB38A83C87009DEE4BAB93A9B3274553128D77E5B2C04077ECD35C1D3
                                  SHA-512:38356EF67B6B704F2129828299E516B04B29EA1EEB25CF356E22E3AFEC7A875E2187F70E9E7CF0467DEFA14F11D802ACF00D69B2B13EFEA025942E21383AC35E
                                  Malicious:false
                                  URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzQSHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                  Preview:Ch8KBw0ZARP6GgAKCw3oIX6GGgQISxgCCgcN05ioBxoA
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (405)
                                  Category:downloaded
                                  Size (bytes):1600
                                  Entropy (8bit):5.234706685474562
                                  Encrypted:false
                                  SSDEEP:48:o79bWW+d1xb0KeRV8YtQy0aqdHgxbaQ77DfTBpbrw:oAB6KOVddbqSnLzw
                                  MD5:777F1FD23230384A286E78C5ACD6AC33
                                  SHA1:CC33BAC75FDD7CE9AD535CBCEAD5C91D974DF975
                                  SHA-256:277C957E852CD541B5D6D50B9A1CC3E6E6120DC704B529AADDA0171367557D98
                                  SHA-512:F785634C17C38826894B2D0D4363C26110418A9160AB36ACDFF2E6B76A2E07D32DD1BDA3D2D0F4D9BE3254DB834EB808FEA392A95B224AB5B94B429E69EBD1F0
                                  Malicious:false
                                  URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.ZU1EFvXsC20.es5.O/ck=boq-identity.AccountsSignInUi.DDD9SPcAL2k.L.B1.O/am=HmAYCN1zFADxnHPgA5QCIQMAAAAAAAAAgJYBMgM/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EN3i8d,F6sNGb,Fndnac,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,bm51tf,byfTOb,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,lRrMHd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,r1n9ec,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlEXqJoaGwEo5TjSaLcvO8AROXJTtw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:F6sNGb;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;UpnZUd:nnwwYc;XdiAjb:NLiXbe;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;eBAeSb:zbML3c;iFQyKf:vfuNJf;io8t5d:yDVVkb;kMFpHd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qddgKe:xQtZb;sP4Vbe:VwDzFe;uY49fb:COQbmf;ul9GGd:VDovNc;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,VwDzFe,A7fCU"
                                  Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.xf(_.mja);_.ew=function(a){_.J.call(this,a.Fa);this.aa=a.ab.cache};_.B(_.ew,_.J);_.ew.Na=_.J.Na;_.ew.Ba=function(){return{ab:{cache:_.mp}}};_.ew.prototype.execute=function(a){_.kb(a,function(b){var c;_.oe(b)&&(c=b.eb.Qb(b.jb));c&&this.aa.FD(c)},this);return{}};_.Pq(_.Hja,_.ew);._.l();._.k("VwDzFe");.var IE=function(a){_.J.call(this,a.Fa);this.aa=a.Da.Pj;this.ea=a.Da.metadata;this.da=a.Da.Zq};_.B(IE,_.J);IE.Na=_.J.Na;IE.Ba=function(){return{Da:{Pj:_.iE,metadata:_.FWa,Zq:_.fE}}};IE.prototype.execute=function(a){var b=this;a=this.da.create(a);return _.kb(a,function(c){var d=b.ea.getType(c.Hd())===2?b.aa.Vb(c):b.aa.aa(c);return _.Lj(c,_.jE)?d.then(function(e){return _.gd(e)}):d},this)};_.Pq(_.Mja,IE);._.l();._.k("sP4Vbe");._.EWa=new _.Ce(_.Ija);._.l();._.k("A7fCU");.var nE=function(a){_.J.call(this,a.Fa);this.aa=a.Da.lM};_.B(nE,_.J);nE.Na=_.J.Na;nE.Ba=function(){r
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.035563548290413
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:file.exe
                                  File size:1'166'336 bytes
                                  MD5:619f9806ab2fad61f931922dd30ede7f
                                  SHA1:e37a5d0abee7f33f31001dfb6352f7282fae174a
                                  SHA256:6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac
                                  SHA512:3b6df4cd430ac31e10a4d957a995073bfe582fd3965d69a108d62d0d6429a26083e533fc954e734b1c1e16450ea258e86bec6923a24373ab842f231600ff6935
                                  SSDEEP:24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8au/2+b+HdiJUX:gTvC/MTQYxsWR7au/2+b+HoJU
                                  TLSH:C545BF027391C062FF9B92734F5AF6115BBC69260123E61F13981DBABE701B1563E7A3
                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                  Icon Hash:aaf3e3e3938382a0
                                  Entrypoint:0x420577
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x6686DEC1 [Thu Jul 4 17:41:21 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:1
                                  File Version Major:5
                                  File Version Minor:1
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:1
                                  Import Hash:948cc502fe9226992dce9417f952fce3
                                  Instruction
                                  call 00007F98405004A3h
                                  jmp 00007F98404FFDAFh
                                  push ebp
                                  mov ebp, esp
                                  push esi
                                  push dword ptr [ebp+08h]
                                  mov esi, ecx
                                  call 00007F98404FFF8Dh
                                  mov dword ptr [esi], 0049FDF0h
                                  mov eax, esi
                                  pop esi
                                  pop ebp
                                  retn 0004h
                                  and dword ptr [ecx+04h], 00000000h
                                  mov eax, ecx
                                  and dword ptr [ecx+08h], 00000000h
                                  mov dword ptr [ecx+04h], 0049FDF8h
                                  mov dword ptr [ecx], 0049FDF0h
                                  ret
                                  push ebp
                                  mov ebp, esp
                                  push esi
                                  push dword ptr [ebp+08h]
                                  mov esi, ecx
                                  call 00007F98404FFF5Ah
                                  mov dword ptr [esi], 0049FE0Ch
                                  mov eax, esi
                                  pop esi
                                  pop ebp
                                  retn 0004h
                                  and dword ptr [ecx+04h], 00000000h
                                  mov eax, ecx
                                  and dword ptr [ecx+08h], 00000000h
                                  mov dword ptr [ecx+04h], 0049FE14h
                                  mov dword ptr [ecx], 0049FE0Ch
                                  ret
                                  push ebp
                                  mov ebp, esp
                                  push esi
                                  mov esi, ecx
                                  lea eax, dword ptr [esi+04h]
                                  mov dword ptr [esi], 0049FDD0h
                                  and dword ptr [eax], 00000000h
                                  and dword ptr [eax+04h], 00000000h
                                  push eax
                                  mov eax, dword ptr [ebp+08h]
                                  add eax, 04h
                                  push eax
                                  call 00007F9840502B4Dh
                                  pop ecx
                                  pop ecx
                                  mov eax, esi
                                  pop esi
                                  pop ebp
                                  retn 0004h
                                  lea eax, dword ptr [ecx+04h]
                                  mov dword ptr [ecx], 0049FDD0h
                                  push eax
                                  call 00007F9840502B98h
                                  pop ecx
                                  ret
                                  push ebp
                                  mov ebp, esp
                                  push esi
                                  mov esi, ecx
                                  lea eax, dword ptr [esi+04h]
                                  mov dword ptr [esi], 0049FDD0h
                                  push eax
                                  call 00007F9840502B81h
                                  test byte ptr [ebp+08h], 00000001h
                                  pop ecx
                                  Programming Language:
                                  • [ C ] VS2008 SP1 build 30729
                                  • [IMP] VS2008 SP1 build 30729
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x4617c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x11b0000x7594.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0xd40000x4617c0x46200c2c7827c7524ac47cc17f50b3295d9d2False0.9065877061051694data7.844090278150599IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x11b0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                  RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                  RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                  RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                  RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                  RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                  RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                  RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                  RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                  RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                  RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                  RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                  RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                  RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                  RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                  RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                  RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                  RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                  RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                  RT_RCDATA0xdc7b80x3d444data1.0003427004797807
                                  RT_GROUP_ICON0x119bfc0x76dataEnglishGreat Britain0.6610169491525424
                                  RT_GROUP_ICON0x119c740x14dataEnglishGreat Britain1.25
                                  RT_GROUP_ICON0x119c880x14dataEnglishGreat Britain1.15
                                  RT_GROUP_ICON0x119c9c0x14dataEnglishGreat Britain1.25
                                  RT_VERSION0x119cb00xdcdataEnglishGreat Britain0.6181818181818182
                                  RT_MANIFEST0x119d8c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                  DLLImport
                                  WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                  VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                  MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                  WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                  PSAPI.DLLGetProcessMemoryInfo
                                  IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                  USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                  UxTheme.dllIsThemeActive
                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                  USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                  GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                  SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                  OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishGreat Britain
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 4, 2024 20:34:49.834351063 CEST49674443192.168.2.6173.222.162.64
                                  Jul 4, 2024 20:34:49.834351063 CEST49673443192.168.2.6173.222.162.64
                                  Jul 4, 2024 20:34:50.162570953 CEST49672443192.168.2.6173.222.162.64
                                  Jul 4, 2024 20:34:53.465082884 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:53.465096951 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:53.465142012 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:53.467050076 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:53.467066050 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.148607969 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.148906946 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.148921013 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.149254084 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.149327040 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.149844885 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.149905920 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.150860071 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.150918961 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.151046038 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.151062012 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.200023890 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.472429991 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.472451925 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.472527027 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.472548962 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.472697973 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.473058939 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.476346970 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.476346970 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:54.476370096 CEST44349713142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:34:54.476871967 CEST49713443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:34:57.341916084 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:34:57.341934919 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:34:57.342000961 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:34:57.342216969 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:34:57.342227936 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:34:57.991724014 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:57.991749048 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:57.991817951 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:57.993483067 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:57.993494034 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.005970955 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:34:58.006401062 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:34:58.006408930 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:34:58.007394075 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:34:58.007453918 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:34:58.008380890 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:34:58.008435965 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:34:58.054126024 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:34:58.054131985 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:34:58.103091955 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:34:58.670813084 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.671008110 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.674293041 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.674299955 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.674534082 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.712954044 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.756515026 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.948301077 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.948350906 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.948400021 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.948498011 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.948510885 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.948522091 CEST49724443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.948529005 CEST44349724184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.990547895 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.990653992 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:58.990760088 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.991106987 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:58.991143942 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.080302954 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:34:59.080329895 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:34:59.080379963 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:34:59.080924988 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:34:59.080939054 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:34:59.443030119 CEST49674443192.168.2.6173.222.162.64
                                  Jul 4, 2024 20:34:59.443030119 CEST49673443192.168.2.6173.222.162.64
                                  Jul 4, 2024 20:34:59.642990112 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.643079996 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:59.645386934 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:59.645397902 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.645648003 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.646744013 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:59.692488909 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.771313906 CEST49672443192.168.2.6173.222.162.64
                                  Jul 4, 2024 20:34:59.892556906 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:34:59.892627001 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:34:59.897423983 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:34:59.897449970 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:34:59.897687912 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:34:59.900713921 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:34:59.900803089 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:34:59.900813103 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:34:59.900904894 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:34:59.930063963 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.930129051 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.931308031 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:59.931344032 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:59.931365013 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.931395054 CEST49730443192.168.2.6184.28.90.27
                                  Jul 4, 2024 20:34:59.931401968 CEST44349730184.28.90.27192.168.2.6
                                  Jul 4, 2024 20:34:59.948513985 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:00.085235119 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:00.085639000 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:00.086726904 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:00.097992897 CEST49731443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:00.098014116 CEST4434973140.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:01.279266119 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:01.279299021 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:01.279424906 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:01.279874086 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:01.279886007 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:01.489970922 CEST44349705173.222.162.64192.168.2.6
                                  Jul 4, 2024 20:35:01.490058899 CEST49705443192.168.2.6173.222.162.64
                                  Jul 4, 2024 20:35:01.933110952 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:01.933530092 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:01.933547974 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:01.933895111 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:01.933985949 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:01.934503078 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:01.934551001 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:01.943705082 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:01.943769932 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:01.944058895 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:01.944073915 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:01.990325928 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.249540091 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.249582052 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.249667883 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.249681950 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.249733925 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.249802113 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.249850035 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.255326033 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.255423069 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.261492014 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.261524916 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.261583090 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.261590004 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.261657000 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.269727945 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.269798040 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.273407936 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.273495913 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.273530006 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.273535967 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.273578882 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.342746019 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.342787981 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.342809916 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.342832088 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.342931986 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.343120098 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.343128920 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.344582081 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.344618082 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.344645023 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.344650984 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.344670057 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.350312948 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.350750923 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.350756884 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.356374979 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.356400013 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.356502056 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.356507063 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.356580973 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.362276077 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.368706942 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.368745089 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.368820906 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.368828058 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.368969917 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.368974924 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.368993044 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.369118929 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.601649046 CEST49739443192.168.2.6142.250.185.206
                                  Jul 4, 2024 20:35:02.601664066 CEST44349739142.250.185.206192.168.2.6
                                  Jul 4, 2024 20:35:02.649183989 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:02.649218082 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:02.649333954 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:02.649774075 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:02.649786949 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:02.701739073 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:02.701775074 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:02.701844931 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:02.702394962 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:02.702411890 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.350214005 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.350666046 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.350675106 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.351027966 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.351090908 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.351723909 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.351777077 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.352722883 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.352781057 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.353053093 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.353059053 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.394092083 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.394359112 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.394371033 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.394684076 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.394745111 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.395298004 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.395380020 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.396112919 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.396164894 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.396449089 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.396454096 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.397032976 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.443464994 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.630973101 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.631108999 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.631165028 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.632637978 CEST49744443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.632652044 CEST44349744142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.633924961 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.633949041 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.634032965 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.634529114 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.634546041 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.675834894 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.675899029 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.675976038 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.678620100 CEST49743443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.678630114 CEST44349743142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.679769993 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.679785967 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:03.679869890 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.680866003 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:03.680876017 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.308753967 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.315104008 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.315138102 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.315692902 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.315761089 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.316380024 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.316437006 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.316590071 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.316651106 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.316838026 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.316849947 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.316868067 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.340585947 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.340794086 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.340805054 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.341167927 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.341222048 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.341881990 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.341938972 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.342173100 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.342238903 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.342403889 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.342417002 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.342433929 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.364501953 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.365262032 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.388500929 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.396573067 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.532821894 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.532957077 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.533036947 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.533998966 CEST49749443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.534020901 CEST44349749142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.536468029 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.536850929 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.536911011 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.537818909 CEST49750443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:04.537836075 CEST44349750142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:04.630651951 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:04.672503948 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.904772043 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.904808998 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.904836893 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.904849052 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:04.904860020 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.904870033 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.904921055 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:04.904937029 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.904977083 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:04.905033112 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.905071974 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:04.905111074 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:04.906713963 CEST49721443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:04.906724930 CEST44349721142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:07.174556971 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:07.174571991 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:07.174662113 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:07.175450087 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:07.175460100 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:07.972490072 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:07.972735882 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:07.974977016 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:07.974989891 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:07.975193977 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:07.977201939 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:07.977258921 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:07.977262974 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:07.977417946 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:08.020507097 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:08.151561975 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:08.151904106 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:08.151966095 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:08.152589083 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:08.152610064 CEST4434975640.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:08.152625084 CEST49756443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:09.999947071 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:10.000005007 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:10.000087976 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:10.001221895 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:10.001239061 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:10.367719889 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:10.367772102 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:10.367837906 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:10.368302107 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:10.368340015 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:10.831104040 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:10.831191063 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:10.835541964 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:10.835570097 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:10.835782051 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:10.879565001 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:10.902615070 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:10.948504925 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.043445110 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:11.045222044 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:11.045264006 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:11.045594931 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:11.049120903 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:11.049184084 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:11.049338102 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:11.049355030 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:11.049366951 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:11.177021027 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.177041054 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.177047968 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.177056074 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.177078962 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.177156925 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:11.177208900 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.177253962 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:11.178396940 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.178468943 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.178514957 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:11.178540945 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:11.200525045 CEST49758443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:11.200567961 CEST4434975840.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:11.357909918 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:11.358077049 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:11.358141899 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:11.358839989 CEST49759443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:11.358860970 CEST44349759142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:19.496682882 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:19.496745110 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:19.496834993 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:19.497426033 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:19.497446060 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:20.306452990 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:20.306528091 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:20.313566923 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:20.313621044 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:20.313853979 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:20.316647053 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:20.316761971 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:20.316771030 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:20.316935062 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:20.364510059 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:20.507817030 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:20.508001089 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:20.508066893 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:20.508203030 CEST49764443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:20.508227110 CEST4434976440.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:33.008377075 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.008435011 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.008514881 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.008853912 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.008869886 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.648406029 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.648468018 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.648550987 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.648839951 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.648854017 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.691818953 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.692672014 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.692730904 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.693068027 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.695457935 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.695508957 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.695576906 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.695867062 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.695926905 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.696156979 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.696171999 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.696448088 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.696470022 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.696486950 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.979104042 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.979223013 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:33.979293108 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.979749918 CEST49765443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:33.979772091 CEST44349765142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.343453884 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.343847990 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.343887091 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.344253063 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.344839096 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.344914913 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.345340014 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.345362902 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.345412970 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.349263906 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.349756002 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.349781036 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.350102901 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.350171089 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.350709915 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.350766897 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.351078987 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.351135015 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.351346016 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.351353884 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.351371050 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.392498016 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.395457983 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.544306993 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.544444084 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.544492006 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.545372009 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.545490980 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.545531034 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.559844971 CEST49767443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.559880972 CEST44349767142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:34.561125994 CEST49766443192.168.2.6142.250.185.238
                                  Jul 4, 2024 20:35:34.561146975 CEST44349766142.250.185.238192.168.2.6
                                  Jul 4, 2024 20:35:38.624353886 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:38.624399900 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:38.624474049 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:38.625224113 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:38.625238895 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.425875902 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.425940037 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:39.428442955 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:39.428467035 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.428679943 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.430851936 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:39.430936098 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:39.430939913 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.431116104 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:39.472489119 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.607716084 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.608153105 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.608201027 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:39.608464956 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:39.608495951 CEST4434976840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:35:39.608514071 CEST49768443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:35:47.758979082 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:47.759021997 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:47.759130001 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:47.759479046 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:47.759495020 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.632366896 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.632561922 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.634157896 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.634169102 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.634371996 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.643074989 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.688504934 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.985445976 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.985467911 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.985510111 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.985745907 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.985769987 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.985836983 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.986666918 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.986707926 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.986732006 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.986737967 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.986767054 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.987036943 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.987080097 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.991499901 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.991512060 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:48.991520882 CEST49769443192.168.2.640.68.123.157
                                  Jul 4, 2024 20:35:48.991524935 CEST4434976940.68.123.157192.168.2.6
                                  Jul 4, 2024 20:35:57.396732092 CEST49771443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:57.396753073 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:57.396878958 CEST49771443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:57.397089005 CEST49771443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:57.397099972 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:58.077616930 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:58.077977896 CEST49771443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:58.077986002 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:58.078315020 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:58.078658104 CEST49771443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:35:58.078708887 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:35:58.129693985 CEST49771443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:36:03.575171947 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:03.575282097 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:03.575366974 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:03.575994968 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:03.576033115 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.477679968 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.477766037 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:04.480664968 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:04.480678082 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.480884075 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.482877016 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:04.482935905 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:04.482942104 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.483103991 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:04.528527021 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.659440041 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.659517050 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.659634113 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:04.659969091 CEST49773443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:04.660020113 CEST4434977340.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:04.955043077 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:04.955084085 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:04.955140114 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:04.955380917 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:04.955395937 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.571984053 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.572012901 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.572102070 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.572484970 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.572494984 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.633405924 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.633934021 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.633974075 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.634350061 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.634741068 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.634804010 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.635298014 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.635324955 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.635329962 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.834383011 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.834749937 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:05.834835052 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.834965944 CEST49774443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:05.834985018 CEST44349774142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:06.219459057 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:06.219789028 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:06.219799995 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:06.220130920 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:06.220443964 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:06.220505953 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:06.220599890 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:06.220599890 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:06.220628023 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:06.415251017 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:06.415386915 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:06.415484905 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:06.415893078 CEST49775443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:06.415906906 CEST44349775142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:07.984555006 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:36:07.984620094 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:36:07.984699011 CEST49771443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:36:21.412820101 CEST49771443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:36:21.412837029 CEST44349771142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:36:29.560549021 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:29.560609102 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:29.560698986 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:29.561295986 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:29.561317921 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:29.755140066 CEST4970480192.168.2.6199.232.210.172
                                  Jul 4, 2024 20:36:29.762376070 CEST8049704199.232.210.172192.168.2.6
                                  Jul 4, 2024 20:36:29.762423992 CEST4970480192.168.2.6199.232.210.172
                                  Jul 4, 2024 20:36:30.361021996 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:30.361136913 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:30.365293980 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:30.365304947 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:30.365549088 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:30.367507935 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:30.367573023 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:30.367580891 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:30.367750883 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:30.408507109 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:30.541538954 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:30.541631937 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:30.541692019 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:30.541815042 CEST49778443192.168.2.640.113.103.199
                                  Jul 4, 2024 20:36:30.541832924 CEST4434977840.113.103.199192.168.2.6
                                  Jul 4, 2024 20:36:37.617432117 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:37.617470026 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:37.617563009 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:37.618201017 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:37.618218899 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:38.265189886 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:38.265703917 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:38.265733957 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:38.266047001 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:38.266355991 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:38.266415119 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:38.266525030 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:38.266546965 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:38.266557932 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:38.545324087 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:38.545416117 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:38.545465946 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:38.545882940 CEST49779443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:38.545912981 CEST44349779142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:39.445370913 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:39.445400953 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:39.445491076 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:39.446119070 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:39.446130037 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:40.090966940 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:40.091316938 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:40.091327906 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:40.091639996 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:40.091995001 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:40.092047930 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:40.092289925 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:40.092302084 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:40.092312098 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:40.290115118 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:40.290255070 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:40.290318012 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:40.290947914 CEST49780443192.168.2.6142.250.185.174
                                  Jul 4, 2024 20:36:40.290956974 CEST44349780142.250.185.174192.168.2.6
                                  Jul 4, 2024 20:36:57.459374905 CEST49781443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:36:57.459414005 CEST44349781142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:36:57.459578037 CEST49781443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:36:57.459839106 CEST49781443192.168.2.6142.250.186.68
                                  Jul 4, 2024 20:36:57.459851980 CEST44349781142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:36:58.135533094 CEST44349781142.250.186.68192.168.2.6
                                  Jul 4, 2024 20:36:58.176286936 CEST49781443192.168.2.6142.250.186.68
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 4, 2024 20:34:53.425580978 CEST6545253192.168.2.61.1.1.1
                                  Jul 4, 2024 20:34:53.427036047 CEST6022053192.168.2.61.1.1.1
                                  Jul 4, 2024 20:34:53.439368010 CEST53654521.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:53.442979097 CEST53602201.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:53.452152014 CEST53501511.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:53.460702896 CEST53612451.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:54.460215092 CEST53556981.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:57.300218105 CEST53629391.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:57.333913088 CEST6247853192.168.2.61.1.1.1
                                  Jul 4, 2024 20:34:57.334060907 CEST5344053192.168.2.61.1.1.1
                                  Jul 4, 2024 20:34:57.340914965 CEST53624781.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:57.341274023 CEST53534401.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:57.874986887 CEST53589081.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:57.911535025 CEST53512901.1.1.1192.168.2.6
                                  Jul 4, 2024 20:34:58.627774000 CEST53504371.1.1.1192.168.2.6
                                  Jul 4, 2024 20:35:01.269723892 CEST6190553192.168.2.61.1.1.1
                                  Jul 4, 2024 20:35:01.270278931 CEST5281953192.168.2.61.1.1.1
                                  Jul 4, 2024 20:35:01.277746916 CEST53528191.1.1.1192.168.2.6
                                  Jul 4, 2024 20:35:01.278793097 CEST53619051.1.1.1192.168.2.6
                                  Jul 4, 2024 20:35:02.617343903 CEST6326053192.168.2.61.1.1.1
                                  Jul 4, 2024 20:35:02.617497921 CEST5150353192.168.2.61.1.1.1
                                  Jul 4, 2024 20:35:02.625596046 CEST53515031.1.1.1192.168.2.6
                                  Jul 4, 2024 20:35:02.629069090 CEST53632601.1.1.1192.168.2.6
                                  Jul 4, 2024 20:35:11.490328074 CEST53590661.1.1.1192.168.2.6
                                  Jul 4, 2024 20:35:30.576807976 CEST53616421.1.1.1192.168.2.6
                                  Jul 4, 2024 20:35:52.612874985 CEST53581031.1.1.1192.168.2.6
                                  Jul 4, 2024 20:35:53.014149904 CEST53493191.1.1.1192.168.2.6
                                  Jul 4, 2024 20:36:03.376764059 CEST53493761.1.1.1192.168.2.6
                                  Jul 4, 2024 20:36:04.945907116 CEST6211753192.168.2.61.1.1.1
                                  Jul 4, 2024 20:36:04.946288109 CEST5647253192.168.2.61.1.1.1
                                  Jul 4, 2024 20:36:04.953735113 CEST53621171.1.1.1192.168.2.6
                                  Jul 4, 2024 20:36:04.954624891 CEST53564721.1.1.1192.168.2.6
                                  Jul 4, 2024 20:36:21.583492994 CEST53627521.1.1.1192.168.2.6
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jul 4, 2024 20:34:53.425580978 CEST192.168.2.61.1.1.10x6e8eStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.427036047 CEST192.168.2.61.1.1.10x60c6Standard query (0)www.youtube.com65IN (0x0001)false
                                  Jul 4, 2024 20:34:57.333913088 CEST192.168.2.61.1.1.10x6110Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:57.334060907 CEST192.168.2.61.1.1.10x2d9bStandard query (0)www.google.com65IN (0x0001)false
                                  Jul 4, 2024 20:35:01.269723892 CEST192.168.2.61.1.1.10xba2Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:35:01.270278931 CEST192.168.2.61.1.1.10x862bStandard query (0)accounts.youtube.com65IN (0x0001)false
                                  Jul 4, 2024 20:35:02.617343903 CEST192.168.2.61.1.1.10x1678Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:35:02.617497921 CEST192.168.2.61.1.1.10x3cb2Standard query (0)play.google.com65IN (0x0001)false
                                  Jul 4, 2024 20:36:04.945907116 CEST192.168.2.61.1.1.10xdb2Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:36:04.946288109 CEST192.168.2.61.1.1.10xdec7Standard query (0)play.google.com65IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.439368010 CEST1.1.1.1192.168.2.60x6e8eNo error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.442979097 CEST1.1.1.1192.168.2.60x60c6No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                  Jul 4, 2024 20:34:53.442979097 CEST1.1.1.1192.168.2.60x60c6No error (0)youtube-ui.l.google.com65IN (0x0001)false
                                  Jul 4, 2024 20:34:57.340914965 CEST1.1.1.1192.168.2.60x6110No error (0)www.google.com142.250.186.68A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:34:57.341274023 CEST1.1.1.1192.168.2.60x2d9bNo error (0)www.google.com65IN (0x0001)false
                                  Jul 4, 2024 20:35:01.277746916 CEST1.1.1.1192.168.2.60x862bNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                  Jul 4, 2024 20:35:01.278793097 CEST1.1.1.1192.168.2.60xba2No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                  Jul 4, 2024 20:35:01.278793097 CEST1.1.1.1192.168.2.60xba2No error (0)www3.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:35:02.629069090 CEST1.1.1.1192.168.2.60x1678No error (0)play.google.com142.250.185.238A (IP address)IN (0x0001)false
                                  Jul 4, 2024 20:36:04.953735113 CEST1.1.1.1192.168.2.60xdb2No error (0)play.google.com142.250.185.174A (IP address)IN (0x0001)false
                                  • www.youtube.com
                                  • fs.microsoft.com
                                  • https:
                                    • accounts.youtube.com
                                    • play.google.com
                                    • www.google.com
                                  • slscr.update.microsoft.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.649713142.250.185.2064431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:34:54 UTC790OUTGET /account HTTP/1.1
                                  Host: www.youtube.com
                                  Connection: keep-alive
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Upgrade-Insecure-Requests: 1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: none
                                  Sec-Fetch-Mode: navigate
                                  Sec-Fetch-User: ?1
                                  Sec-Fetch-Dest: document
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  2024-07-04 18:34:54 UTC2470INHTTP/1.1 303 See Other
                                  Content-Type: application/binary
                                  X-Content-Type-Options: nosniff
                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                  Pragma: no-cache
                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                  Date: Thu, 04 Jul 2024 18:34:54 GMT
                                  Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en
                                  Strict-Transport-Security: max-age=31536000
                                  X-Frame-Options: SAMEORIGIN
                                  Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                  Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                  Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                  Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                  P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                  Server: ESF
                                  Content-Length: 0
                                  X-XSS-Protection: 0
                                  Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Thu, 04-Jul-2024 19:04:54 GMT; Path=/; Secure; HttpOnly
                                  Set-Cookie: YSC=KEb26Gg3p40; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                  Set-Cookie: VISITOR_INFO1_LIVE=CQxUX50tc2g; Domain=.youtube.com; Expires=Tue, 31-Dec-2024 18:34:54 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                  Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgSg%3D%3D; Domain=.youtube.com; Expires=Tue, 31-Dec-2024 18:34:54 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Connection: close


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.649724184.28.90.27443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:34:58 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  Accept-Encoding: identity
                                  User-Agent: Microsoft BITS/7.8
                                  Host: fs.microsoft.com
                                  2024-07-04 18:34:58 UTC466INHTTP/1.1 200 OK
                                  Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                  Content-Type: application/octet-stream
                                  ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                  Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                  Server: ECAcc (chd/0758)
                                  X-CID: 11
                                  X-Ms-ApiVersion: Distribute 1.2
                                  X-Ms-Region: prod-eus-z1
                                  Cache-Control: public, max-age=44944
                                  Date: Thu, 04 Jul 2024 18:34:58 GMT
                                  Connection: close
                                  X-CID: 2


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.649730184.28.90.27443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:34:59 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  Accept-Encoding: identity
                                  If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                  Range: bytes=0-2147483646
                                  User-Agent: Microsoft BITS/7.8
                                  Host: fs.microsoft.com
                                  2024-07-04 18:34:59 UTC514INHTTP/1.1 200 OK
                                  ApiVersion: Distribute 1.1
                                  Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                  Content-Type: application/octet-stream
                                  ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                  Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                  Server: ECAcc (lpl/EF06)
                                  X-CID: 11
                                  X-Ms-ApiVersion: Distribute 1.2
                                  X-Ms-Region: prod-weu-z1
                                  Cache-Control: public, max-age=44964
                                  Date: Thu, 04 Jul 2024 18:34:59 GMT
                                  Content-Length: 55
                                  Connection: close
                                  X-CID: 2
                                  2024-07-04 18:34:59 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                  Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  3192.168.2.64973140.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:34:59 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4e 67 59 62 6f 7a 43 6e 4a 6b 61 4d 70 30 2f 4e 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 30 37 39 39 38 62 35 34 61 30 61 36 63 36 36 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: NgYbozCnJkaMp0/N.1Context: 807998b54a0a6c66
                                  2024-07-04 18:34:59 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-04 18:34:59 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 4e 67 59 62 6f 7a 43 6e 4a 6b 61 4d 70 30 2f 4e 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 30 37 39 39 38 62 35 34 61 30 61 36 63 36 36 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 76 43 75 4a 6f 77 43 6d 6d 47 69 64 74 78 57 76 4d 30 74 6e 42 66 55 4c 73 75 39 72 4d 2b 64 48 63 43 36 6e 4a 64 5a 68 75 76 56 58 67 4a 52 63 4b 54 53 72 73 70 36 30 78 51 43 32 59 4d 57 55 56 68 56 6b 35 42 6f 2b 63 58 54 78 4b 4c 79 59 4d 6a 6f 6b 33 45 67 4d 51 39 51 54 4a 41 64 58 57 54 65 67 63 71 67 73 58 47 61 71
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: NgYbozCnJkaMp0/N.2Context: 807998b54a0a6c66<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWvCuJowCmmGidtxWvM0tnBfULsu9rM+dHcC6nJdZhuvVXgJRcKTSrsp60xQC2YMWUVhVk5Bo+cXTxKLyYMjok3EgMQ9QTJAdXWTegcqgsXGaq
                                  2024-07-04 18:34:59 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4e 67 59 62 6f 7a 43 6e 4a 6b 61 4d 70 30 2f 4e 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 30 37 39 39 38 62 35 34 61 30 61 36 63 36 36 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: NgYbozCnJkaMp0/N.3Context: 807998b54a0a6c66<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2024-07-04 18:35:00 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-04 18:35:00 UTC58INData Raw: 4d 53 2d 43 56 3a 20 41 75 48 35 68 37 51 42 72 55 53 6b 55 43 39 6b 44 74 57 6f 32 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: AuH5h7QBrUSkUC9kDtWo2g.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.649739142.250.185.2064431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:01 UTC1205OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-1296713850&timestamp=1720118100616 HTTP/1.1
                                  Host: accounts.youtube.com
                                  Connection: keep-alive
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-arch: "x86"
                                  sec-ch-ua-platform: "Windows"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  Upgrade-Insecure-Requests: 1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: cross-site
                                  Sec-Fetch-Mode: navigate
                                  Sec-Fetch-Dest: iframe
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  2024-07-04 18:35:02 UTC1951INHTTP/1.1 200 OK
                                  Content-Type: text/html; charset=utf-8
                                  X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                  Content-Security-Policy: frame-ancestors https://accounts.google.com
                                  Content-Security-Policy: script-src 'report-sample' 'nonce-qYHrE4eDGr3yDPLK-aEC2g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                  Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                  Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                  Pragma: no-cache
                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                  Date: Thu, 04 Jul 2024 18:35:02 GMT
                                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                  Cross-Origin-Opener-Policy: same-origin
                                  reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzj0tDikmLw0JBikPj6kkkNiJ3SZ7AGAHHSv_OsBUC8JOIi64HEi6xC3BzXrs3ewibwYc10OyW9pPzC-MyU1LySzJLKlPzcxMy85Pz87MzU4uLUorLUongjAyMTAzMjYz0Di_gCAwDSNiZn"
                                  Server: ESF
                                  X-XSS-Protection: 0
                                  X-Content-Type-Options: nosniff
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:35:02 UTC1951INData Raw: 37 36 36 36 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 71 59 48 72 45 34 65 44 47 72 33 79 44 50 4c 4b 2d 61 45 43 32 67 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                  Data Ascii: 7666<html><head><script nonce="qYHrE4eDGr3yDPLK-aEC2g">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                  2024-07-04 18:35:02 UTC1951INData Raw: 64 28 66 75 6e 63 74 69 6f 6e 28 64 29 7b 72 65 74 75 72 6e 20 64 20 69 6e 20 62 7d 29 5d 7c 7c 22 22 7d 7d 2c 71 61 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 0a 66 61 28 29 3b 69 66 28 61 3d 3d 3d 22 49 6e 74 65 72 6e 65 74 20 45 78 70 6c 6f 72 65 72 22 29 7b 69 66 28 6a 61 28 29 29 69 66 28 28 61 3d 2f 72 76 3a 20 2a 28 5b 5c 64 5c 2e 5d 2a 29 2f 2e 65 78 65 63 28 62 29 29 26 26 61 5b 31 5d 29 62 3d 61 5b 31 5d 3b 65 6c 73 65 7b 61 3d 22 22 3b 76 61 72 20 63 3d 2f 4d 53 49 45 20 2b 28 5b 5c 64 5c 2e 5d 2b 29 2f 2e 65 78 65 63 28 62 29 3b 69 66 28 63 26 26 63 5b 31 5d 29 69 66 28 62 3d 2f 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77
                                  Data Ascii: d(function(d){return d in b})]||""}},qa=function(a){var b=fa();if(a==="Internet Explorer"){if(ja())if((a=/rv: *([\d\.]*)/.exec(b))&&a[1])b=a[1];else{a="";var c=/MSIE +([\d\.]+)/.exec(b);if(c&&c[1])if(b=/Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])sw
                                  2024-07-04 18:35:02 UTC1951INData Raw: 3b 7a 61 3d 76 6f 69 64 20 30 3b 69 66 28 61 3d 3d 6e 75 6c 6c 29 7b 76 61 72 20 64 3d 39 36 3b 63 3f 28 61 3d 5b 63 5d 2c 64 7c 3d 35 31 32 29 3a 61 3d 5b 5d 3b 62 26 26 28 64 3d 64 26 2d 31 36 37 36 30 38 33 33 7c 28 62 26 31 30 32 33 29 3c 3c 31 34 29 7d 65 6c 73 65 7b 69 66 28 21 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 6e 22 29 3b 64 3d 7a 28 61 29 3b 69 66 28 64 26 32 30 34 38 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 6f 22 29 3b 69 66 28 64 26 0a 36 34 29 72 65 74 75 72 6e 20 61 3b 64 7c 3d 36 34 3b 69 66 28 63 26 26 28 64 7c 3d 35 31 32 2c 63 21 3d 3d 61 5b 30 5d 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 70 22 29 3b 61 3a 7b 63 3d 61 3b 76 61 72 20 65 3d 63 2e 6c 65 6e 67 74 68 3b 69 66 28 65 29
                                  Data Ascii: ;za=void 0;if(a==null){var d=96;c?(a=[c],d|=512):a=[];b&&(d=d&-16760833|(b&1023)<<14)}else{if(!Array.isArray(a))throw Error("n");d=z(a);if(d&2048)throw Error("o");if(d&64)return a;d|=64;if(c&&(d|=512,c!==a[0]))throw Error("p");a:{c=a;var e=c.length;if(e)
                                  2024-07-04 18:35:02 UTC1951INData Raw: 3a 61 2e 63 6f 6e 73 74 72 75 63 74 6f 72 2e 63 61 3b 76 61 72 20 65 3d 4b 61 28 63 3f 61 2e 43 3a 62 29 3b 69 66 28 61 3d 62 2e 6c 65 6e 67 74 68 29 7b 76 61 72 20 66 3d 62 5b 61 2d 31 5d 2c 68 3d 77 61 28 66 29 3b 68 3f 61 2d 2d 3a 66 3d 76 6f 69 64 20 30 3b 65 3d 2b 21 21 28 65 26 35 31 32 29 2d 31 3b 76 61 72 20 67 3d 62 3b 69 66 28 68 29 7b 62 3a 7b 76 61 72 20 6b 3d 66 3b 76 61 72 20 6c 3d 7b 7d 3b 68 3d 21 31 3b 69 66 28 6b 29 66 6f 72 28 76 61 72 20 6d 20 69 6e 20 6b 29 69 66 28 69 73 4e 61 4e 28 2b 6d 29 29 6c 5b 6d 5d 3d 6b 5b 6d 5d 3b 65 6c 73 65 7b 76 61 72 20 71 3d 6b 5b 6d 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 71 29 26 26 28 41 28 71 2c 64 2c 0a 2b 6d 29 7c 7c 76 61 28 71 29 26 26 71 2e 73 69 7a 65 3d 3d 3d 30 29 26 26 28 71 3d 6e
                                  Data Ascii: :a.constructor.ca;var e=Ka(c?a.C:b);if(a=b.length){var f=b[a-1],h=wa(f);h?a--:f=void 0;e=+!!(e&512)-1;var g=b;if(h){b:{var k=f;var l={};h=!1;if(k)for(var m in k)if(isNaN(+m))l[m]=k[m];else{var q=k[m];Array.isArray(q)&&(A(q,d,+m)||va(q)&&q.size===0)&&(q=n
                                  2024-07-04 18:35:02 UTC1951INData Raw: 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 50 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65 6f 66 20 64 2e 70 72 6f 74 6f 74 79 70 65 5b 61 5d 21 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 45 28 64 2e 70 72 6f 74 6f 74 79 70 65 2c 61 2c 7b 63 6f 6e 66 69 67 75 72 61 62 6c 65 3a 21 30 2c 77 72 69 74 61 62 6c 65 3a 21 30 2c 76 61 6c 75 65 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 72 65 74 75 72 6e 20 51 61 28 4e 61 28 74 68 69 73 29 29 7d 7d 29 7d 72 65 74 75 72 6e 20 61 7d 29 3b 0a 76 61 72 20 51 61 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 7b 6e 65 78 74 3a 61 7d 3b 61 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 72 65 74 75 72 6e 20 74 68 69 73 7d 3b 72 65 74
                                  Data Ascii: gth;c++){var d=Pa[b[c]];typeof d==="function"&&typeof d.prototype[a]!="function"&&E(d.prototype,a,{configurable:!0,writable:!0,value:function(){return Qa(Na(this))}})}return a});var Qa=function(a){a={next:a};a[Symbol.iterator]=function(){return this};ret
                                  2024-07-04 18:35:02 UTC1951INData Raw: 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 48 28 6b 2c 66 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 6a 60 22 2b 6b 29 3b 6b 5b 66 5d 5b 74 68 69 73 2e 67 5d 3d 6c 3b 72 65 74 75 72 6e 20 74 68 69 73 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 67 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 72 65 74 75 72 6e 20 63 28 6b 29 26 26 48 28 6b 2c 66 29 3f 6b 5b 66 5d 5b 74 68 69 73 2e 67 5d 3a 76 6f 69 64 20 30 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 68 61 73 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 72 65 74 75 72 6e 20 63 28 6b 29 26 26 48 28 6b 2c 66 29 26 26 48 28 6b 5b 66 5d 2c 74 68 69 73 2e 67 29 7d 3b 67 2e 70 72
                                  Data Ascii: rototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!H(k,f))throw Error("j`"+k);k[f][this.g]=l;return this};g.prototype.get=function(k){return c(k)&&H(k,f)?k[f][this.g]:void 0};g.prototype.has=function(k){return c(k)&&H(k,f)&&H(k[f],this.g)};g.pr
                                  2024-07-04 18:35:02 UTC1951INData Raw: 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29 3f 6c 3d 62 2e 67 65 74 28 6b 29 3a 28 6c 3d 22 22 2b 20 2b 2b 68 2c 62 2e 73 65 74 28 6b 2c 6c 29 29 3a 6c 3d 22 70 5f 22 2b 6b 3b 76 61 72 20 6d 3d 67 5b 30 5d 5b 6c 5d 3b 69 66 28 6d 26 26 48 28 67 5b 30 5d 2c 6c 29 29 66 6f 72 28 67 3d 30 3b 67 3c 6d 2e 6c 65 6e 67 74 68 3b 67 2b 2b 29 7b 76 61 72 20 71 3d 6d 5b 67 5d 3b 69 66 28 6b 21 3d 3d 6b 26 26 71 2e 6b 65 79 21 3d 3d 71 2e 6b 65 79 7c 7c 6b 3d 3d 3d 71 2e 6b 65 79 29 72 65 74 75 72 6e 7b 69 64 3a 6c 2c 6c 69 73 74 3a 6d 2c 69 6e 64 65 78
                                  Data Ascii: otype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)?l=b.get(k):(l=""+ ++h,b.set(k,l)):l="p_"+k;var m=g[0][l];if(m&&H(g[0],l))for(g=0;g<m.length;g++){var q=m[g];if(k!==k&&q.key!==q.key||k===q.key)return{id:l,list:m,index
                                  2024-07-04 18:35:02 UTC1951INData Raw: 72 20 68 3d 30 3b 21 28 66 3d 62 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 65 2e 70 75 73 68 28 63 2e 63 61 6c 6c 28 64 2c 66 2e 76 61 6c 75 65 2c 68 2b 2b 29 29 7d 65 6c 73 65 20 66 6f 72 28 66 3d 62 2e 6c 65 6e 67 74 68 2c 68 3d 30 3b 68 3c 66 3b 68 2b 2b 29 65 2e 70 75 73 68 28 63 2e 63 61 6c 6c 28 64 2c 62 5b 68 5d 2c 68 29 29 3b 72 65 74 75 72 6e 20 65 7d 7d 29 3b 76 61 72 20 5a 61 3d 5a 61 7c 7c 7b 7d 2c 72 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 61 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 29 7b 76 61 72 20 63 3d 24 61 28 22 57 49 5a 5f 67 6c 6f 62 61 6c 5f 64 61 74 61 2e 6f 78 4e 33 6e 62 22 29 3b 61 3d 63 26 26 63 5b 61 5d 3b 72 65 74 75 72 6e 20 61 21 3d 6e 75 6c 6c 3f 61 3a 62 7d 2c 49 3d 72 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 24 61
                                  Data Ascii: r h=0;!(f=b.next()).done;)e.push(c.call(d,f.value,h++))}else for(f=b.length,h=0;h<f;h++)e.push(c.call(d,b[h],h));return e}});var Za=Za||{},r=this||self,ab=function(a,b){var c=$a("WIZ_global_data.oxN3nb");a=c&&c[a];return a!=null?a:b},I=r._F_toggles||[],$a
                                  2024-07-04 18:35:02 UTC1951INData Raw: 70 65 6f 66 20 61 3d 3d 3d 22 73 74 72 69 6e 67 22 3f 61 2e 73 70 6c 69 74 28 22 22 29 3a 61 2c 66 3d 30 3b 66 3c 64 3b 66 2b 2b 29 66 20 69 6e 20 65 26 26 62 2e 63 61 6c 6c 28 63 2c 65 5b 66 5d 2c 66 2c 61 29 7d 3b 76 61 72 20 63 61 3d 22 63 6f 6e 73 74 72 75 63 74 6f 72 20 68 61 73 4f 77 6e 50 72 6f 70 65 72 74 79 20 69 73 50 72 6f 74 6f 74 79 70 65 4f 66 20 70 72 6f 70 65 72 74 79 49 73 45 6e 75 6d 65 72 61 62 6c 65 20 74 6f 4c 6f 63 61 6c 65 53 74 72 69 6e 67 20 74 6f 53 74 72 69 6e 67 20 76 61 6c 75 65 4f 66 22 2e 73 70 6c 69 74 28 22 20 22 29 3b 76 61 72 20 6a 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 72 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f
                                  Data Ascii: peof a==="string"?a.split(""):a,f=0;f<d;f++)f in e&&b.call(c,e[f],f,a)};var ca="constructor hasOwnProperty isPrototypeOf propertyIsEnumerable toLocaleString toString valueOf".split(" ");var jb=function(a,b,c){c=c||r;var d=c.onerror,e=!!b;c.onerror=functio
                                  2024-07-04 18:35:02 UTC1951INData Raw: 65 6e 74 73 2c 65 3d 30 3b 64 26 26 65 3c 64 2e 6c 65 6e 67 74 68 3b 65 2b 2b 29 7b 65 3e 30 26 26 63 2e 70 75 73 68 28 22 2c 20 22 29 3b 76 61 72 20 66 3d 64 5b 65 5d 3b 73 77 69 74 63 68 28 74 79 70 65 6f 66 20 66 29 7b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 66 3d 66 3f 22 6f 62 6a 65 63 74 22 3a 22 6e 75 6c 6c 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 73 74 72 69 6e 67 22 3a 62 72 65 61 6b 3b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 6c 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c
                                  Data Ascii: ents,e=0;d&&e<d.length;e++){e>0&&c.push(", ");var f=d[e];switch(typeof f){case "object":f=f?"object":"null";break;case "string":break;case "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=lb(f))?f:"[fn]";break;defaul


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.649744142.250.185.2384431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:03 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Accept: */*
                                  Access-Control-Request-Method: POST
                                  Access-Control-Request-Headers: x-goog-authuser
                                  Origin: https://accounts.google.com
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  2024-07-04 18:35:03 UTC520INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                  Access-Control-Max-Age: 86400
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:35:03 GMT
                                  Server: Playlog
                                  Content-Length: 0
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Connection: close


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.649743142.250.185.2384431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:03 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Accept: */*
                                  Access-Control-Request-Method: POST
                                  Access-Control-Request-Headers: x-goog-authuser
                                  Origin: https://accounts.google.com
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  2024-07-04 18:35:03 UTC520INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                  Access-Control-Max-Age: 86400
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:35:03 GMT
                                  Server: Playlog
                                  Content-Length: 0
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Connection: close


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  7192.168.2.649749142.250.185.2384431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:04 UTC1112OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 522
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  2024-07-04 18:35:04 UTC522OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 32 32 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 30 31 31 38 31 30 31 39 36 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"22",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1720118101965",null,null,null
                                  2024-07-04 18:35:04 UTC925INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Set-Cookie: NID=515=sqa-q49fln2MWIFiP8NiFTk4TD__q979zO9VhtcnYIWv5koTwIb1IwINTWJynda-f50sbGKGENMNSE66cOgp404Jx-RZ9KbMkwavTOTDdObAorpNENBFTFxYkNL2NNRc3_rSVuh3nxIF_HNXv6F37IQs9LsRaJtJl5bFBX9yQfs; expires=Fri, 03-Jan-2025 18:35:04 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                  P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:35:04 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Expires: Thu, 04 Jul 2024 18:35:04 GMT
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:35:04 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:35:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  8192.168.2.649750142.250.185.2384431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:04 UTC1112OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 522
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  2024-07-04 18:35:04 UTC522OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 32 32 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 30 31 31 38 31 30 32 30 34 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"22",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1720118102046",null,null,null
                                  2024-07-04 18:35:04 UTC925INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Set-Cookie: NID=515=YobLsI1MOFaaDYrrYufgYj5r0J6p-BD456iKrsY_TLlr7TxcJuRccSbEolIdWocqVL6dWbu54RxyR5IAT_9xWUfsmQWKH1e5F3x-JLslaVIE1CBvWu0SNoZ0HiA72SFQ_G_T9rdbJlWQZhZB97MHZSDZDjWQbS1gDGbkmZCJ7To; expires=Fri, 03-Jan-2025 18:35:04 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                  P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:35:04 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Expires: Thu, 04 Jul 2024 18:35:04 GMT
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:35:04 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:35:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  9192.168.2.649721142.250.186.684431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:04 UTC1194OUTGET /favicon.ico HTTP/1.1
                                  Host: www.google.com
                                  Connection: keep-alive
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: no-cors
                                  Sec-Fetch-Dest: image
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=YobLsI1MOFaaDYrrYufgYj5r0J6p-BD456iKrsY_TLlr7TxcJuRccSbEolIdWocqVL6dWbu54RxyR5IAT_9xWUfsmQWKH1e5F3x-JLslaVIE1CBvWu0SNoZ0HiA72SFQ_G_T9rdbJlWQZhZB97MHZSDZDjWQbS1gDGbkmZCJ7To
                                  2024-07-04 18:35:04 UTC706INHTTP/1.1 200 OK
                                  Accept-Ranges: bytes
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                  Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                  Content-Length: 5430
                                  X-Content-Type-Options: nosniff
                                  Server: sffe
                                  X-XSS-Protection: 0
                                  Date: Thu, 04 Jul 2024 14:54:00 GMT
                                  Expires: Fri, 12 Jul 2024 14:54:00 GMT
                                  Cache-Control: public, max-age=691200
                                  Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                  Content-Type: image/x-icon
                                  Vary: Accept-Encoding
                                  Age: 13264
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Connection: close
                                  2024-07-04 18:35:04 UTC684INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                  Data Ascii: h& ( 0.v]X:X:rY
                                  2024-07-04 18:35:04 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c
                                  Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<
                                  2024-07-04 18:35:04 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42
                                  Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                  2024-07-04 18:35:04 UTC1390INData Raw: 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                  Data Ascii: BBBBBBBF!4I
                                  2024-07-04 18:35:04 UTC576INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                  Data Ascii: $'


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  10192.168.2.64975640.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:07 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 56 31 37 47 4c 75 54 34 6d 30 4f 54 4b 70 58 42 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 30 66 35 64 37 64 63 64 62 63 62 64 36 30 64 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: V17GLuT4m0OTKpXB.1Context: 50f5d7dcdbcbd60d
                                  2024-07-04 18:35:07 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-04 18:35:07 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 56 31 37 47 4c 75 54 34 6d 30 4f 54 4b 70 58 42 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 30 66 35 64 37 64 63 64 62 63 62 64 36 30 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 76 43 75 4a 6f 77 43 6d 6d 47 69 64 74 78 57 76 4d 30 74 6e 42 66 55 4c 73 75 39 72 4d 2b 64 48 63 43 36 6e 4a 64 5a 68 75 76 56 58 67 4a 52 63 4b 54 53 72 73 70 36 30 78 51 43 32 59 4d 57 55 56 68 56 6b 35 42 6f 2b 63 58 54 78 4b 4c 79 59 4d 6a 6f 6b 33 45 67 4d 51 39 51 54 4a 41 64 58 57 54 65 67 63 71 67 73 58 47 61 71
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: V17GLuT4m0OTKpXB.2Context: 50f5d7dcdbcbd60d<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWvCuJowCmmGidtxWvM0tnBfULsu9rM+dHcC6nJdZhuvVXgJRcKTSrsp60xQC2YMWUVhVk5Bo+cXTxKLyYMjok3EgMQ9QTJAdXWTegcqgsXGaq
                                  2024-07-04 18:35:07 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 56 31 37 47 4c 75 54 34 6d 30 4f 54 4b 70 58 42 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 30 66 35 64 37 64 63 64 62 63 62 64 36 30 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: V17GLuT4m0OTKpXB.3Context: 50f5d7dcdbcbd60d<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2024-07-04 18:35:08 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-04 18:35:08 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6b 59 78 2b 57 2b 49 30 37 6b 75 57 6e 46 43 4a 4c 45 2f 37 49 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: kYx+W+I07kuWnFCJLE/7Iw.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  11192.168.2.64975840.68.123.157443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:10 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=a+mBd8HZOS6O9l4&MD=cuxxAeMC HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                  Host: slscr.update.microsoft.com
                                  2024-07-04 18:35:11 UTC560INHTTP/1.1 200 OK
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Content-Type: application/octet-stream
                                  Expires: -1
                                  Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                  ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                  MS-CorrelationId: ed5a07e5-95db-4504-81e9-9fe09de3437c
                                  MS-RequestId: b757c872-4189-474d-b9b2-57b5646a0b2e
                                  MS-CV: xb/9cHgy5kKkXCQO.0
                                  X-Microsoft-SLSClientCache: 2880
                                  Content-Disposition: attachment; filename=environment.cab
                                  X-Content-Type-Options: nosniff
                                  Date: Thu, 04 Jul 2024 18:35:10 GMT
                                  Connection: close
                                  Content-Length: 24490
                                  2024-07-04 18:35:11 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                  Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                  2024-07-04 18:35:11 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                  Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  12192.168.2.649759142.250.185.2384431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:11 UTC1278OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 929
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: text/plain;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=YobLsI1MOFaaDYrrYufgYj5r0J6p-BD456iKrsY_TLlr7TxcJuRccSbEolIdWocqVL6dWbu54RxyR5IAT_9xWUfsmQWKH1e5F3x-JLslaVIE1CBvWu0SNoZ0HiA72SFQ_G_T9rdbJlWQZhZB97MHZSDZDjWQbS1gDGbkmZCJ7To
                                  2024-07-04 18:35:11 UTC929OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 30 31 31 38 30 39 39 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[4,0,0,0,0]]],558,[["1720118099000",null,null,null,
                                  2024-07-04 18:35:11 UTC925INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Set-Cookie: NID=515=kbTd-hubtish7zQUYvollTwbfhxJyxsSmPE7gLqTK7EYkucw4HJ9IUVc5D98X91XXmZFEZzKTqVF_Z1gFreTgVNyA8FY9Igv0Zn_DyvpqhSwf4-Pr0EVeADZooKzOLzeMmMrMiUUurkug4yltbTVH8x2d-W8y6xBpOiJhQ9pQdc; expires=Fri, 03-Jan-2025 18:35:11 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                  P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:35:11 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Expires: Thu, 04 Jul 2024 18:35:11 GMT
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:35:11 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:35:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  13192.168.2.64976440.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:20 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 2f 57 49 42 75 56 4f 54 37 30 6d 42 79 66 54 6b 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 66 38 63 37 36 32 66 65 31 64 31 61 36 38 64 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: /WIBuVOT70mByfTk.1Context: 2f8c762fe1d1a68d
                                  2024-07-04 18:35:20 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-04 18:35:20 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 2f 57 49 42 75 56 4f 54 37 30 6d 42 79 66 54 6b 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 66 38 63 37 36 32 66 65 31 64 31 61 36 38 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 76 43 75 4a 6f 77 43 6d 6d 47 69 64 74 78 57 76 4d 30 74 6e 42 66 55 4c 73 75 39 72 4d 2b 64 48 63 43 36 6e 4a 64 5a 68 75 76 56 58 67 4a 52 63 4b 54 53 72 73 70 36 30 78 51 43 32 59 4d 57 55 56 68 56 6b 35 42 6f 2b 63 58 54 78 4b 4c 79 59 4d 6a 6f 6b 33 45 67 4d 51 39 51 54 4a 41 64 58 57 54 65 67 63 71 67 73 58 47 61 71
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: /WIBuVOT70mByfTk.2Context: 2f8c762fe1d1a68d<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWvCuJowCmmGidtxWvM0tnBfULsu9rM+dHcC6nJdZhuvVXgJRcKTSrsp60xQC2YMWUVhVk5Bo+cXTxKLyYMjok3EgMQ9QTJAdXWTegcqgsXGaq
                                  2024-07-04 18:35:20 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 2f 57 49 42 75 56 4f 54 37 30 6d 42 79 66 54 6b 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 32 66 38 63 37 36 32 66 65 31 64 31 61 36 38 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: /WIBuVOT70mByfTk.3Context: 2f8c762fe1d1a68d<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2024-07-04 18:35:20 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-04 18:35:20 UTC58INData Raw: 4d 53 2d 43 56 3a 20 58 4e 50 79 47 65 53 4b 70 55 65 77 71 50 5a 75 45 6f 76 44 31 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: XNPyGeSKpUewqPZuEovD1g.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  14192.168.2.649765142.250.185.2384431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:33 UTC1301OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 882
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=kbTd-hubtish7zQUYvollTwbfhxJyxsSmPE7gLqTK7EYkucw4HJ9IUVc5D98X91XXmZFEZzKTqVF_Z1gFreTgVNyA8FY9Igv0Zn_DyvpqhSwf4-Pr0EVeADZooKzOLzeMmMrMiUUurkug4yltbTVH8x2d-W8y6xBpOiJhQ9pQdc
                                  2024-07-04 18:35:33 UTC882OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 32 32 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 30 31 31 38 31 33 32 33 35 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"22",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1720118132355",null,null,null
                                  2024-07-04 18:35:33 UTC523INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:35:33 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:35:33 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:35:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  15192.168.2.649766142.250.185.2384431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:34 UTC1302OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 1078
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=kbTd-hubtish7zQUYvollTwbfhxJyxsSmPE7gLqTK7EYkucw4HJ9IUVc5D98X91XXmZFEZzKTqVF_Z1gFreTgVNyA8FY9Igv0Zn_DyvpqhSwf4-Pr0EVeADZooKzOLzeMmMrMiUUurkug4yltbTVH8x2d-W8y6xBpOiJhQ9pQdc
                                  2024-07-04 18:35:34 UTC1078OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 32 32 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 30 31 31 38 31 33 32 39 39 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"22",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1720118132996",null,null,null
                                  2024-07-04 18:35:34 UTC523INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:35:34 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:35:34 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:35:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  16192.168.2.649767142.250.185.2384431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:34 UTC1278OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 842
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: text/plain;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=kbTd-hubtish7zQUYvollTwbfhxJyxsSmPE7gLqTK7EYkucw4HJ9IUVc5D98X91XXmZFEZzKTqVF_Z1gFreTgVNyA8FY9Igv0Zn_DyvpqhSwf4-Pr0EVeADZooKzOLzeMmMrMiUUurkug4yltbTVH8x2d-W8y6xBpOiJhQ9pQdc
                                  2024-07-04 18:35:34 UTC842OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 36 32 33 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 34 2c 30 2c 30
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240623.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[4,0,0
                                  2024-07-04 18:35:34 UTC523INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:35:34 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:35:34 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:35:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  17192.168.2.64976840.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:39 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 65 34 36 42 77 52 50 79 39 55 71 47 53 4a 49 31 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 61 31 38 65 35 36 61 33 64 62 37 37 32 62 35 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: e46BwRPy9UqGSJI1.1Context: aa18e56a3db772b5
                                  2024-07-04 18:35:39 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-04 18:35:39 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 65 34 36 42 77 52 50 79 39 55 71 47 53 4a 49 31 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 61 31 38 65 35 36 61 33 64 62 37 37 32 62 35 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 76 43 75 4a 6f 77 43 6d 6d 47 69 64 74 78 57 76 4d 30 74 6e 42 66 55 4c 73 75 39 72 4d 2b 64 48 63 43 36 6e 4a 64 5a 68 75 76 56 58 67 4a 52 63 4b 54 53 72 73 70 36 30 78 51 43 32 59 4d 57 55 56 68 56 6b 35 42 6f 2b 63 58 54 78 4b 4c 79 59 4d 6a 6f 6b 33 45 67 4d 51 39 51 54 4a 41 64 58 57 54 65 67 63 71 67 73 58 47 61 71
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: e46BwRPy9UqGSJI1.2Context: aa18e56a3db772b5<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWvCuJowCmmGidtxWvM0tnBfULsu9rM+dHcC6nJdZhuvVXgJRcKTSrsp60xQC2YMWUVhVk5Bo+cXTxKLyYMjok3EgMQ9QTJAdXWTegcqgsXGaq
                                  2024-07-04 18:35:39 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 65 34 36 42 77 52 50 79 39 55 71 47 53 4a 49 31 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 61 31 38 65 35 36 61 33 64 62 37 37 32 62 35 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: e46BwRPy9UqGSJI1.3Context: aa18e56a3db772b5<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2024-07-04 18:35:39 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-04 18:35:39 UTC58INData Raw: 4d 53 2d 43 56 3a 20 78 54 33 71 55 32 4e 6a 43 45 69 4e 61 4b 65 4a 79 6d 4b 6c 63 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: xT3qU2NjCEiNaKeJymKlcQ.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  18192.168.2.64976940.68.123.157443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:35:48 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=a+mBd8HZOS6O9l4&MD=cuxxAeMC HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                  Host: slscr.update.microsoft.com
                                  2024-07-04 18:35:48 UTC560INHTTP/1.1 200 OK
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Content-Type: application/octet-stream
                                  Expires: -1
                                  Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                  ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                  MS-CorrelationId: 0a743b55-3bcb-4dd1-bc5f-a92795187f3c
                                  MS-RequestId: 7fad0a92-ea26-47af-ac8f-ae4bcc5d029b
                                  MS-CV: cJdLoniobEya1DsI.0
                                  X-Microsoft-SLSClientCache: 1440
                                  Content-Disposition: attachment; filename=environment.cab
                                  X-Content-Type-Options: nosniff
                                  Date: Thu, 04 Jul 2024 18:35:48 GMT
                                  Connection: close
                                  Content-Length: 30005
                                  2024-07-04 18:35:48 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                  Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                  2024-07-04 18:35:48 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                  Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  19192.168.2.64977340.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:36:04 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 74 53 71 71 42 69 56 42 41 30 75 51 39 43 53 75 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 36 61 66 38 31 38 62 39 37 65 35 34 35 39 35 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: tSqqBiVBA0uQ9CSu.1Context: 46af818b97e54595
                                  2024-07-04 18:36:04 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-04 18:36:04 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 74 53 71 71 42 69 56 42 41 30 75 51 39 43 53 75 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 36 61 66 38 31 38 62 39 37 65 35 34 35 39 35 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 76 43 75 4a 6f 77 43 6d 6d 47 69 64 74 78 57 76 4d 30 74 6e 42 66 55 4c 73 75 39 72 4d 2b 64 48 63 43 36 6e 4a 64 5a 68 75 76 56 58 67 4a 52 63 4b 54 53 72 73 70 36 30 78 51 43 32 59 4d 57 55 56 68 56 6b 35 42 6f 2b 63 58 54 78 4b 4c 79 59 4d 6a 6f 6b 33 45 67 4d 51 39 51 54 4a 41 64 58 57 54 65 67 63 71 67 73 58 47 61 71
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: tSqqBiVBA0uQ9CSu.2Context: 46af818b97e54595<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWvCuJowCmmGidtxWvM0tnBfULsu9rM+dHcC6nJdZhuvVXgJRcKTSrsp60xQC2YMWUVhVk5Bo+cXTxKLyYMjok3EgMQ9QTJAdXWTegcqgsXGaq
                                  2024-07-04 18:36:04 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 74 53 71 71 42 69 56 42 41 30 75 51 39 43 53 75 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 36 61 66 38 31 38 62 39 37 65 35 34 35 39 35 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: tSqqBiVBA0uQ9CSu.3Context: 46af818b97e54595<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2024-07-04 18:36:04 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-04 18:36:04 UTC58INData Raw: 4d 53 2d 43 56 3a 20 39 37 2b 64 41 50 4a 4a 51 55 4b 4a 2f 66 69 78 63 68 6a 46 4d 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: 97+dAPJJQUKJ/fixchjFMA.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  20192.168.2.649774142.250.185.1744431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:36:05 UTC1301OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 845
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=kbTd-hubtish7zQUYvollTwbfhxJyxsSmPE7gLqTK7EYkucw4HJ9IUVc5D98X91XXmZFEZzKTqVF_Z1gFreTgVNyA8FY9Igv0Zn_DyvpqhSwf4-Pr0EVeADZooKzOLzeMmMrMiUUurkug4yltbTVH8x2d-W8y6xBpOiJhQ9pQdc
                                  2024-07-04 18:36:05 UTC845OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 32 32 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 30 31 31 38 31 36 34 33 30 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"22",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1720118164301",null,null,null
                                  2024-07-04 18:36:05 UTC523INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:36:05 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:36:05 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:36:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  21192.168.2.649775142.250.185.1744431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:36:06 UTC1301OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 765
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=kbTd-hubtish7zQUYvollTwbfhxJyxsSmPE7gLqTK7EYkucw4HJ9IUVc5D98X91XXmZFEZzKTqVF_Z1gFreTgVNyA8FY9Igv0Zn_DyvpqhSwf4-Pr0EVeADZooKzOLzeMmMrMiUUurkug4yltbTVH8x2d-W8y6xBpOiJhQ9pQdc
                                  2024-07-04 18:36:06 UTC765OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 32 32 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 30 31 31 38 31 36 34 39 32 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"22",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1720118164927",null,null,null
                                  2024-07-04 18:36:06 UTC523INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:36:06 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:36:06 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:36:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  22192.168.2.64977840.113.103.199443
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:36:30 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 39 32 2f 56 77 37 68 69 30 45 79 6b 31 69 68 72 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 37 66 31 66 33 35 33 31 30 61 66 31 61 35 39 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: 92/Vw7hi0Eyk1ihr.1Context: 57f1f35310af1a59
                                  2024-07-04 18:36:30 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-04 18:36:30 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 39 32 2f 56 77 37 68 69 30 45 79 6b 31 69 68 72 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 37 66 31 66 33 35 33 31 30 61 66 31 61 35 39 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 76 43 75 4a 6f 77 43 6d 6d 47 69 64 74 78 57 76 4d 30 74 6e 42 66 55 4c 73 75 39 72 4d 2b 64 48 63 43 36 6e 4a 64 5a 68 75 76 56 58 67 4a 52 63 4b 54 53 72 73 70 36 30 78 51 43 32 59 4d 57 55 56 68 56 6b 35 42 6f 2b 63 58 54 78 4b 4c 79 59 4d 6a 6f 6b 33 45 67 4d 51 39 51 54 4a 41 64 58 57 54 65 67 63 71 67 73 58 47 61 71
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: 92/Vw7hi0Eyk1ihr.2Context: 57f1f35310af1a59<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWvCuJowCmmGidtxWvM0tnBfULsu9rM+dHcC6nJdZhuvVXgJRcKTSrsp60xQC2YMWUVhVk5Bo+cXTxKLyYMjok3EgMQ9QTJAdXWTegcqgsXGaq
                                  2024-07-04 18:36:30 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 39 32 2f 56 77 37 68 69 30 45 79 6b 31 69 68 72 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 37 66 31 66 33 35 33 31 30 61 66 31 61 35 39 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: 92/Vw7hi0Eyk1ihr.3Context: 57f1f35310af1a59<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                  2024-07-04 18:36:30 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-04 18:36:30 UTC58INData Raw: 4d 53 2d 43 56 3a 20 74 67 6a 76 63 74 56 70 2b 45 65 46 6d 6a 70 4e 67 56 4f 74 7a 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: tgjvctVp+EeFmjpNgVOtzQ.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  23192.168.2.649779142.250.185.1744431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:36:38 UTC1302OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 1189
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=kbTd-hubtish7zQUYvollTwbfhxJyxsSmPE7gLqTK7EYkucw4HJ9IUVc5D98X91XXmZFEZzKTqVF_Z1gFreTgVNyA8FY9Igv0Zn_DyvpqhSwf4-Pr0EVeADZooKzOLzeMmMrMiUUurkug4yltbTVH8x2d-W8y6xBpOiJhQ9pQdc
                                  2024-07-04 18:36:38 UTC1189OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 32 32 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 30 31 31 38 31 39 36 39 37 33 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"22",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1720118196973",null,null,null
                                  2024-07-04 18:36:38 UTC523INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:36:38 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:36:38 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:36:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  24192.168.2.649780142.250.185.1744431756C:\Program Files\Google\Chrome\Application\chrome.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-04 18:36:40 UTC1302OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                  Host: play.google.com
                                  Connection: keep-alive
                                  Content-Length: 1066
                                  sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                  sec-ch-ua-mobile: ?0
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                  sec-ch-ua-arch: "x86"
                                  Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                  sec-ch-ua-full-version: "117.0.5938.134"
                                  sec-ch-ua-platform-version: "10.0.0"
                                  X-Goog-AuthUser: 0
                                  sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                  sec-ch-ua-bitness: "64"
                                  sec-ch-ua-model: ""
                                  sec-ch-ua-wow64: ?0
                                  sec-ch-ua-platform: "Windows"
                                  Accept: */*
                                  Origin: https://accounts.google.com
                                  X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                  Sec-Fetch-Site: same-site
                                  Sec-Fetch-Mode: cors
                                  Sec-Fetch-Dest: empty
                                  Referer: https://accounts.google.com/
                                  Accept-Encoding: gzip, deflate, br
                                  Accept-Language: en-US,en;q=0.9
                                  Cookie: NID=515=kbTd-hubtish7zQUYvollTwbfhxJyxsSmPE7gLqTK7EYkucw4HJ9IUVc5D98X91XXmZFEZzKTqVF_Z1gFreTgVNyA8FY9Igv0Zn_DyvpqhSwf4-Pr0EVeADZooKzOLzeMmMrMiUUurkug4yltbTVH8x2d-W8y6xBpOiJhQ9pQdc
                                  2024-07-04 18:36:40 UTC1066OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 32 32 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 30 31 31 38 31 39 38 38 30 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                  Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"22",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1720118198801",null,null,null
                                  2024-07-04 18:36:40 UTC523INHTTP/1.1 200 OK
                                  Access-Control-Allow-Origin: https://accounts.google.com
                                  Cross-Origin-Resource-Policy: cross-origin
                                  Access-Control-Allow-Credentials: true
                                  Access-Control-Allow-Headers: X-Playlog-Web
                                  Content-Type: text/plain; charset=UTF-8
                                  Date: Thu, 04 Jul 2024 18:36:40 GMT
                                  Server: Playlog
                                  Cache-Control: private
                                  X-XSS-Protection: 0
                                  X-Frame-Options: SAMEORIGIN
                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                  Accept-Ranges: none
                                  Vary: Accept-Encoding
                                  Connection: close
                                  Transfer-Encoding: chunked
                                  2024-07-04 18:36:40 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                  Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                  2024-07-04 18:36:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:14:34:50
                                  Start date:04/07/2024
                                  Path:C:\Users\user\Desktop\file.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\file.exe"
                                  Imagebase:0xc0000
                                  File size:1'166'336 bytes
                                  MD5 hash:619F9806AB2FAD61F931922DD30EDE7F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:14:34:51
                                  Start date:04/07/2024
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                                  Imagebase:0x7ff684c40000
                                  File size:3'242'272 bytes
                                  MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:4
                                  Start time:14:34:51
                                  Start date:04/07/2024
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8
                                  Imagebase:0x7ff684c40000
                                  File size:3'242'272 bytes
                                  MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:6
                                  Start time:14:35:02
                                  Start date:04/07/2024
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4476 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8
                                  Imagebase:0x7ff684c40000
                                  File size:3'242'272 bytes
                                  MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:7
                                  Start time:14:35:02
                                  Start date:04/07/2024
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=2020,i,1018589847313137636,1605898340956988895,262144 /prefetch:8
                                  Imagebase:0x7ff684c40000
                                  File size:3'242'272 bytes
                                  MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:2.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:3.8%
                                    Total number of Nodes:1945
                                    Total number of Limit Nodes:80
                                    execution_graph 96223 152a55 96231 131ebc 96223->96231 96226 152a70 96233 1239c0 22 API calls 96226->96233 96228 152a7c 96234 12417d 22 API calls __fread_nolock 96228->96234 96230 152a87 96232 131ec3 IsWindow 96231->96232 96232->96226 96232->96230 96233->96228 96234->96230 96235 c1cad SystemParametersInfoW 96236 113f75 96247 dceb1 96236->96247 96238 113f8b 96239 114006 96238->96239 96314 de300 23 API calls 96238->96314 96256 cbf40 96239->96256 96241 114052 96245 114a88 96241->96245 96316 13359c 82 API calls __wsopen_s 96241->96316 96244 113fe6 96244->96241 96315 131abf 22 API calls 96244->96315 96248 dcebf 96247->96248 96249 dced2 96247->96249 96317 caceb 96248->96317 96251 dcf05 96249->96251 96252 dced7 96249->96252 96254 caceb 23 API calls 96251->96254 96327 dfddb 96252->96327 96255 dcec9 96254->96255 96255->96238 96351 cadf0 96256->96351 96258 cbf9d 96259 cbfa9 96258->96259 96260 1104b6 96258->96260 96262 cc01e 96259->96262 96263 1104c6 96259->96263 96379 13359c 82 API calls __wsopen_s 96260->96379 96356 cac91 96262->96356 96380 13359c 82 API calls __wsopen_s 96263->96380 96267 cc7da 96368 dfe0b 96267->96368 96268 127120 22 API calls 96310 cc039 ISource __fread_nolock 96268->96310 96271 dfddb 22 API calls 96271->96310 96274 1104f5 96278 11055a 96274->96278 96381 dd217 270 API calls 96274->96381 96277 cc808 __fread_nolock 96279 dfe0b 22 API calls 96277->96279 96300 cc603 96278->96300 96382 13359c 82 API calls __wsopen_s 96278->96382 96311 cc350 ISource __fread_nolock 96279->96311 96280 caf8a 22 API calls 96280->96310 96281 11091a 96434 133209 23 API calls 96281->96434 96284 cec40 270 API calls 96284->96310 96285 1108a5 96405 cec40 96285->96405 96288 1108cf 96288->96300 96429 ca81b 96288->96429 96289 110591 96383 13359c 82 API calls __wsopen_s 96289->96383 96290 1108f6 96433 13359c 82 API calls __wsopen_s 96290->96433 96294 cbbe0 40 API calls 96294->96310 96296 cc237 96298 cc253 96296->96298 96435 ca8c7 22 API calls __fread_nolock 96296->96435 96297 caceb 23 API calls 96297->96310 96301 110976 96298->96301 96305 cc297 ISource 96298->96305 96300->96241 96303 caceb 23 API calls 96301->96303 96304 1109bf 96303->96304 96304->96300 96436 13359c 82 API calls __wsopen_s 96304->96436 96305->96304 96306 caceb 23 API calls 96305->96306 96307 cc335 96306->96307 96307->96304 96308 cc342 96307->96308 96367 ca704 22 API calls ISource 96308->96367 96310->96267 96310->96268 96310->96271 96310->96274 96310->96277 96310->96278 96310->96280 96310->96281 96310->96284 96310->96285 96310->96289 96310->96290 96310->96294 96310->96296 96310->96297 96310->96300 96310->96304 96312 dfe0b 22 API calls 96310->96312 96360 cad81 96310->96360 96384 127099 22 API calls __fread_nolock 96310->96384 96385 145745 54 API calls _wcslen 96310->96385 96386 daa42 22 API calls ISource 96310->96386 96387 12f05c 40 API calls 96310->96387 96388 ca993 96310->96388 96313 cc3ac 96311->96313 96378 dce17 22 API calls ISource 96311->96378 96312->96310 96313->96241 96314->96244 96315->96239 96316->96245 96318 cacf9 96317->96318 96324 cad2a ISource 96317->96324 96319 cad55 96318->96319 96320 cad01 ISource 96318->96320 96319->96324 96337 ca8c7 22 API calls __fread_nolock 96319->96337 96322 10fa48 96320->96322 96323 cad21 96320->96323 96320->96324 96322->96324 96338 dce17 22 API calls ISource 96322->96338 96323->96324 96325 10fa3a VariantClear 96323->96325 96324->96255 96325->96324 96330 dfde0 96327->96330 96329 dfdfa 96329->96255 96330->96329 96333 dfdfc 96330->96333 96339 eea0c 96330->96339 96346 e4ead 7 API calls 2 library calls 96330->96346 96332 e066d 96348 e32a4 RaiseException 96332->96348 96333->96332 96347 e32a4 RaiseException 96333->96347 96336 e068a 96336->96255 96337->96324 96338->96324 96344 f3820 _unexpected 96339->96344 96340 f385e 96350 ef2d9 20 API calls _abort 96340->96350 96342 f3849 RtlAllocateHeap 96343 f385c 96342->96343 96342->96344 96343->96330 96344->96340 96344->96342 96349 e4ead 7 API calls 2 library calls 96344->96349 96346->96330 96347->96332 96348->96336 96349->96344 96350->96343 96352 cae01 96351->96352 96355 cae1c ISource 96351->96355 96437 caec9 96352->96437 96354 cae09 CharUpperBuffW 96354->96355 96355->96258 96357 cacae 96356->96357 96358 cacd1 96357->96358 96443 13359c 82 API calls __wsopen_s 96357->96443 96358->96310 96361 10fadb 96360->96361 96362 cad92 96360->96362 96363 dfddb 22 API calls 96362->96363 96364 cad99 96363->96364 96444 cadcd 96364->96444 96367->96311 96371 dfddb 96368->96371 96369 eea0c ___std_exception_copy 21 API calls 96369->96371 96370 dfdfa 96370->96277 96371->96369 96371->96370 96374 dfdfc 96371->96374 96457 e4ead 7 API calls 2 library calls 96371->96457 96373 e066d 96459 e32a4 RaiseException 96373->96459 96374->96373 96458 e32a4 RaiseException 96374->96458 96377 e068a 96377->96277 96378->96311 96379->96263 96380->96300 96381->96278 96382->96300 96383->96300 96384->96310 96385->96310 96386->96310 96387->96310 96460 cbbe0 96388->96460 96390 ca9a3 96391 10f8c8 96390->96391 96392 ca9b1 96390->96392 96393 caceb 23 API calls 96391->96393 96394 dfddb 22 API calls 96392->96394 96395 10f8d3 96393->96395 96396 ca9c2 96394->96396 96397 ca961 22 API calls 96396->96397 96398 ca9cc 96397->96398 96399 ca9db 96398->96399 96468 ca8c7 22 API calls __fread_nolock 96398->96468 96401 dfddb 22 API calls 96399->96401 96402 ca9e5 96401->96402 96469 ca869 40 API calls 96402->96469 96404 caa09 96404->96310 96426 cec76 ISource 96405->96426 96406 dfddb 22 API calls 96406->96426 96408 cfef7 96419 ced9d ISource 96408->96419 96481 ca8c7 22 API calls __fread_nolock 96408->96481 96410 114600 96410->96419 96480 ca8c7 22 API calls __fread_nolock 96410->96480 96411 114b0b 96483 13359c 82 API calls __wsopen_s 96411->96483 96412 ca8c7 22 API calls 96412->96426 96418 e0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96418->96426 96419->96288 96420 cfbe3 96420->96419 96423 114bdc 96420->96423 96428 cf3ae ISource 96420->96428 96421 ca961 22 API calls 96421->96426 96422 e00a3 29 API calls pre_c_initialization 96422->96426 96484 13359c 82 API calls __wsopen_s 96423->96484 96425 114beb 96485 13359c 82 API calls __wsopen_s 96425->96485 96426->96406 96426->96408 96426->96410 96426->96411 96426->96412 96426->96418 96426->96419 96426->96420 96426->96421 96426->96422 96426->96425 96427 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96426->96427 96426->96428 96478 d01e0 270 API calls 2 library calls 96426->96478 96479 d06a0 41 API calls ISource 96426->96479 96427->96426 96428->96419 96482 13359c 82 API calls __wsopen_s 96428->96482 96430 ca826 96429->96430 96431 ca855 96430->96431 96432 ca993 41 API calls 96430->96432 96431->96290 96432->96431 96433->96300 96434->96296 96435->96298 96436->96300 96438 caedc 96437->96438 96442 caed9 __fread_nolock 96437->96442 96439 dfddb 22 API calls 96438->96439 96440 caee7 96439->96440 96441 dfe0b 22 API calls 96440->96441 96441->96442 96442->96354 96443->96358 96450 caddd 96444->96450 96445 cadb6 96445->96310 96446 dfddb 22 API calls 96446->96450 96448 cadcd 22 API calls 96448->96450 96450->96445 96450->96446 96450->96448 96451 ca961 96450->96451 96456 ca8c7 22 API calls __fread_nolock 96450->96456 96452 dfe0b 22 API calls 96451->96452 96453 ca976 96452->96453 96454 dfddb 22 API calls 96453->96454 96455 ca984 96454->96455 96455->96450 96456->96450 96457->96371 96458->96373 96459->96377 96461 cbe27 96460->96461 96465 cbbf3 96460->96465 96461->96390 96463 ca961 22 API calls 96463->96465 96464 cbc9d 96464->96390 96465->96463 96465->96464 96470 e0242 EnterCriticalSection 96465->96470 96475 e00a3 29 API calls __onexit 96465->96475 96476 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96465->96476 96468->96399 96469->96404 96474 e0256 96470->96474 96471 e025b LeaveCriticalSection 96471->96465 96474->96471 96477 e02d6 LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96474->96477 96475->96465 96476->96465 96477->96474 96478->96426 96479->96426 96480->96419 96481->96419 96482->96419 96483->96419 96484->96425 96485->96419 96486 c1044 96491 c10f3 96486->96491 96488 c104a 96527 e00a3 29 API calls __onexit 96488->96527 96490 c1054 96528 c1398 96491->96528 96495 c116a 96496 ca961 22 API calls 96495->96496 96497 c1174 96496->96497 96498 ca961 22 API calls 96497->96498 96499 c117e 96498->96499 96500 ca961 22 API calls 96499->96500 96501 c1188 96500->96501 96502 ca961 22 API calls 96501->96502 96503 c11c6 96502->96503 96504 ca961 22 API calls 96503->96504 96505 c1292 96504->96505 96538 c171c 96505->96538 96509 c12c4 96510 ca961 22 API calls 96509->96510 96511 c12ce 96510->96511 96559 d1940 96511->96559 96513 c12f9 96569 c1aab 96513->96569 96515 c1315 96516 c1325 GetStdHandle 96515->96516 96517 102485 96516->96517 96518 c137a 96516->96518 96517->96518 96519 10248e 96517->96519 96521 c1387 OleInitialize 96518->96521 96520 dfddb 22 API calls 96519->96520 96522 102495 96520->96522 96521->96488 96576 13011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96522->96576 96524 10249e 96577 130944 CreateThread 96524->96577 96526 1024aa CloseHandle 96526->96518 96527->96490 96578 c13f1 96528->96578 96531 c13f1 22 API calls 96532 c13d0 96531->96532 96533 ca961 22 API calls 96532->96533 96534 c13dc 96533->96534 96585 c6b57 96534->96585 96536 c1129 96537 c1bc3 6 API calls 96536->96537 96537->96495 96539 ca961 22 API calls 96538->96539 96540 c172c 96539->96540 96541 ca961 22 API calls 96540->96541 96542 c1734 96541->96542 96543 ca961 22 API calls 96542->96543 96544 c174f 96543->96544 96545 dfddb 22 API calls 96544->96545 96546 c129c 96545->96546 96547 c1b4a 96546->96547 96548 c1b58 96547->96548 96549 ca961 22 API calls 96548->96549 96550 c1b63 96549->96550 96551 ca961 22 API calls 96550->96551 96552 c1b6e 96551->96552 96553 ca961 22 API calls 96552->96553 96554 c1b79 96553->96554 96555 ca961 22 API calls 96554->96555 96556 c1b84 96555->96556 96557 dfddb 22 API calls 96556->96557 96558 c1b96 RegisterWindowMessageW 96557->96558 96558->96509 96560 d1981 96559->96560 96564 d195d 96559->96564 96561 e0242 5 API calls 96560->96561 96565 d198b 96561->96565 96562 e0242 5 API calls 96563 d8727 96562->96563 96568 d196e 96563->96568 96603 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96563->96603 96564->96562 96564->96568 96565->96564 96602 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96565->96602 96568->96513 96570 c1abb 96569->96570 96571 10272d 96569->96571 96572 dfddb 22 API calls 96570->96572 96604 133209 23 API calls 96571->96604 96574 c1ac3 96572->96574 96574->96515 96575 102738 96576->96524 96577->96526 96605 13092a 28 API calls 96577->96605 96579 ca961 22 API calls 96578->96579 96580 c13fc 96579->96580 96581 ca961 22 API calls 96580->96581 96582 c1404 96581->96582 96583 ca961 22 API calls 96582->96583 96584 c13c6 96583->96584 96584->96531 96586 104ba1 96585->96586 96587 c6b67 _wcslen 96585->96587 96598 c93b2 96586->96598 96590 c6b7d 96587->96590 96591 c6ba2 96587->96591 96589 104baa 96589->96589 96597 c6f34 22 API calls 96590->96597 96592 dfddb 22 API calls 96591->96592 96595 c6bae 96592->96595 96594 c6b85 __fread_nolock 96594->96536 96596 dfe0b 22 API calls 96595->96596 96596->96594 96597->96594 96599 c93c0 96598->96599 96600 c93c9 __fread_nolock 96598->96600 96599->96600 96601 caec9 22 API calls 96599->96601 96600->96589 96600->96600 96601->96600 96602->96564 96603->96568 96604->96575 96606 cdee5 96609 cb710 96606->96609 96610 cb72b 96609->96610 96611 110146 96610->96611 96612 1100f8 96610->96612 96638 cb750 96610->96638 96640 1458a2 96611->96640 96615 110102 96612->96615 96618 11010f 96612->96618 96612->96638 96613 e0242 5 API calls 96613->96638 96678 145d33 270 API calls 96615->96678 96635 cba20 96618->96635 96679 1461d0 270 API calls 2 library calls 96618->96679 96621 1103d9 96621->96621 96625 cba4e 96626 110322 96682 145c0c 82 API calls 96626->96682 96629 ca81b 41 API calls 96629->96638 96630 caceb 23 API calls 96630->96638 96633 dd336 40 API calls 96633->96638 96634 cbbe0 40 API calls 96634->96638 96635->96625 96683 13359c 82 API calls __wsopen_s 96635->96683 96636 cec40 270 API calls 96636->96638 96638->96613 96638->96625 96638->96626 96638->96629 96638->96630 96638->96633 96638->96634 96638->96635 96638->96636 96663 dd2f0 96638->96663 96669 da01b 270 API calls 96638->96669 96670 dedcd 22 API calls 96638->96670 96671 e00a3 29 API calls __onexit 96638->96671 96672 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96638->96672 96673 dee53 96638->96673 96677 de5ca 270 API calls 96638->96677 96680 11f6bf 23 API calls 96638->96680 96681 ca8c7 22 API calls __fread_nolock 96638->96681 96641 1458e1 96640->96641 96642 1458cb 96640->96642 96645 e0242 5 API calls 96641->96645 96661 145935 96641->96661 96642->96641 96643 1458d0 96642->96643 96684 145d33 270 API calls 96643->96684 96647 145906 96645->96647 96646 1458dc 96646->96638 96647->96661 96685 dedcd 22 API calls 96647->96685 96648 dd2f0 40 API calls 96648->96661 96650 14591f 96686 e00a3 29 API calls __onexit 96650->96686 96651 145aa8 96691 13359c 82 API calls __wsopen_s 96651->96691 96654 ca81b 41 API calls 96654->96661 96655 145929 96687 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96655->96687 96658 dee53 82 API calls 96658->96661 96660 cec40 270 API calls 96660->96661 96661->96646 96661->96648 96661->96651 96661->96654 96661->96658 96661->96660 96688 da01b 270 API calls 96661->96688 96689 145c0c 82 API calls 96661->96689 96690 de5ca 270 API calls 96661->96690 96665 dd329 96663->96665 96668 dd2fc 96663->96668 96664 dd321 96664->96638 96665->96668 96693 dd336 40 API calls 96665->96693 96668->96664 96692 dd336 40 API calls 96668->96692 96669->96638 96670->96638 96671->96638 96672->96638 96674 dee70 96673->96674 96676 deeb8 96673->96676 96674->96676 96694 13359c 82 API calls __wsopen_s 96674->96694 96676->96638 96677->96638 96678->96618 96679->96635 96680->96638 96681->96638 96682->96635 96683->96621 96684->96646 96685->96650 96686->96655 96687->96661 96688->96661 96689->96661 96690->96661 96691->96646 96692->96664 96693->96668 96694->96676 96695 f8402 96700 f81be 96695->96700 96698 f842a 96706 f81ef try_get_first_available_module 96700->96706 96702 f83ee 96719 f27ec 26 API calls pre_c_initialization 96702->96719 96704 f8343 96704->96698 96712 100984 96704->96712 96705 f8338 96705->96704 96718 ef2d9 20 API calls _abort 96705->96718 96706->96705 96715 e8e0b 40 API calls 2 library calls 96706->96715 96708 f838c 96708->96705 96716 e8e0b 40 API calls 2 library calls 96708->96716 96710 f83ab 96710->96705 96717 e8e0b 40 API calls 2 library calls 96710->96717 96720 100081 96712->96720 96714 10099f 96714->96698 96715->96708 96716->96710 96717->96705 96718->96702 96719->96704 96722 10008d ___BuildCatchObject 96720->96722 96721 10009b 96778 ef2d9 20 API calls _abort 96721->96778 96722->96721 96724 1000d4 96722->96724 96731 10065b 96724->96731 96725 1000a0 96779 f27ec 26 API calls pre_c_initialization 96725->96779 96730 1000aa __wsopen_s 96730->96714 96781 10042f 96731->96781 96734 1006a6 96799 f5221 96734->96799 96735 10068d 96813 ef2c6 20 API calls _abort 96735->96813 96738 1006ab 96739 1006b4 96738->96739 96740 1006cb 96738->96740 96815 ef2c6 20 API calls _abort 96739->96815 96812 10039a CreateFileW 96740->96812 96744 100704 96746 100781 GetFileType 96744->96746 96748 100756 GetLastError 96744->96748 96817 10039a CreateFileW 96744->96817 96745 1006b9 96816 ef2d9 20 API calls _abort 96745->96816 96749 10078c GetLastError 96746->96749 96750 1007d3 96746->96750 96818 ef2a3 20 API calls 2 library calls 96748->96818 96819 ef2a3 20 API calls 2 library calls 96749->96819 96821 f516a 21 API calls 3 library calls 96750->96821 96754 100692 96814 ef2d9 20 API calls _abort 96754->96814 96755 10079a CloseHandle 96755->96754 96756 1007c3 96755->96756 96820 ef2d9 20 API calls _abort 96756->96820 96758 100749 96758->96746 96758->96748 96760 1007f4 96762 100840 96760->96762 96822 1005ab 72 API calls 4 library calls 96760->96822 96761 1007c8 96761->96754 96766 10086d 96762->96766 96823 10014d 72 API calls 4 library calls 96762->96823 96765 100866 96765->96766 96767 10087e 96765->96767 96824 f86ae 96766->96824 96769 1000f8 96767->96769 96770 1008fc CloseHandle 96767->96770 96780 100121 LeaveCriticalSection __wsopen_s 96769->96780 96839 10039a CreateFileW 96770->96839 96772 100927 96773 100931 GetLastError 96772->96773 96774 10095d 96772->96774 96840 ef2a3 20 API calls 2 library calls 96773->96840 96774->96769 96776 10093d 96841 f5333 21 API calls 3 library calls 96776->96841 96778->96725 96779->96730 96780->96730 96782 100450 96781->96782 96783 10046a 96781->96783 96782->96783 96849 ef2d9 20 API calls _abort 96782->96849 96842 1003bf 96783->96842 96786 10045f 96850 f27ec 26 API calls pre_c_initialization 96786->96850 96788 1004a2 96789 1004d1 96788->96789 96851 ef2d9 20 API calls _abort 96788->96851 96798 100524 96789->96798 96853 ed70d 26 API calls 2 library calls 96789->96853 96792 10051f 96794 10059e 96792->96794 96792->96798 96793 1004c6 96852 f27ec 26 API calls pre_c_initialization 96793->96852 96854 f27fc 11 API calls _abort 96794->96854 96797 1005aa 96798->96734 96798->96735 96800 f522d ___BuildCatchObject 96799->96800 96857 f2f5e EnterCriticalSection 96800->96857 96802 f5234 96803 f5259 96802->96803 96808 f52c7 EnterCriticalSection 96802->96808 96809 f527b 96802->96809 96861 f5000 96803->96861 96805 f52a4 __wsopen_s 96805->96738 96808->96809 96810 f52d4 LeaveCriticalSection 96808->96810 96858 f532a 96809->96858 96810->96802 96812->96744 96813->96754 96814->96769 96815->96745 96816->96754 96817->96758 96818->96754 96819->96755 96820->96761 96821->96760 96822->96762 96823->96765 96887 f53c4 96824->96887 96826 f86c4 96900 f5333 21 API calls 3 library calls 96826->96900 96827 f86be 96827->96826 96829 f53c4 __wsopen_s 26 API calls 96827->96829 96838 f86f6 96827->96838 96832 f86ed 96829->96832 96830 f53c4 __wsopen_s 26 API calls 96833 f8702 FindCloseChangeNotification 96830->96833 96831 f871c 96837 f873e 96831->96837 96901 ef2a3 20 API calls 2 library calls 96831->96901 96834 f53c4 __wsopen_s 26 API calls 96832->96834 96833->96826 96835 f870e GetLastError 96833->96835 96834->96838 96835->96826 96837->96769 96838->96826 96838->96830 96839->96772 96840->96776 96841->96774 96845 1003d7 96842->96845 96843 1003f2 96843->96788 96845->96843 96855 ef2d9 20 API calls _abort 96845->96855 96846 100416 96856 f27ec 26 API calls pre_c_initialization 96846->96856 96848 100421 96848->96788 96849->96786 96850->96783 96851->96793 96852->96789 96853->96792 96854->96797 96855->96846 96856->96848 96857->96802 96869 f2fa6 LeaveCriticalSection 96858->96869 96860 f5331 96860->96805 96870 f4c7d 96861->96870 96863 f501f 96878 f29c8 96863->96878 96865 f5012 96865->96863 96877 f3405 11 API calls 2 library calls 96865->96877 96866 f5071 96866->96809 96868 f5147 EnterCriticalSection 96866->96868 96868->96809 96869->96860 96876 f4c8a _unexpected 96870->96876 96871 f4cca 96885 ef2d9 20 API calls _abort 96871->96885 96872 f4cb5 RtlAllocateHeap 96874 f4cc8 96872->96874 96872->96876 96874->96865 96876->96871 96876->96872 96884 e4ead 7 API calls 2 library calls 96876->96884 96877->96865 96879 f29d3 RtlFreeHeap 96878->96879 96883 f29fc _free 96878->96883 96880 f29e8 96879->96880 96879->96883 96886 ef2d9 20 API calls _abort 96880->96886 96882 f29ee GetLastError 96882->96883 96883->96866 96884->96876 96885->96874 96886->96882 96888 f53e6 96887->96888 96889 f53d1 96887->96889 96895 f540b 96888->96895 96904 ef2c6 20 API calls _abort 96888->96904 96902 ef2c6 20 API calls _abort 96889->96902 96892 f53d6 96903 ef2d9 20 API calls _abort 96892->96903 96893 f5416 96905 ef2d9 20 API calls _abort 96893->96905 96895->96827 96897 f53de 96897->96827 96898 f541e 96906 f27ec 26 API calls pre_c_initialization 96898->96906 96900->96831 96901->96837 96902->96892 96903->96897 96904->96893 96905->96898 96906->96897 96907 c2de3 96908 c2df0 __wsopen_s 96907->96908 96909 c2e09 96908->96909 96910 102c2b ___scrt_fastfail 96908->96910 96923 c3aa2 96909->96923 96912 102c47 GetOpenFileNameW 96910->96912 96914 102c96 96912->96914 96916 c6b57 22 API calls 96914->96916 96918 102cab 96916->96918 96918->96918 96920 c2e27 96951 c44a8 96920->96951 96981 101f50 96923->96981 96926 c3ace 96928 c6b57 22 API calls 96926->96928 96927 c3ae9 96987 ca6c3 96927->96987 96930 c3ada 96928->96930 96983 c37a0 96930->96983 96933 c2da5 96934 101f50 __wsopen_s 96933->96934 96935 c2db2 GetLongPathNameW 96934->96935 96936 c6b57 22 API calls 96935->96936 96937 c2dda 96936->96937 96938 c3598 96937->96938 96939 ca961 22 API calls 96938->96939 96940 c35aa 96939->96940 96941 c3aa2 23 API calls 96940->96941 96942 c35b5 96941->96942 96943 c35c0 96942->96943 96948 1032eb 96942->96948 96993 c515f 96943->96993 96950 10330d 96948->96950 97005 dce60 41 API calls 96948->97005 96949 c35df 96949->96920 97006 c4ecb 96951->97006 96954 103833 97028 132cf9 96954->97028 96955 c4ecb 94 API calls 96957 c44e1 96955->96957 96957->96954 96961 c44e9 96957->96961 96958 103848 96959 103869 96958->96959 96960 10384c 96958->96960 96963 dfe0b 22 API calls 96959->96963 97078 c4f39 96960->97078 96964 103854 96961->96964 96965 c44f5 96961->96965 96980 1038ae 96963->96980 97084 12da5a 82 API calls 96964->97084 97077 c940c 136 API calls 2 library calls 96965->97077 96968 103862 96968->96959 96969 c2e31 96970 103a5f 96971 103a67 96970->96971 96972 c4f39 68 API calls 96971->96972 97086 12989b 82 API calls __wsopen_s 96971->97086 96972->96971 96977 c9cb3 22 API calls 96977->96980 96980->96970 96980->96971 96980->96977 97054 12967e 96980->97054 97057 130b5a 96980->97057 97063 ca4a1 96980->97063 97071 c3ff7 96980->97071 97085 1295ad 42 API calls _wcslen 96980->97085 96982 c3aaf GetFullPathNameW 96981->96982 96982->96926 96982->96927 96984 c37ae 96983->96984 96985 c93b2 22 API calls 96984->96985 96986 c2e12 96985->96986 96986->96933 96988 ca6dd 96987->96988 96989 ca6d0 96987->96989 96990 dfddb 22 API calls 96988->96990 96989->96930 96991 ca6e7 96990->96991 96992 dfe0b 22 API calls 96991->96992 96992->96989 96994 c516e 96993->96994 96998 c518f __fread_nolock 96993->96998 96996 dfe0b 22 API calls 96994->96996 96995 dfddb 22 API calls 96997 c35cc 96995->96997 96996->96998 96999 c35f3 96997->96999 96998->96995 97000 c3605 96999->97000 97004 c3624 __fread_nolock 96999->97004 97002 dfe0b 22 API calls 97000->97002 97001 dfddb 22 API calls 97003 c363b 97001->97003 97002->97004 97003->96949 97004->97001 97005->96948 97087 c4e90 LoadLibraryA 97006->97087 97011 c4ef6 LoadLibraryExW 97095 c4e59 LoadLibraryA 97011->97095 97012 103ccf 97014 c4f39 68 API calls 97012->97014 97015 103cd6 97014->97015 97017 c4e59 3 API calls 97015->97017 97019 103cde 97017->97019 97117 c50f5 97019->97117 97020 c4f20 97020->97019 97021 c4f2c 97020->97021 97023 c4f39 68 API calls 97021->97023 97025 c44cd 97023->97025 97025->96954 97025->96955 97027 103d05 97029 132d15 97028->97029 97030 c511f 64 API calls 97029->97030 97031 132d29 97030->97031 97251 132e66 97031->97251 97034 c50f5 40 API calls 97035 132d56 97034->97035 97036 c50f5 40 API calls 97035->97036 97037 132d66 97036->97037 97038 c50f5 40 API calls 97037->97038 97039 132d81 97038->97039 97040 c50f5 40 API calls 97039->97040 97041 132d9c 97040->97041 97042 c511f 64 API calls 97041->97042 97043 132db3 97042->97043 97044 eea0c ___std_exception_copy 21 API calls 97043->97044 97045 132dba 97044->97045 97046 eea0c ___std_exception_copy 21 API calls 97045->97046 97047 132dc4 97046->97047 97048 c50f5 40 API calls 97047->97048 97049 132dd8 97048->97049 97050 1328fe 27 API calls 97049->97050 97052 132dee 97050->97052 97051 132d3f 97051->96958 97052->97051 97257 1322ce 79 API calls 97052->97257 97055 dfe0b 22 API calls 97054->97055 97056 1296ae __fread_nolock 97055->97056 97056->96980 97056->97056 97059 130b65 97057->97059 97058 dfddb 22 API calls 97060 130b7c 97058->97060 97059->97058 97258 c9cb3 97060->97258 97065 ca52b 97063->97065 97069 ca4b1 __fread_nolock 97063->97069 97064 dfddb 22 API calls 97066 ca4b8 97064->97066 97067 dfe0b 22 API calls 97065->97067 97068 dfddb 22 API calls 97066->97068 97070 ca4d6 97066->97070 97067->97069 97068->97070 97069->97064 97070->96980 97072 c400a 97071->97072 97075 c40ae 97071->97075 97073 dfe0b 22 API calls 97072->97073 97076 c403c 97072->97076 97073->97076 97074 dfddb 22 API calls 97074->97076 97075->96980 97076->97074 97076->97075 97077->96969 97079 c4f43 97078->97079 97081 c4f4a 97078->97081 97264 ee678 97079->97264 97082 c4f59 97081->97082 97083 c4f6a FreeLibrary 97081->97083 97082->96964 97083->97082 97084->96968 97085->96980 97086->96971 97088 c4ea8 GetProcAddress 97087->97088 97089 c4ec6 97087->97089 97090 c4eb8 97088->97090 97092 ee5eb 97089->97092 97090->97089 97091 c4ebf FreeLibrary 97090->97091 97091->97089 97125 ee52a 97092->97125 97094 c4eea 97094->97011 97094->97012 97096 c4e8d 97095->97096 97097 c4e6e GetProcAddress 97095->97097 97100 c4f80 97096->97100 97098 c4e7e 97097->97098 97098->97096 97099 c4e86 FreeLibrary 97098->97099 97099->97096 97101 dfe0b 22 API calls 97100->97101 97102 c4f95 97101->97102 97177 c5722 97102->97177 97104 c4fa1 __fread_nolock 97105 c50a5 97104->97105 97106 103d1d 97104->97106 97116 c4fdc 97104->97116 97180 c42a2 CreateStreamOnHGlobal 97105->97180 97191 13304d 74 API calls 97106->97191 97109 103d22 97111 c511f 64 API calls 97109->97111 97110 c50f5 40 API calls 97110->97116 97112 103d45 97111->97112 97113 c50f5 40 API calls 97112->97113 97114 c506e ISource 97113->97114 97114->97020 97116->97109 97116->97110 97116->97114 97186 c511f 97116->97186 97118 103d70 97117->97118 97119 c5107 97117->97119 97213 ee8c4 97119->97213 97122 1328fe 97234 13274e 97122->97234 97124 132919 97124->97027 97128 ee536 ___BuildCatchObject 97125->97128 97126 ee544 97150 ef2d9 20 API calls _abort 97126->97150 97128->97126 97130 ee574 97128->97130 97129 ee549 97151 f27ec 26 API calls pre_c_initialization 97129->97151 97132 ee579 97130->97132 97133 ee586 97130->97133 97152 ef2d9 20 API calls _abort 97132->97152 97142 f8061 97133->97142 97136 ee58f 97137 ee595 97136->97137 97138 ee5a2 97136->97138 97153 ef2d9 20 API calls _abort 97137->97153 97154 ee5d4 LeaveCriticalSection __fread_nolock 97138->97154 97140 ee554 __wsopen_s 97140->97094 97143 f806d ___BuildCatchObject 97142->97143 97155 f2f5e EnterCriticalSection 97143->97155 97145 f807b 97156 f80fb 97145->97156 97149 f80ac __wsopen_s 97149->97136 97150->97129 97151->97140 97152->97140 97153->97140 97154->97140 97155->97145 97163 f811e 97156->97163 97157 f8177 97158 f4c7d _unexpected 20 API calls 97157->97158 97159 f8180 97158->97159 97161 f29c8 _free 20 API calls 97159->97161 97162 f8189 97161->97162 97168 f8088 97162->97168 97174 f3405 11 API calls 2 library calls 97162->97174 97163->97157 97163->97163 97163->97168 97172 e918d EnterCriticalSection 97163->97172 97173 e91a1 LeaveCriticalSection 97163->97173 97165 f81a8 97175 e918d EnterCriticalSection 97165->97175 97169 f80b7 97168->97169 97176 f2fa6 LeaveCriticalSection 97169->97176 97171 f80be 97171->97149 97172->97163 97173->97163 97174->97165 97175->97168 97176->97171 97178 dfddb 22 API calls 97177->97178 97179 c5734 97178->97179 97179->97104 97181 c42bc FindResourceExW 97180->97181 97185 c42d9 97180->97185 97182 1035ba LoadResource 97181->97182 97181->97185 97183 1035cf SizeofResource 97182->97183 97182->97185 97184 1035e3 LockResource 97183->97184 97183->97185 97184->97185 97185->97116 97187 103d90 97186->97187 97188 c512e 97186->97188 97192 eece3 97188->97192 97191->97109 97195 eeaaa 97192->97195 97194 c513c 97194->97116 97198 eeab6 ___BuildCatchObject 97195->97198 97196 eeac2 97208 ef2d9 20 API calls _abort 97196->97208 97198->97196 97199 eeae8 97198->97199 97210 e918d EnterCriticalSection 97199->97210 97200 eeac7 97209 f27ec 26 API calls pre_c_initialization 97200->97209 97203 eeaf4 97211 eec0a 62 API calls 2 library calls 97203->97211 97205 eeb08 97212 eeb27 LeaveCriticalSection __fread_nolock 97205->97212 97207 eead2 __wsopen_s 97207->97194 97208->97200 97209->97207 97210->97203 97211->97205 97212->97207 97216 ee8e1 97213->97216 97215 c5118 97215->97122 97217 ee8ed ___BuildCatchObject 97216->97217 97218 ee92d 97217->97218 97219 ee900 ___scrt_fastfail 97217->97219 97220 ee925 __wsopen_s 97217->97220 97231 e918d EnterCriticalSection 97218->97231 97229 ef2d9 20 API calls _abort 97219->97229 97220->97215 97223 ee937 97232 ee6f8 38 API calls 4 library calls 97223->97232 97224 ee91a 97230 f27ec 26 API calls pre_c_initialization 97224->97230 97227 ee94e 97233 ee96c LeaveCriticalSection __fread_nolock 97227->97233 97229->97224 97230->97220 97231->97223 97232->97227 97233->97220 97237 ee4e8 97234->97237 97236 13275d 97236->97124 97240 ee469 97237->97240 97239 ee505 97239->97236 97241 ee48c 97240->97241 97242 ee478 97240->97242 97246 ee488 __alldvrm 97241->97246 97250 f333f 11 API calls 2 library calls 97241->97250 97248 ef2d9 20 API calls _abort 97242->97248 97245 ee47d 97249 f27ec 26 API calls pre_c_initialization 97245->97249 97246->97239 97248->97245 97249->97246 97250->97246 97256 132e7a 97251->97256 97252 c50f5 40 API calls 97252->97256 97253 132d3b 97253->97034 97253->97051 97254 1328fe 27 API calls 97254->97256 97255 c511f 64 API calls 97255->97256 97256->97252 97256->97253 97256->97254 97256->97255 97257->97051 97259 c9cc2 _wcslen 97258->97259 97260 dfe0b 22 API calls 97259->97260 97261 c9cea __fread_nolock 97260->97261 97262 dfddb 22 API calls 97261->97262 97263 c9d00 97262->97263 97263->96980 97265 ee684 ___BuildCatchObject 97264->97265 97266 ee6aa 97265->97266 97267 ee695 97265->97267 97276 ee6a5 __wsopen_s 97266->97276 97279 e918d EnterCriticalSection 97266->97279 97277 ef2d9 20 API calls _abort 97267->97277 97269 ee69a 97278 f27ec 26 API calls pre_c_initialization 97269->97278 97271 ee6c6 97280 ee602 97271->97280 97274 ee6d1 97296 ee6ee LeaveCriticalSection __fread_nolock 97274->97296 97276->97081 97277->97269 97278->97276 97279->97271 97281 ee60f 97280->97281 97282 ee624 97280->97282 97297 ef2d9 20 API calls _abort 97281->97297 97288 ee61f 97282->97288 97299 edc0b 97282->97299 97284 ee614 97298 f27ec 26 API calls pre_c_initialization 97284->97298 97288->97274 97292 ee646 97316 f862f 97292->97316 97295 f29c8 _free 20 API calls 97295->97288 97296->97276 97297->97284 97298->97288 97300 edc1f 97299->97300 97301 edc23 97299->97301 97305 f4d7a 97300->97305 97301->97300 97302 ed955 __fread_nolock 26 API calls 97301->97302 97303 edc43 97302->97303 97331 f59be 62 API calls 5 library calls 97303->97331 97306 f4d90 97305->97306 97308 ee640 97305->97308 97307 f29c8 _free 20 API calls 97306->97307 97306->97308 97307->97308 97309 ed955 97308->97309 97310 ed976 97309->97310 97311 ed961 97309->97311 97310->97292 97332 ef2d9 20 API calls _abort 97311->97332 97313 ed966 97333 f27ec 26 API calls pre_c_initialization 97313->97333 97315 ed971 97315->97292 97317 f863e 97316->97317 97322 f8653 97316->97322 97334 ef2c6 20 API calls _abort 97317->97334 97319 f868e 97339 ef2c6 20 API calls _abort 97319->97339 97321 f8643 97335 ef2d9 20 API calls _abort 97321->97335 97322->97319 97323 f867a 97322->97323 97336 f8607 97323->97336 97324 f8693 97340 ef2d9 20 API calls _abort 97324->97340 97328 ee64c 97328->97288 97328->97295 97329 f869b 97341 f27ec 26 API calls pre_c_initialization 97329->97341 97331->97300 97332->97313 97333->97315 97334->97321 97335->97328 97342 f8585 97336->97342 97338 f862b 97338->97328 97339->97324 97340->97329 97341->97328 97343 f8591 ___BuildCatchObject 97342->97343 97353 f5147 EnterCriticalSection 97343->97353 97345 f859f 97346 f85c6 97345->97346 97347 f85d1 97345->97347 97349 f86ae __wsopen_s 29 API calls 97346->97349 97354 ef2d9 20 API calls _abort 97347->97354 97350 f85cc 97349->97350 97355 f85fb LeaveCriticalSection __wsopen_s 97350->97355 97352 f85ee __wsopen_s 97352->97338 97353->97345 97354->97350 97355->97352 97356 cdddc 97357 cb710 270 API calls 97356->97357 97358 cddea 97357->97358 97359 112a00 97374 cd7b0 ISource 97359->97374 97360 cdb11 PeekMessageW 97360->97374 97361 cd807 GetInputState 97361->97360 97361->97374 97363 111cbe TranslateAcceleratorW 97363->97374 97364 cda04 timeGetTime 97364->97374 97365 cdb8f PeekMessageW 97365->97374 97366 cdb73 TranslateMessage DispatchMessageW 97366->97365 97367 cdbaf Sleep 97367->97374 97368 112b74 Sleep 97381 112aea 97368->97381 97371 111dda timeGetTime 97460 de300 23 API calls 97371->97460 97374->97360 97374->97361 97374->97363 97374->97364 97374->97365 97374->97366 97374->97367 97374->97368 97374->97371 97377 cd9d5 97374->97377 97380 1529bf GetForegroundWindow 97374->97380 97374->97381 97387 cec40 270 API calls 97374->97387 97389 cbf40 270 API calls 97374->97389 97391 cdd50 97374->97391 97398 d1310 97374->97398 97453 dedf6 97374->97453 97458 cdfd0 270 API calls 3 library calls 97374->97458 97459 de551 timeGetTime 97374->97459 97461 133a2a 23 API calls 97374->97461 97462 13359c 82 API calls __wsopen_s 97374->97462 97375 112c0b GetExitCodeProcess 97378 112c21 WaitForSingleObject 97375->97378 97379 112c37 CloseHandle 97375->97379 97378->97374 97378->97379 97379->97381 97380->97374 97381->97374 97381->97375 97381->97377 97382 112ca9 Sleep 97381->97382 97463 145658 23 API calls 97381->97463 97464 12e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97381->97464 97465 de551 timeGetTime 97381->97465 97466 12d4dc 47 API calls 97381->97466 97382->97374 97387->97374 97389->97374 97392 cdd6f 97391->97392 97393 cdd83 97391->97393 97467 cd260 97392->97467 97499 13359c 82 API calls __wsopen_s 97393->97499 97395 cdd7a 97395->97374 97397 112f75 97397->97397 97399 d1376 97398->97399 97400 d17b0 97398->97400 97401 116331 97399->97401 97404 d1940 9 API calls 97399->97404 97402 e0242 5 API calls 97400->97402 97562 14709c 270 API calls 97401->97562 97405 d17ba 97402->97405 97407 d13a0 97404->97407 97408 d17fb 97405->97408 97410 c9cb3 22 API calls 97405->97410 97406 11633d 97406->97374 97409 d1940 9 API calls 97407->97409 97412 116346 97408->97412 97414 d182c 97408->97414 97411 d13b6 97409->97411 97417 d17d4 97410->97417 97411->97408 97413 d13ec 97411->97413 97563 13359c 82 API calls __wsopen_s 97412->97563 97413->97412 97439 d1408 __fread_nolock 97413->97439 97415 caceb 23 API calls 97414->97415 97418 d1839 97415->97418 97559 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97417->97559 97560 dd217 270 API calls 97418->97560 97421 11636e 97564 13359c 82 API calls __wsopen_s 97421->97564 97422 d152f 97424 1163d1 97422->97424 97425 d153c 97422->97425 97566 145745 54 API calls _wcslen 97424->97566 97427 d1940 9 API calls 97425->97427 97428 d1549 97427->97428 97433 d1940 9 API calls 97428->97433 97436 d15c7 ISource 97428->97436 97429 dfddb 22 API calls 97429->97439 97430 d1872 97430->97401 97561 dfaeb 23 API calls 97430->97561 97431 dfe0b 22 API calls 97431->97439 97438 d1563 97433->97438 97434 d171d 97434->97374 97436->97430 97440 d167b ISource 97436->97440 97442 d1940 9 API calls 97436->97442 97507 df645 97436->97507 97514 140d9c 97436->97514 97527 1519bc 97436->97527 97530 1507dc 97436->97530 97544 15149e 97436->97544 97551 1529bf 97436->97551 97555 14ac5b 97436->97555 97568 13359c 82 API calls __wsopen_s 97436->97568 97437 cec40 270 API calls 97437->97439 97438->97436 97567 ca8c7 22 API calls __fread_nolock 97438->97567 97439->97418 97439->97421 97439->97422 97439->97429 97439->97431 97439->97436 97439->97437 97443 1163b2 97439->97443 97440->97434 97558 dce17 22 API calls ISource 97440->97558 97442->97436 97565 13359c 82 API calls __wsopen_s 97443->97565 97454 dee09 97453->97454 97455 dee12 97453->97455 97454->97374 97455->97454 97456 dee36 IsDialogMessageW 97455->97456 97457 11efaf GetClassLongW 97455->97457 97456->97454 97456->97455 97457->97455 97457->97456 97458->97374 97459->97374 97460->97374 97461->97374 97462->97374 97463->97381 97464->97381 97465->97381 97466->97381 97468 cec40 270 API calls 97467->97468 97471 cd29d 97468->97471 97470 cd30b ISource 97470->97395 97471->97470 97472 cd3c3 97471->97472 97474 cd6d5 97471->97474 97479 cd4b8 97471->97479 97482 dfddb 22 API calls 97471->97482 97485 111bc4 97471->97485 97494 cd429 ISource __fread_nolock 97471->97494 97473 cd3ce 97472->97473 97472->97474 97476 dfddb 22 API calls 97473->97476 97474->97470 97483 dfe0b 22 API calls 97474->97483 97475 cd5ff 97477 111bb5 97475->97477 97478 cd614 97475->97478 97487 cd3d5 __fread_nolock 97476->97487 97505 145705 23 API calls 97477->97505 97481 dfddb 22 API calls 97478->97481 97484 dfe0b 22 API calls 97479->97484 97491 cd46a 97481->97491 97482->97471 97483->97487 97484->97494 97506 13359c 82 API calls __wsopen_s 97485->97506 97486 dfddb 22 API calls 97488 cd3f6 97486->97488 97487->97486 97487->97488 97488->97494 97500 cbec0 270 API calls 97488->97500 97490 111ba4 97504 13359c 82 API calls __wsopen_s 97490->97504 97491->97395 97494->97475 97494->97490 97494->97491 97495 111b7f 97494->97495 97497 111b5d 97494->97497 97501 c1f6f 270 API calls 97494->97501 97503 13359c 82 API calls __wsopen_s 97495->97503 97502 13359c 82 API calls __wsopen_s 97497->97502 97499->97397 97500->97494 97501->97494 97502->97491 97503->97491 97504->97491 97505->97485 97506->97470 97569 cb567 97507->97569 97509 df659 97510 df661 timeGetTime 97509->97510 97511 11f2dc Sleep 97509->97511 97512 cb567 39 API calls 97510->97512 97513 df677 97512->97513 97513->97436 97515 140db6 97514->97515 97517 140ddc 97514->97517 97516 cb567 39 API calls 97515->97516 97518 140dbe 97516->97518 97575 c7510 97517->97575 97518->97517 97521 140dc9 97518->97521 97523 c7510 53 API calls 97521->97523 97525 140dce 97523->97525 97524 140dda 97524->97436 97620 12a396 87 API calls 97525->97620 97934 152ad8 97527->97934 97529 1519cb 97529->97436 97945 14f57d 97530->97945 97532 1507ec 97533 150842 97532->97533 97534 cb567 39 API calls 97532->97534 97536 1507f0 97532->97536 97535 c7510 53 API calls 97533->97535 97537 150818 97534->97537 97538 150857 97535->97538 97536->97436 97537->97533 97539 15081c 97537->97539 97540 12a1c5 140 API calls 97538->97540 97541 c7510 53 API calls 97539->97541 97540->97536 97542 150831 97541->97542 97971 12a396 87 API calls 97542->97971 97545 152ad8 54 API calls 97544->97545 97546 1514ae 97545->97546 97547 1529bf GetForegroundWindow 97546->97547 97548 1514b5 97547->97548 97549 1514eb GetForegroundWindow 97548->97549 97550 1514b9 97548->97550 97549->97550 97550->97436 97552 1529cb 97551->97552 97553 152a01 GetForegroundWindow 97552->97553 97554 1529d1 97552->97554 97553->97554 97554->97436 98006 14ad64 97555->98006 97557 14ac6f 97557->97436 97558->97440 97559->97408 97560->97430 97561->97430 97562->97406 97563->97436 97564->97436 97565->97436 97566->97438 97567->97436 97568->97436 97570 cb578 97569->97570 97571 cb57f 97569->97571 97570->97571 97574 e62d1 39 API calls _strftime 97570->97574 97571->97509 97573 cb5c2 97573->97509 97574->97573 97576 c7525 97575->97576 97592 c7522 97575->97592 97577 c752d 97576->97577 97578 c755b 97576->97578 97621 e51c6 26 API calls 97577->97621 97581 c756d 97578->97581 97587 1050f6 97578->97587 97589 10500f 97578->97589 97622 dfb21 51 API calls 97581->97622 97582 10510e 97582->97582 97585 dfddb 22 API calls 97588 c7547 97585->97588 97586 c753d 97586->97585 97624 e5183 26 API calls 97587->97624 97590 c9cb3 22 API calls 97588->97590 97591 dfe0b 22 API calls 97589->97591 97597 105088 97589->97597 97590->97592 97593 105058 97591->97593 97598 12a1c5 97592->97598 97594 dfddb 22 API calls 97593->97594 97595 10507f 97594->97595 97596 c9cb3 22 API calls 97595->97596 97596->97597 97623 dfb21 51 API calls 97597->97623 97625 12b12f 97598->97625 97601 12a1f6 97762 12a9ed 23 API calls 97601->97762 97602 12a21a 97638 c6270 97602->97638 97605 12a200 97763 129c79 11 API calls 97605->97763 97607 12a210 97607->97602 97608 12a2e7 97610 12a306 97608->97610 97765 12acda 97608->97765 97609 12a227 97609->97608 97643 129f3f 97609->97643 97651 de2a2 97609->97651 97656 12a442 97609->97656 97764 12a324 57 API calls 97609->97764 97613 12b12f 10 API calls 97610->97613 97616 12a312 97613->97616 97616->97524 97620->97524 97621->97586 97622->97586 97623->97587 97624->97582 97626 12b148 GetCurrentThreadId 97625->97626 97627 12b13e 97625->97627 97628 12b163 GetForegroundWindow GetWindowThreadProcessId AttachThreadInput 97626->97628 97629 12b1ea 97626->97629 97627->97626 97637 12a1e1 97627->97637 97632 12b188 GetWindowThreadProcessId 97628->97632 97628->97637 97630 12b214 97629->97630 97631 12b1f4 AttachThreadInput 97629->97631 97633 12b219 AttachThreadInput 97630->97633 97631->97633 97634 12b20e AttachThreadInput 97631->97634 97635 12b1a2 AttachThreadInput 97632->97635 97636 12b1b4 AttachThreadInput 97632->97636 97633->97637 97634->97630 97635->97636 97636->97637 97637->97601 97637->97602 97639 dfe0b 22 API calls 97638->97639 97640 c6295 97639->97640 97641 dfddb 22 API calls 97640->97641 97642 c62a3 97641->97642 97642->97609 97644 129f48 97643->97644 97645 129f78 97643->97645 97644->97645 97646 129f50 IsWindow 97644->97646 97645->97609 97646->97645 97647 129f5d GetForegroundWindow 97646->97647 97647->97645 97648 129f68 97647->97648 97648->97647 97650 129f76 97648->97650 97793 12b0a8 14 API calls 97648->97793 97650->97645 97652 ca6c3 22 API calls 97651->97652 97654 de2b7 97652->97654 97653 de2f2 97653->97609 97654->97653 97794 c49bd 22 API calls __fread_nolock 97654->97794 97657 12a468 97656->97657 97658 ca961 22 API calls 97657->97658 97659 12a476 97658->97659 97660 ca961 22 API calls 97659->97660 97661 12a47e 97660->97661 97662 de2a2 22 API calls 97661->97662 97663 12a493 97662->97663 97665 12a4ef 97663->97665 97674 de2a2 22 API calls 97663->97674 97666 12a5fb 97665->97666 97795 e4a28 97665->97795 97667 12a640 97666->97667 97668 12a606 97666->97668 97670 12a652 97667->97670 97671 12a69e 97667->97671 97669 c4c6d 22 API calls 97668->97669 97672 12a610 97669->97672 97805 12b2df 97670->97805 97676 12a6f2 97671->97676 97677 12a752 97671->97677 97678 12a833 97671->97678 97679 12a850 97671->97679 97680 12a6b1 97671->97680 97681 12a816 97671->97681 97682 12a714 97671->97682 97683 12a7f9 97671->97683 97684 12a73c 97671->97684 97685 12a7e3 97671->97685 97686 12a7c6 97671->97686 97687 12a8a4 97671->97687 97688 12a88a 97671->97688 97689 12a78a 97671->97689 97690 12a86d 97671->97690 97718 12a68d 97671->97718 97857 12b27a VkKeyScanW MapVirtualKeyW 97672->97857 97698 12a4d8 97674->97698 97694 12b2df MapVirtualKeyW 97676->97694 97699 12b2df MapVirtualKeyW 97677->97699 97715 12b2df MapVirtualKeyW 97678->97715 97678->97718 97716 12b2df MapVirtualKeyW 97679->97716 97679->97718 97700 12b2df MapVirtualKeyW 97680->97700 97713 12b2df MapVirtualKeyW 97681->97713 97681->97718 97707 12b2df MapVirtualKeyW 97682->97707 97682->97718 97712 12b2df MapVirtualKeyW 97683->97712 97683->97718 97714 12b2df MapVirtualKeyW 97684->97714 97684->97718 97706 12b2df MapVirtualKeyW 97685->97706 97685->97718 97705 12b2df MapVirtualKeyW 97686->97705 97686->97718 97695 12a8b7 97687->97695 97696 12a636 97687->97696 97703 12b2df MapVirtualKeyW 97688->97703 97688->97718 97692 12b2df MapVirtualKeyW 97689->97692 97702 12b2df MapVirtualKeyW 97690->97702 97690->97718 97701 12a6bb 97692->97701 97693 12a61c 97704 12a624 97693->97704 97723 12a6bf 97693->97723 97694->97701 97720 12b2df MapVirtualKeyW 97695->97720 97743 12a8d1 97695->97743 97859 12a324 57 API calls 97696->97859 97697 12a663 97708 12a6cf 97697->97708 97709 12a66b 97697->97709 97711 e4a28 _strftime 40 API calls 97698->97711 97699->97701 97700->97701 97701->97723 97724 12a6cb 97701->97724 97702->97723 97703->97708 97704->97708 97717 12a62c 97704->97717 97705->97723 97706->97708 97707->97723 97708->97718 97838 12ab9c 97708->97838 97721 12a67b 97709->97721 97729 12a692 97709->97729 97722 12a4e5 97711->97722 97712->97723 97713->97708 97714->97708 97715->97723 97716->97708 97728 c4c6d 22 API calls 97717->97728 97718->97609 97725 12a8c6 97720->97725 97858 12a9ed 23 API calls 97721->97858 97722->97665 97732 e4a28 _strftime 40 API calls 97722->97732 97723->97718 97823 12aa57 97723->97823 97724->97708 97734 12aa57 20 API calls 97724->97734 97730 12aa57 20 API calls 97725->97730 97726 c4c6d 22 API calls 97726->97743 97728->97696 97809 12a982 97729->97809 97730->97743 97736 12a503 97732->97736 97734->97708 97735 12a913 97735->97718 97737 12b2df MapVirtualKeyW 97735->97737 97736->97665 97738 e4a28 _strftime 40 API calls 97736->97738 97737->97708 97740 12a51d 97738->97740 97739 12b2df MapVirtualKeyW 97739->97743 97740->97665 97742 e4a28 _strftime 40 API calls 97740->97742 97741 12aa57 20 API calls 97741->97743 97744 12a539 97742->97744 97743->97726 97743->97735 97743->97739 97743->97741 97745 12ab9c 20 API calls 97743->97745 97744->97665 97852 c4c6d 97744->97852 97745->97743 97748 12a5cc 97856 e62d1 39 API calls _strftime 97748->97856 97749 c4c6d 22 API calls 97751 12a565 97749->97751 97752 12a57b 97751->97752 97753 c4c6d 22 API calls 97751->97753 97754 c93b2 22 API calls 97752->97754 97755 12a575 97753->97755 97756 12a586 97754->97756 97755->97748 97755->97752 97757 c4c6d 22 API calls 97756->97757 97758 12a59a 97757->97758 97855 12b30d 51 API calls 97758->97855 97760 12a5bb 97761 c6b57 22 API calls 97760->97761 97761->97665 97762->97605 97763->97607 97764->97609 97770 12acef 97765->97770 97766 12ad16 GetParent 97767 12ae3c 97766->97767 97768 12ad27 GetKeyboardState 97766->97768 97769 12ae55 97767->97769 97772 12b226 2 API calls 97767->97772 97771 12ad95 97768->97771 97784 12ad38 SetKeyboardState 97768->97784 97773 12ae6d 97769->97773 97776 12b226 2 API calls 97769->97776 97770->97766 97770->97767 97777 12a2f9 97770->97777 97775 12ada6 PostMessageW 97771->97775 97780 12adbd 97771->97780 97772->97769 97774 12ae82 97773->97774 97778 12b226 2 API calls 97773->97778 97779 12ae97 97774->97779 97782 12b226 2 API calls 97774->97782 97775->97780 97776->97773 97792 12a9ed 23 API calls 97777->97792 97778->97774 97783 12aeac 97779->97783 97786 12b226 2 API calls 97779->97786 97781 12adc3 PostMessageW 97780->97781 97790 12adda 97780->97790 97781->97790 97782->97779 97787 129c60 14 API calls 97783->97787 97784->97771 97785 12ae19 97785->97783 97788 12ae23 PostMessageW 97785->97788 97786->97783 97787->97777 97788->97783 97790->97785 97791 12ae14 PostMessageW 97790->97791 97791->97785 97792->97610 97793->97648 97794->97654 97796 e4aab 97795->97796 97797 e4a36 97795->97797 97862 e4abd 40 API calls 3 library calls 97796->97862 97804 e4a5b 97797->97804 97860 ef2d9 20 API calls _abort 97797->97860 97800 e4ab8 97800->97665 97801 e4a42 97861 f27ec 26 API calls pre_c_initialization 97801->97861 97803 e4a4d 97803->97665 97804->97665 97806 12b2ea 97805->97806 97807 12a65b 97806->97807 97808 12b2f7 MapVirtualKeyW 97806->97808 97807->97697 97807->97723 97808->97807 97810 12a993 97809->97810 97811 12a9e7 97809->97811 97812 12b2df MapVirtualKeyW 97810->97812 97811->97718 97813 12a9a4 97812->97813 97863 129f91 97813->97863 97816 12acda 23 API calls 97817 12a9c3 97816->97817 97818 12aa57 20 API calls 97817->97818 97819 12ab9c 20 API calls 97817->97819 97820 12a9de 97817->97820 97818->97817 97819->97817 97901 12aeba 23 API calls 97820->97901 97822 12a9e6 97822->97811 97824 12aa81 97823->97824 97825 12ab3e 97823->97825 97824->97825 97829 12aa9c 97824->97829 97826 12ab43 97825->97826 97827 12ab64 SendInput 97825->97827 97911 12b226 97826->97911 97836 12ab62 97827->97836 97831 12aaa5 GetKeyboardState 97829->97831 97832 12ab2b 97829->97832 97834 12aab6 SetKeyboardState 97831->97834 97837 12aace 97831->97837 97833 12ab33 PostMessageW 97832->97833 97833->97836 97834->97837 97902 129c60 97836->97902 97837->97833 97839 12abc6 97838->97839 97840 12ac7c 97838->97840 97839->97840 97844 12abe1 97839->97844 97841 12aca2 SendInput 97840->97841 97847 12ac81 97840->97847 97842 12aca0 97841->97842 97925 129c49 97842->97925 97844->97842 97846 12abea GetKeyboardState 97844->97846 97848 12abfb SetKeyboardState 97846->97848 97850 12ac13 97846->97850 97849 12b226 2 API calls 97847->97849 97848->97850 97849->97842 97851 12ac71 PostMessageW 97850->97851 97851->97842 97853 caec9 22 API calls 97852->97853 97854 c4c78 97853->97854 97854->97748 97854->97749 97855->97760 97856->97665 97857->97693 97858->97718 97859->97718 97860->97801 97861->97803 97862->97800 97864 129fa5 97863->97864 97865 12a00b GetKeyboardState 97864->97865 97866 12a088 97864->97866 97867 12a1c0 97865->97867 97868 12a020 SetKeyboardState 97865->97868 97870 12a092 GetAsyncKeyState 97866->97870 97867->97816 97868->97867 97871 12a0c0 97870->97871 97872 12a0af GetKeyState 97870->97872 97873 12a0de GetAsyncKeyState 97871->97873 97874 12b2df MapVirtualKeyW 97871->97874 97872->97871 97872->97873 97875 12a100 97873->97875 97876 12a0ef GetKeyState 97873->97876 97877 12a0d3 97874->97877 97878 12a11e GetAsyncKeyState 97875->97878 97880 12b2df MapVirtualKeyW 97875->97880 97876->97875 97876->97878 97879 12ab9c 20 API calls 97877->97879 97881 12a13a 97878->97881 97882 12a12c GetKeyState 97878->97882 97879->97873 97883 12a113 97880->97883 97884 12a155 GetAsyncKeyState 97881->97884 97888 12b2df MapVirtualKeyW 97881->97888 97882->97881 97882->97884 97887 12ab9c 20 API calls 97883->97887 97885 12a163 GetKeyState 97884->97885 97886 12a171 97884->97886 97885->97886 97889 12a18c GetAsyncKeyState 97885->97889 97886->97889 97892 12b2df MapVirtualKeyW 97886->97892 97887->97878 97890 12a14a 97888->97890 97893 12a19a GetKeyState 97889->97893 97896 12a1a3 97889->97896 97891 12ab9c 20 API calls 97890->97891 97891->97884 97894 12a181 97892->97894 97895 12a1be 97893->97895 97893->97896 97897 12ab9c 20 API calls 97894->97897 97895->97867 97896->97895 97898 12b2df MapVirtualKeyW 97896->97898 97897->97889 97899 12a1b3 97898->97899 97900 12ab9c 20 API calls 97899->97900 97900->97895 97901->97822 97905 129c6f 97902->97905 97903 12ab95 97903->97718 97904 12b0b7 Sleep 97904->97903 97905->97903 97905->97904 97907 12b0c0 QueryPerformanceCounter 97905->97907 97907->97904 97910 12b0ce 97907->97910 97908 12b0e7 Sleep QueryPerformanceCounter 97915 de398 97908->97915 97910->97903 97910->97908 97912 12b232 SendInput 97911->97912 97913 12b265 keybd_event 97911->97913 97914 12b276 97912->97914 97913->97914 97914->97836 97916 de3b4 97915->97916 97922 de3ad 97915->97922 97917 e0242 5 API calls 97916->97917 97918 de3c0 97917->97918 97918->97922 97923 de3de QueryPerformanceFrequency 97918->97923 97920 de3d4 97924 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97920->97924 97922->97910 97923->97920 97924->97922 97926 129c57 97925->97926 97927 12b0b7 Sleep 97926->97927 97929 12b0c0 QueryPerformanceCounter 97926->97929 97933 12acd3 97926->97933 97927->97933 97929->97927 97930 12b0ce 97929->97930 97931 12b0e7 Sleep QueryPerformanceCounter 97930->97931 97930->97933 97932 de398 10 API calls 97931->97932 97932->97930 97933->97718 97935 caceb 23 API calls 97934->97935 97936 152af3 97935->97936 97937 152b1d 97936->97937 97938 152aff 97936->97938 97939 c6b57 22 API calls 97937->97939 97940 c7510 53 API calls 97938->97940 97941 152b1b 97939->97941 97942 152b0c 97940->97942 97941->97529 97942->97941 97944 ca8c7 22 API calls __fread_nolock 97942->97944 97944->97941 97946 caceb 23 API calls 97945->97946 97947 14f59e 97946->97947 97948 c7510 53 API calls 97947->97948 97949 14f5ab 97948->97949 97951 14f5be 97949->97951 97993 ca8c7 22 API calls __fread_nolock 97949->97993 97952 14f5fe 97951->97952 97953 14f618 97951->97953 97970 14f5cd 97951->97970 97994 1239c0 22 API calls 97952->97994 97955 14f674 97953->97955 97956 14f643 97953->97956 97953->97970 97959 14f695 97955->97959 97960 14f681 97955->97960 97957 ca961 22 API calls 97956->97957 97958 14f64c 97957->97958 97972 122f52 97958->97972 97963 c7510 53 API calls 97959->97963 97962 cb567 39 API calls 97960->97962 97965 14f686 97962->97965 97966 14f69a 97963->97966 97996 123608 23 API calls 97965->97996 97997 1230f7 44 API calls _wcslen 97966->97997 97970->97532 97971->97536 97973 c6b57 22 API calls 97972->97973 97974 122f6c 97973->97974 97998 122da7 97974->97998 97977 12302a 97979 122da7 4 API calls 97977->97979 97978 122f8c 98003 122dee GetParent 97978->98003 97992 123025 97979->97992 97981 122f95 97981->97977 97982 122f9d 97981->97982 98004 1239c0 22 API calls 97982->98004 97984 122fab GetClassNameW 97985 c6b57 22 API calls 97984->97985 97986 122fdd EnumChildWindows 97985->97986 98005 dfb21 51 API calls 97986->98005 97988 12300a 97989 c6b57 22 API calls 97988->97989 97990 12301c 97989->97990 97991 122da7 4 API calls 97990->97991 97991->97992 97992->97970 97995 1239c0 22 API calls 97992->97995 97993->97951 97994->97970 97995->97970 97996->97970 97997->97970 97999 122dcf GetWindowThreadProcessId GetCurrentThreadId AttachThreadInput 97998->97999 98000 122db6 SendMessageTimeoutW 97998->98000 98001 122dea GetFocus 97999->98001 98000->97999 98000->98001 98001->97977 98001->97978 98003->97981 98004->97984 98005->97988 98007 ca961 22 API calls 98006->98007 98009 14ad77 ___scrt_fastfail 98007->98009 98008 14adce 98011 14adee 98008->98011 98013 c7510 53 API calls 98008->98013 98009->98008 98010 c7510 53 API calls 98009->98010 98012 14adab 98010->98012 98014 14ae3a 98011->98014 98016 c7510 53 API calls 98011->98016 98012->98008 98017 c7510 53 API calls 98012->98017 98015 14ade4 98013->98015 98019 14ae4d ___scrt_fastfail 98014->98019 98021 cb567 39 API calls 98014->98021 98035 c7620 22 API calls _wcslen 98015->98035 98025 14ae04 98016->98025 98020 14adc4 98017->98020 98023 c7510 53 API calls 98019->98023 98034 c7620 22 API calls _wcslen 98020->98034 98021->98019 98024 14ae85 ShellExecuteExW 98023->98024 98026 14aeb0 98024->98026 98025->98014 98027 c7510 53 API calls 98025->98027 98030 14aec8 98026->98030 98031 14af35 GetProcessId 98026->98031 98028 14ae28 98027->98028 98028->98014 98036 ca8c7 22 API calls __fread_nolock 98028->98036 98030->97557 98032 14af48 98031->98032 98033 14af58 CloseHandle 98032->98033 98033->98030 98034->98008 98035->98011 98036->98014 98037 102402 98040 c1410 98037->98040 98041 c144f mciSendStringW 98040->98041 98042 1024b8 DestroyWindow 98040->98042 98043 c146b 98041->98043 98044 c16c6 98041->98044 98055 1024c4 98042->98055 98045 c1479 98043->98045 98043->98055 98044->98043 98046 c16d5 UnregisterHotKey 98044->98046 98073 c182e 98045->98073 98046->98044 98048 1024e2 FindClose 98048->98055 98049 1024d8 98049->98055 98079 c6246 CloseHandle 98049->98079 98051 102509 98054 10251c FreeLibrary 98051->98054 98056 10252d 98051->98056 98053 c148e 98053->98056 98062 c149c 98053->98062 98054->98051 98055->98048 98055->98049 98055->98051 98057 102541 VirtualFree 98056->98057 98064 c1509 98056->98064 98057->98056 98058 c14f8 OleUninitialize 98058->98064 98059 c1514 98063 c1524 98059->98063 98060 102589 98066 102598 ISource 98060->98066 98080 1332eb 6 API calls ISource 98060->98080 98062->98058 98077 c1944 VirtualFreeEx CloseHandle 98063->98077 98064->98059 98064->98060 98069 102627 98066->98069 98081 1264d4 22 API calls ISource 98066->98081 98067 c153a 98067->98066 98070 c161f 98067->98070 98070->98069 98078 c1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 98070->98078 98072 c16c1 98074 c183b 98073->98074 98075 c1480 98074->98075 98082 12702a 22 API calls 98074->98082 98075->98051 98075->98053 98077->98067 98078->98072 98079->98049 98080->98060 98081->98066 98082->98074 98083 cf7bf 98084 cfcb6 98083->98084 98085 cf7d3 98083->98085 98086 caceb 23 API calls 98084->98086 98087 cfcc2 98085->98087 98088 dfddb 22 API calls 98085->98088 98086->98087 98089 caceb 23 API calls 98087->98089 98090 cf7e5 98088->98090 98092 cfd3d 98089->98092 98090->98087 98091 cf83e 98090->98091 98090->98092 98094 d1310 270 API calls 98091->98094 98109 ced9d ISource 98091->98109 98120 131155 22 API calls 98092->98120 98096 cec76 ISource 98094->98096 98095 114beb 98126 13359c 82 API calls __wsopen_s 98095->98126 98096->98095 98098 cfef7 98096->98098 98100 114600 98096->98100 98101 114b0b 98096->98101 98102 cf3ae ISource 98096->98102 98108 ca8c7 22 API calls 98096->98108 98096->98109 98110 cfbe3 98096->98110 98111 ca961 22 API calls 98096->98111 98112 e00a3 29 API calls pre_c_initialization 98096->98112 98115 e0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98096->98115 98116 e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98096->98116 98117 dfddb 22 API calls 98096->98117 98118 d01e0 270 API calls 2 library calls 98096->98118 98119 d06a0 41 API calls ISource 98096->98119 98098->98109 98122 ca8c7 22 API calls __fread_nolock 98098->98122 98100->98109 98121 ca8c7 22 API calls __fread_nolock 98100->98121 98124 13359c 82 API calls __wsopen_s 98101->98124 98102->98109 98123 13359c 82 API calls __wsopen_s 98102->98123 98108->98096 98110->98102 98110->98109 98113 114bdc 98110->98113 98111->98096 98112->98096 98125 13359c 82 API calls __wsopen_s 98113->98125 98115->98096 98116->98096 98117->98096 98118->98096 98119->98096 98120->98109 98121->98109 98122->98109 98123->98109 98124->98109 98125->98095 98126->98109 98127 c1098 98132 c42de 98127->98132 98131 c10a7 98133 ca961 22 API calls 98132->98133 98134 c42f5 GetVersionExW 98133->98134 98135 c6b57 22 API calls 98134->98135 98136 c4342 98135->98136 98137 c93b2 22 API calls 98136->98137 98139 c4378 98136->98139 98138 c436c 98137->98138 98141 c37a0 22 API calls 98138->98141 98140 c441b GetCurrentProcess IsWow64Process 98139->98140 98143 1037df 98139->98143 98142 c4437 98140->98142 98141->98139 98144 c444f LoadLibraryA 98142->98144 98145 103824 GetSystemInfo 98142->98145 98146 c449c GetSystemInfo 98144->98146 98147 c4460 GetProcAddress 98144->98147 98149 c4476 98146->98149 98147->98146 98148 c4470 GetNativeSystemInfo 98147->98148 98148->98149 98150 c447a FreeLibrary 98149->98150 98151 c109d 98149->98151 98150->98151 98152 e00a3 29 API calls __onexit 98151->98152 98152->98131 98153 df698 98154 df6c3 98153->98154 98155 df6a2 98153->98155 98161 11f2f8 98154->98161 98170 124d4a 22 API calls ISource 98154->98170 98162 caf8a 98155->98162 98157 df6b2 98159 caf8a 22 API calls 98157->98159 98160 df6c2 98159->98160 98163 caf98 98162->98163 98169 cafc0 ISource 98162->98169 98164 cafa6 98163->98164 98166 caf8a 22 API calls 98163->98166 98165 cafac 98164->98165 98167 caf8a 22 API calls 98164->98167 98165->98169 98171 cb090 98165->98171 98166->98164 98167->98165 98169->98157 98170->98154 98172 cb09b ISource 98171->98172 98173 cb0d6 ISource 98172->98173 98175 dce17 22 API calls ISource 98172->98175 98173->98169 98175->98173 98176 102ba5 98177 c2b25 98176->98177 98178 102baf 98176->98178 98204 c2b83 7 API calls 98177->98204 98222 c3a5a 98178->98222 98181 102bb8 98183 c9cb3 22 API calls 98181->98183 98185 102bc6 98183->98185 98187 102bf5 98185->98187 98188 102bce 98185->98188 98186 c2b2f 98196 c2b44 98186->98196 98208 c3837 98186->98208 98191 c33c6 22 API calls 98187->98191 98229 c33c6 98188->98229 98193 102bf1 GetForegroundWindow ShellExecuteW 98191->98193 98200 102c26 98193->98200 98195 c2b5f 98202 c2b66 SetCurrentDirectoryW 98195->98202 98196->98195 98218 c30f2 98196->98218 98198 102be7 98201 c33c6 22 API calls 98198->98201 98200->98195 98201->98193 98203 c2b7a 98202->98203 98239 c2cd4 7 API calls 98204->98239 98206 c2b2a 98207 c2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98206->98207 98207->98186 98209 c3862 ___scrt_fastfail 98208->98209 98240 c4212 98209->98240 98212 c38e8 98214 103386 Shell_NotifyIconW 98212->98214 98215 c3906 Shell_NotifyIconW 98212->98215 98244 c3923 98215->98244 98217 c391c 98217->98196 98219 c3154 98218->98219 98220 c3104 ___scrt_fastfail 98218->98220 98219->98195 98221 c3123 Shell_NotifyIconW 98220->98221 98221->98219 98223 101f50 __wsopen_s 98222->98223 98224 c3a67 GetModuleFileNameW 98223->98224 98225 c9cb3 22 API calls 98224->98225 98226 c3a8d 98225->98226 98227 c3aa2 23 API calls 98226->98227 98228 c3a97 98227->98228 98228->98181 98230 c33dd 98229->98230 98231 1030bb 98229->98231 98270 c33ee 98230->98270 98233 dfddb 22 API calls 98231->98233 98235 1030c5 _wcslen 98233->98235 98234 c33e8 98238 c6350 22 API calls 98234->98238 98236 dfe0b 22 API calls 98235->98236 98237 1030fe __fread_nolock 98236->98237 98238->98198 98239->98206 98241 1035a4 98240->98241 98242 c38b7 98240->98242 98241->98242 98243 1035ad DestroyIcon 98241->98243 98242->98212 98266 12c874 42 API calls _strftime 98242->98266 98243->98242 98245 c393f 98244->98245 98246 c3a13 98244->98246 98247 c6270 22 API calls 98245->98247 98246->98217 98248 c394d 98247->98248 98249 103393 LoadStringW 98248->98249 98250 c395a 98248->98250 98252 1033ad 98249->98252 98251 c6b57 22 API calls 98250->98251 98253 c396f 98251->98253 98260 c3994 ___scrt_fastfail 98252->98260 98268 ca8c7 22 API calls __fread_nolock 98252->98268 98254 c397c 98253->98254 98255 1033c9 98253->98255 98254->98252 98258 c3986 98254->98258 98269 c6350 22 API calls 98255->98269 98267 c6350 22 API calls 98258->98267 98263 c39f9 Shell_NotifyIconW 98260->98263 98261 1033d7 98261->98260 98262 c33c6 22 API calls 98261->98262 98264 1033f9 98262->98264 98263->98246 98265 c33c6 22 API calls 98264->98265 98265->98260 98266->98212 98267->98260 98268->98260 98269->98261 98271 c33fe _wcslen 98270->98271 98272 10311d 98271->98272 98273 c3411 98271->98273 98275 dfddb 22 API calls 98272->98275 98280 ca587 98273->98280 98276 103127 98275->98276 98278 dfe0b 22 API calls 98276->98278 98277 c341e __fread_nolock 98277->98234 98279 103157 __fread_nolock 98278->98279 98281 ca59d 98280->98281 98284 ca598 __fread_nolock 98280->98284 98282 10f80f 98281->98282 98283 dfe0b 22 API calls 98281->98283 98283->98284 98284->98277 98285 e03fb 98286 e0407 ___BuildCatchObject 98285->98286 98314 dfeb1 98286->98314 98288 e040e 98289 e0561 98288->98289 98293 e0438 98288->98293 98344 e083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98289->98344 98291 e0568 98337 e4e52 98291->98337 98303 e0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98293->98303 98325 f247d 98293->98325 98299 e0457 98301 e04d8 98333 e0959 98301->98333 98303->98301 98340 e4e1a 38 API calls 3 library calls 98303->98340 98305 e04de 98306 e04f3 98305->98306 98341 e0992 GetModuleHandleW 98306->98341 98308 e04fa 98308->98291 98309 e04fe 98308->98309 98310 e0507 98309->98310 98342 e4df5 28 API calls _abort 98309->98342 98343 e0040 13 API calls 2 library calls 98310->98343 98313 e050f 98313->98299 98315 dfeba 98314->98315 98346 e0698 IsProcessorFeaturePresent 98315->98346 98317 dfec6 98347 e2c94 10 API calls 3 library calls 98317->98347 98319 dfecb 98324 dfecf 98319->98324 98348 f2317 98319->98348 98322 dfee6 98322->98288 98324->98288 98326 f2494 98325->98326 98327 e0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98326->98327 98328 e0451 98327->98328 98328->98299 98329 f2421 98328->98329 98330 f2450 98329->98330 98331 e0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98330->98331 98332 f2479 98331->98332 98332->98303 98399 e2340 98333->98399 98336 e097f 98336->98305 98401 e4bcf 98337->98401 98340->98301 98341->98308 98342->98310 98343->98313 98344->98291 98346->98317 98347->98319 98352 fd1f6 98348->98352 98351 e2cbd 8 API calls 3 library calls 98351->98324 98353 fd213 98352->98353 98356 fd20f 98352->98356 98353->98356 98358 f4bfb 98353->98358 98355 dfed8 98355->98322 98355->98351 98370 e0a8c 98356->98370 98359 f4c07 ___BuildCatchObject 98358->98359 98377 f2f5e EnterCriticalSection 98359->98377 98361 f4c0e 98378 f50af 98361->98378 98363 f4c1d 98364 f4c2c 98363->98364 98391 f4a8f 29 API calls 98363->98391 98393 f4c48 LeaveCriticalSection _abort 98364->98393 98367 f4c27 98392 f4b45 GetStdHandle GetFileType 98367->98392 98368 f4c3d __wsopen_s 98368->98353 98371 e0a97 IsProcessorFeaturePresent 98370->98371 98372 e0a95 98370->98372 98374 e0c5d 98371->98374 98372->98355 98398 e0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98374->98398 98376 e0d40 98376->98355 98377->98361 98379 f50bb ___BuildCatchObject 98378->98379 98380 f50df 98379->98380 98381 f50c8 98379->98381 98394 f2f5e EnterCriticalSection 98380->98394 98395 ef2d9 20 API calls _abort 98381->98395 98384 f50cd 98396 f27ec 26 API calls pre_c_initialization 98384->98396 98386 f50d7 __wsopen_s 98386->98363 98387 f50eb 98389 f5000 __wsopen_s 21 API calls 98387->98389 98390 f5117 98387->98390 98389->98387 98397 f513e LeaveCriticalSection _abort 98390->98397 98391->98367 98392->98364 98393->98368 98394->98387 98395->98384 98396->98386 98397->98386 98398->98376 98400 e096c GetStartupInfoW 98399->98400 98400->98336 98402 e4bdb _unexpected 98401->98402 98403 e4bf4 98402->98403 98404 e4be2 98402->98404 98425 f2f5e EnterCriticalSection 98403->98425 98440 e4d29 GetModuleHandleW 98404->98440 98407 e4c99 98429 e4cd9 98407->98429 98408 e4be7 98408->98403 98441 e4d6d GetModuleHandleExW 98408->98441 98412 e4c70 98414 e4c88 98412->98414 98419 f2421 _abort 5 API calls 98412->98419 98420 f2421 _abort 5 API calls 98414->98420 98415 e4bfb 98415->98407 98415->98412 98426 f21a8 98415->98426 98416 e4cb6 98432 e4ce8 98416->98432 98417 e4ce2 98449 101d29 5 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 98417->98449 98419->98414 98420->98407 98425->98415 98450 f1ee1 98426->98450 98469 f2fa6 LeaveCriticalSection 98429->98469 98431 e4cb2 98431->98416 98431->98417 98470 f360c 98432->98470 98435 e4d16 98438 e4d6d _abort 8 API calls 98435->98438 98436 e4cf6 GetPEB 98436->98435 98437 e4d06 GetCurrentProcess TerminateProcess 98436->98437 98437->98435 98439 e4d1e ExitProcess 98438->98439 98440->98408 98442 e4dba 98441->98442 98443 e4d97 GetProcAddress 98441->98443 98445 e4dc9 98442->98445 98446 e4dc0 FreeLibrary 98442->98446 98444 e4dac 98443->98444 98444->98442 98447 e0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98445->98447 98446->98445 98448 e4bf3 98447->98448 98448->98403 98453 f1e90 98450->98453 98452 f1f05 98452->98412 98454 f1e9c ___BuildCatchObject 98453->98454 98461 f2f5e EnterCriticalSection 98454->98461 98456 f1eaa 98462 f1f31 98456->98462 98460 f1ec8 __wsopen_s 98460->98452 98461->98456 98465 f1f51 98462->98465 98466 f1f59 98462->98466 98463 e0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98464 f1eb7 98463->98464 98468 f1ed5 LeaveCriticalSection _abort 98464->98468 98465->98463 98466->98465 98467 f29c8 _free 20 API calls 98466->98467 98467->98465 98468->98460 98469->98431 98471 f3627 98470->98471 98472 f3631 98470->98472 98474 e0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98471->98474 98477 f2fd7 5 API calls 2 library calls 98472->98477 98475 e4cf2 98474->98475 98475->98435 98475->98436 98476 f3648 98476->98471 98477->98476 98478 c105b 98483 c344d 98478->98483 98480 c106a 98514 e00a3 29 API calls __onexit 98480->98514 98482 c1074 98484 c345d __wsopen_s 98483->98484 98485 ca961 22 API calls 98484->98485 98486 c3513 98485->98486 98487 c3a5a 24 API calls 98486->98487 98488 c351c 98487->98488 98515 c3357 98488->98515 98491 c33c6 22 API calls 98492 c3535 98491->98492 98493 c515f 22 API calls 98492->98493 98494 c3544 98493->98494 98495 ca961 22 API calls 98494->98495 98496 c354d 98495->98496 98497 ca6c3 22 API calls 98496->98497 98498 c3556 RegOpenKeyExW 98497->98498 98499 103176 RegQueryValueExW 98498->98499 98503 c3578 98498->98503 98500 103193 98499->98500 98501 10320c RegCloseKey 98499->98501 98502 dfe0b 22 API calls 98500->98502 98501->98503 98513 10321e _wcslen 98501->98513 98504 1031ac 98502->98504 98503->98480 98506 c5722 22 API calls 98504->98506 98505 c4c6d 22 API calls 98505->98513 98507 1031b7 RegQueryValueExW 98506->98507 98508 1031d4 98507->98508 98510 1031ee ISource 98507->98510 98509 c6b57 22 API calls 98508->98509 98509->98510 98510->98501 98511 c9cb3 22 API calls 98511->98513 98512 c515f 22 API calls 98512->98513 98513->98503 98513->98505 98513->98511 98513->98512 98514->98482 98516 101f50 __wsopen_s 98515->98516 98517 c3364 GetFullPathNameW 98516->98517 98518 c3386 98517->98518 98519 c6b57 22 API calls 98518->98519 98520 c33a4 98519->98520 98520->98491 98521 c3156 98524 c3170 98521->98524 98525 c3187 98524->98525 98526 c318c 98525->98526 98527 c31eb 98525->98527 98564 c31e9 98525->98564 98528 c3199 98526->98528 98529 c3265 PostQuitMessage 98526->98529 98531 102dfb 98527->98531 98532 c31f1 98527->98532 98536 c31a4 98528->98536 98537 102e7c 98528->98537 98538 c316a 98529->98538 98530 c31d0 DefWindowProcW 98530->98538 98579 c18e2 10 API calls 98531->98579 98533 c321d SetTimer RegisterWindowMessageW 98532->98533 98534 c31f8 98532->98534 98533->98538 98542 c3246 CreatePopupMenu 98533->98542 98539 102d9c 98534->98539 98540 c3201 KillTimer 98534->98540 98543 c31ae 98536->98543 98544 102e68 98536->98544 98582 12bf30 34 API calls ___scrt_fastfail 98537->98582 98552 102da1 98539->98552 98553 102dd7 MoveWindow 98539->98553 98546 c30f2 Shell_NotifyIconW 98540->98546 98541 102e1c 98580 de499 42 API calls 98541->98580 98542->98538 98549 c31b9 98543->98549 98550 102e4d 98543->98550 98569 12c161 98544->98569 98554 c3214 98546->98554 98555 c31c4 98549->98555 98556 c3253 98549->98556 98550->98530 98581 120ad7 22 API calls 98550->98581 98551 102e8e 98551->98530 98551->98538 98557 102dc6 SetFocus 98552->98557 98558 102da7 98552->98558 98553->98538 98576 c3c50 DeleteObject DestroyWindow 98554->98576 98555->98530 98566 c30f2 Shell_NotifyIconW 98555->98566 98577 c326f 44 API calls ___scrt_fastfail 98556->98577 98557->98538 98558->98555 98562 102db0 98558->98562 98578 c18e2 10 API calls 98562->98578 98564->98530 98565 c3263 98565->98538 98567 102e41 98566->98567 98568 c3837 49 API calls 98567->98568 98568->98564 98570 12c276 98569->98570 98571 12c179 ___scrt_fastfail 98569->98571 98570->98538 98572 c3923 24 API calls 98571->98572 98574 12c1a0 98572->98574 98573 12c25f KillTimer SetTimer 98573->98570 98574->98573 98575 12c251 Shell_NotifyIconW 98574->98575 98575->98573 98576->98538 98577->98565 98578->98538 98579->98541 98580->98555 98581->98564 98582->98551 98583 c2e37 98584 ca961 22 API calls 98583->98584 98585 c2e4d 98584->98585 98662 c4ae3 98585->98662 98587 c2e6b 98588 c3a5a 24 API calls 98587->98588 98589 c2e7f 98588->98589 98590 c9cb3 22 API calls 98589->98590 98591 c2e8c 98590->98591 98592 c4ecb 94 API calls 98591->98592 98593 c2ea5 98592->98593 98594 102cb0 98593->98594 98595 c2ead 98593->98595 98596 132cf9 80 API calls 98594->98596 98676 ca8c7 22 API calls __fread_nolock 98595->98676 98597 102cc3 98596->98597 98599 102ccf 98597->98599 98601 c4f39 68 API calls 98597->98601 98603 c4f39 68 API calls 98599->98603 98600 c2ec3 98677 c6f88 22 API calls 98600->98677 98601->98599 98605 102ce5 98603->98605 98604 c2ecf 98606 c9cb3 22 API calls 98604->98606 98688 c3084 22 API calls 98605->98688 98607 c2edc 98606->98607 98608 ca81b 41 API calls 98607->98608 98610 c2eec 98608->98610 98612 c9cb3 22 API calls 98610->98612 98611 102d02 98689 c3084 22 API calls 98611->98689 98614 c2f12 98612->98614 98615 ca81b 41 API calls 98614->98615 98618 c2f21 98615->98618 98616 102d1e 98617 c3a5a 24 API calls 98616->98617 98619 102d44 98617->98619 98622 ca961 22 API calls 98618->98622 98690 c3084 22 API calls 98619->98690 98621 102d50 98691 ca8c7 22 API calls __fread_nolock 98621->98691 98624 c2f3f 98622->98624 98678 c3084 22 API calls 98624->98678 98625 102d5e 98692 c3084 22 API calls 98625->98692 98628 c2f4b 98630 e4a28 _strftime 40 API calls 98628->98630 98629 102d6d 98693 ca8c7 22 API calls __fread_nolock 98629->98693 98631 c2f59 98630->98631 98631->98605 98632 c2f63 98631->98632 98634 e4a28 _strftime 40 API calls 98632->98634 98636 c2f6e 98634->98636 98635 102d83 98694 c3084 22 API calls 98635->98694 98636->98611 98638 c2f78 98636->98638 98639 e4a28 _strftime 40 API calls 98638->98639 98641 c2f83 98639->98641 98640 102d90 98641->98616 98642 c2f8d 98641->98642 98643 e4a28 _strftime 40 API calls 98642->98643 98644 c2f98 98643->98644 98645 c2fdc 98644->98645 98679 c3084 22 API calls 98644->98679 98645->98629 98646 c2fe8 98645->98646 98646->98640 98682 c63eb 22 API calls 98646->98682 98649 c2fbf 98680 ca8c7 22 API calls __fread_nolock 98649->98680 98650 c2ff8 98683 c6a50 22 API calls 98650->98683 98653 c2fcd 98681 c3084 22 API calls 98653->98681 98654 c3006 98684 c70b0 23 API calls 98654->98684 98659 c3021 98660 c3065 98659->98660 98685 c6f88 22 API calls 98659->98685 98686 c70b0 23 API calls 98659->98686 98687 c3084 22 API calls 98659->98687 98663 c4af0 __wsopen_s 98662->98663 98664 c6b57 22 API calls 98663->98664 98665 c4b22 98663->98665 98664->98665 98666 c4c6d 22 API calls 98665->98666 98675 c4b58 98665->98675 98666->98665 98667 c4c29 98668 c9cb3 22 API calls 98667->98668 98671 c4c5e 98667->98671 98670 c4c52 98668->98670 98669 c9cb3 22 API calls 98669->98675 98673 c515f 22 API calls 98670->98673 98671->98587 98672 c4c6d 22 API calls 98672->98675 98673->98671 98674 c515f 22 API calls 98674->98675 98675->98667 98675->98669 98675->98672 98675->98674 98676->98600 98677->98604 98678->98628 98679->98649 98680->98653 98681->98645 98682->98650 98683->98654 98684->98659 98685->98659 98686->98659 98687->98659 98688->98611 98689->98616 98690->98621 98691->98625 98692->98629 98693->98635 98694->98640 98695 c1033 98700 c4c91 98695->98700 98699 c1042 98701 ca961 22 API calls 98700->98701 98702 c4cff 98701->98702 98708 c3af0 98702->98708 98705 c4d9c 98706 c1038 98705->98706 98711 c51f7 22 API calls __fread_nolock 98705->98711 98707 e00a3 29 API calls __onexit 98706->98707 98707->98699 98712 c3b1c 98708->98712 98711->98705 98713 c3b0f 98712->98713 98714 c3b29 98712->98714 98713->98705 98714->98713 98715 c3b30 RegOpenKeyExW 98714->98715 98715->98713 98716 c3b4a RegQueryValueExW 98715->98716 98717 c3b80 RegCloseKey 98716->98717 98718 c3b6b 98716->98718 98717->98713 98718->98717

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 234 c42de-c434d call ca961 GetVersionExW call c6b57 239 103617-10362a 234->239 240 c4353 234->240 242 10362b-10362f 239->242 241 c4355-c4357 240->241 243 c435d-c43bc call c93b2 call c37a0 241->243 244 103656 241->244 245 103631 242->245 246 103632-10363e 242->246 263 c43c2-c43c4 243->263 264 1037df-1037e6 243->264 250 10365d-103660 244->250 245->246 246->242 247 103640-103642 246->247 247->241 249 103648-10364f 247->249 249->239 252 103651 249->252 253 103666-1036a8 250->253 254 c441b-c4435 GetCurrentProcess IsWow64Process 250->254 252->244 253->254 258 1036ae-1036b1 253->258 256 c4494-c449a 254->256 257 c4437 254->257 260 c443d-c4449 256->260 257->260 261 1036b3-1036bd 258->261 262 1036db-1036e5 258->262 265 c444f-c445e LoadLibraryA 260->265 266 103824-103828 GetSystemInfo 260->266 267 1036ca-1036d6 261->267 268 1036bf-1036c5 261->268 270 1036e7-1036f3 262->270 271 1036f8-103702 262->271 263->250 269 c43ca-c43dd 263->269 272 103806-103809 264->272 273 1037e8 264->273 276 c449c-c44a6 GetSystemInfo 265->276 277 c4460-c446e GetProcAddress 265->277 267->254 268->254 278 103726-10372f 269->278 279 c43e3-c43e5 269->279 270->254 281 103704-103710 271->281 282 103715-103721 271->282 274 1037f4-1037fc 272->274 275 10380b-10381a 272->275 280 1037ee 273->280 274->272 275->280 285 10381c-103822 275->285 287 c4476-c4478 276->287 277->276 286 c4470-c4474 GetNativeSystemInfo 277->286 283 103731-103737 278->283 284 10373c-103748 278->284 288 c43eb-c43ee 279->288 289 10374d-103762 279->289 280->274 281->254 282->254 283->254 284->254 285->274 286->287 292 c447a-c447b FreeLibrary 287->292 293 c4481-c4493 287->293 294 103791-103794 288->294 295 c43f4-c440f 288->295 290 103764-10376a 289->290 291 10376f-10377b 289->291 290->254 291->254 292->293 294->254 298 10379a-1037c1 294->298 296 103780-10378c 295->296 297 c4415 295->297 296->254 297->254 299 1037c3-1037c9 298->299 300 1037ce-1037da 298->300 299->254 300->254
                                    APIs
                                    • GetVersionExW.KERNEL32(?), ref: 000C430D
                                      • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                    • GetCurrentProcess.KERNEL32(?,0015CB64,00000000,?,?), ref: 000C4422
                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 000C4429
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 000C4454
                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 000C4466
                                    • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 000C4474
                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 000C447B
                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 000C44A0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                    • API String ID: 3290436268-3101561225
                                    • Opcode ID: 4163626d5772927278403cfea605f28f49a57f836d3b1fdd8a9b53bf3e80218d
                                    • Instruction ID: db7587102a40a58df5881e0f1bc71648e5fcf250f3e98e4bbb80a9438556a350
                                    • Opcode Fuzzy Hash: 4163626d5772927278403cfea605f28f49a57f836d3b1fdd8a9b53bf3e80218d
                                    • Instruction Fuzzy Hash: 3FA18376D0A3C2FFC716CB6A78416AD7FB87B26320B18449ED49197E62D36047C8CB61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 659 c42a2-c42ba CreateStreamOnHGlobal 660 c42bc-c42d3 FindResourceExW 659->660 661 c42da-c42dd 659->661 662 c42d9 660->662 663 1035ba-1035c9 LoadResource 660->663 662->661 663->662 664 1035cf-1035dd SizeofResource 663->664 664->662 665 1035e3-1035ee LockResource 664->665 665->662 666 1035f4-103612 665->666 666->662
                                    APIs
                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,000C50AA,?,?,00000000,00000000), ref: 000C42B2
                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,000C50AA,?,?,00000000,00000000), ref: 000C42C9
                                    • LoadResource.KERNEL32(?,00000000,?,?,000C50AA,?,?,00000000,00000000,?,?,?,?,?,?,000C4F20), ref: 001035BE
                                    • SizeofResource.KERNEL32(?,00000000,?,?,000C50AA,?,?,00000000,00000000,?,?,?,?,?,?,000C4F20), ref: 001035D3
                                    • LockResource.KERNEL32(000C50AA,?,?,000C50AA,?,?,00000000,00000000,?,?,?,?,?,?,000C4F20,?), ref: 001035E6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                    • String ID: SCRIPT
                                    • API String ID: 3051347437-3967369404
                                    • Opcode ID: d76a7e9d54f7317ce1fcaadf43784a9dcaf41a1448cac42d0c233214586b4fe7
                                    • Instruction ID: 82bd68b8611ed767056485405dd692ce703ab16ce168d5a52986b413788a9dbf
                                    • Opcode Fuzzy Hash: d76a7e9d54f7317ce1fcaadf43784a9dcaf41a1448cac42d0c233214586b4fe7
                                    • Instruction Fuzzy Hash: 6F117C70600700FFD7218F65DC49F2B7BB9EBC5B52F20416DB8169A6A0DB71D840DA60

                                    Control-flow Graph

                                    APIs
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 000C2B6B
                                      • Part of subcall function 000C3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00191418,?,000C2E7F,?,?,?,00000000), ref: 000C3A78
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • GetForegroundWindow.USER32(runas,?,?,?,?,?,00182224), ref: 00102C10
                                    • ShellExecuteW.SHELL32(00000000,?,?,00182224), ref: 00102C17
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                    • String ID: runas
                                    • API String ID: 448630720-4000483414
                                    • Opcode ID: f85ad8ee3258eff73bb439d9cf37878e42217051186c7db572d82a1c8f7544dd
                                    • Instruction ID: 679c2b2f75c00d100f84de83dfcfcf83a512bd1902dfed9549f553438934faa0
                                    • Opcode Fuzzy Hash: f85ad8ee3258eff73bb439d9cf37878e42217051186c7db572d82a1c8f7544dd
                                    • Instruction Fuzzy Hash: 7311E631208342AACB14FF60D896FFEBBA5AF95300F44542DF082174A3CF318A8AC752
                                    APIs
                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0012AAAC
                                    • SetKeyboardState.USER32(00000080), ref: 0012AAC8
                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0012AB36
                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0012AB88
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: KeyboardState$InputMessagePostSend
                                    • String ID:
                                    • API String ID: 432972143-0
                                    • Opcode ID: a9d5e39300a76ea2446561aa6425851d8e9769717c9bc472192b3c0b3ec7b417
                                    • Instruction ID: 54da06744b220e1ca42f67a3b4830adb48a13c7bbdabfeab80d90d2aa51dc230
                                    • Opcode Fuzzy Hash: a9d5e39300a76ea2446561aa6425851d8e9769717c9bc472192b3c0b3ec7b417
                                    • Instruction Fuzzy Hash: C6314B30A40328AFFF35CB68EC05BFE7BA6AF54310F84421AF581961D0D37599A5C7A2
                                    APIs
                                    • GetCurrentProcess.KERNEL32(000F28E9,?,000E4CBE,000F28E9,001888B8,0000000C,000E4E15,000F28E9,00000002,00000000,?,000F28E9), ref: 000E4D09
                                    • TerminateProcess.KERNEL32(00000000,?,000E4CBE,000F28E9,001888B8,0000000C,000E4E15,000F28E9,00000002,00000000,?,000F28E9), ref: 000E4D10
                                    • ExitProcess.KERNEL32 ref: 000E4D22
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process$CurrentExitTerminate
                                    • String ID:
                                    • API String ID: 1703294689-0
                                    • Opcode ID: 66f8686cbf4736b9a9c41be0c083c6917ea6fb9b471e8d7654a85c7517337271
                                    • Instruction ID: 7de24a0c3dc984b89390039695ef4fcf811715bcdd8066b4b8912559b1620468
                                    • Opcode Fuzzy Hash: 66f8686cbf4736b9a9c41be0c083c6917ea6fb9b471e8d7654a85c7517337271
                                    • Instruction Fuzzy Hash: B2E0B631005788EFCF51AF55DD09A983F69FF81792B108054FD05DA623CB35DD82DA80
                                    APIs
                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0012B25D
                                    • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 0012B270
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: InputSendkeybd_event
                                    • String ID:
                                    • API String ID: 3536248340-0
                                    • Opcode ID: 6c1696db836a9d3458c763f15b59b799c60b0132ef55df125931a3a6008623c0
                                    • Instruction ID: 4c2b865533df043d283452ff297b6f8029bb191b6ab6b04389a22c32e88b160b
                                    • Opcode Fuzzy Hash: 6c1696db836a9d3458c763f15b59b799c60b0132ef55df125931a3a6008623c0
                                    • Instruction Fuzzy Hash: 87F01D7190438EEFDB059FA0D805BAE7FB4FF08305F008009F965A9192D3799651DF94
                                    APIs
                                    • GetInputState.USER32 ref: 000CD807
                                    • timeGetTime.WINMM ref: 000CDA07
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000CDB28
                                    • TranslateMessage.USER32(?), ref: 000CDB7B
                                    • DispatchMessageW.USER32(?), ref: 000CDB89
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000CDB9F
                                    • Sleep.KERNEL32(0000000A), ref: 000CDBB1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                    • String ID:
                                    • API String ID: 2189390790-0
                                    • Opcode ID: ece840113185085cff870311e3a4483cf964502eb8c9665afed6b37d2cafcef7
                                    • Instruction ID: 55cee646107b16d88bcb72dce43a50625d4022677e09d370cec81926d059cb38
                                    • Opcode Fuzzy Hash: ece840113185085cff870311e3a4483cf964502eb8c9665afed6b37d2cafcef7
                                    • Instruction Fuzzy Hash: 2642AE30608342EFD728DF24C885FAEB7E1BF86304F14456EE5568B692D770A894DB92

                                    Control-flow Graph

                                    APIs
                                    • GetSysColorBrush.USER32(0000000F), ref: 000C2D07
                                    • RegisterClassExW.USER32(00000030), ref: 000C2D31
                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 000C2D42
                                    • InitCommonControlsEx.COMCTL32(?), ref: 000C2D5F
                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 000C2D6F
                                    • LoadIconW.USER32(000000A9), ref: 000C2D85
                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 000C2D94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                    • API String ID: 2914291525-1005189915
                                    • Opcode ID: 67de3d04cbce7eaac04c98d75b28353ac3b286e51f674e27bc55d62b0453c15d
                                    • Instruction ID: be21fe7e0f91b3c0d721edfd9c1b17c86909716ac55c3459bb1d50b7e0575016
                                    • Opcode Fuzzy Hash: 67de3d04cbce7eaac04c98d75b28353ac3b286e51f674e27bc55d62b0453c15d
                                    • Instruction Fuzzy Hash: C621F2B5901309EFDB00DFA4EC89BDDBBB4FB08706F00811AF911AAAA0D7B10584CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 302 10065b-10068b call 10042f 305 1006a6-1006b2 call f5221 302->305 306 10068d-100698 call ef2c6 302->306 312 1006b4-1006c9 call ef2c6 call ef2d9 305->312 313 1006cb-100714 call 10039a 305->313 311 10069a-1006a1 call ef2d9 306->311 322 10097d-100983 311->322 312->311 320 100781-10078a GetFileType 313->320 321 100716-10071f 313->321 327 1007d3-1007d6 320->327 328 10078c-1007bd GetLastError call ef2a3 CloseHandle 320->328 325 100721-100725 321->325 326 100756-10077c GetLastError call ef2a3 321->326 325->326 331 100727-100754 call 10039a 325->331 326->311 329 1007d8-1007dd 327->329 330 1007df-1007e5 327->330 328->311 339 1007c3-1007ce call ef2d9 328->339 334 1007e9-100837 call f516a 329->334 330->334 335 1007e7 330->335 331->320 331->326 345 100847-10086b call 10014d 334->345 346 100839-100845 call 1005ab 334->346 335->334 339->311 351 10086d 345->351 352 10087e-1008c1 345->352 346->345 353 10086f-100879 call f86ae 346->353 351->353 355 1008e2-1008f0 352->355 356 1008c3-1008c7 352->356 353->322 359 1008f6-1008fa 355->359 360 10097b 355->360 356->355 358 1008c9-1008dd 356->358 358->355 359->360 361 1008fc-10092f CloseHandle call 10039a 359->361 360->322 364 100931-10095d GetLastError call ef2a3 call f5333 361->364 365 100963-100977 361->365 364->365 365->360
                                    APIs
                                      • Part of subcall function 0010039A: CreateFileW.KERNEL32(00000000,00000000,?,00100704,?,?,00000000,?,00100704,00000000,0000000C), ref: 001003B7
                                    • GetLastError.KERNEL32 ref: 0010076F
                                    • __dosmaperr.LIBCMT ref: 00100776
                                    • GetFileType.KERNEL32(00000000), ref: 00100782
                                    • GetLastError.KERNEL32 ref: 0010078C
                                    • __dosmaperr.LIBCMT ref: 00100795
                                    • CloseHandle.KERNEL32(00000000), ref: 001007B5
                                    • CloseHandle.KERNEL32(?), ref: 001008FF
                                    • GetLastError.KERNEL32 ref: 00100931
                                    • __dosmaperr.LIBCMT ref: 00100938
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                    • String ID: H
                                    • API String ID: 4237864984-2852464175
                                    • Opcode ID: 25838155a07724deea7506e28cf2246fd269850ebacd07b7104b1603ccda9686
                                    • Instruction ID: 1323a7bc6bad1d214352c7f7926564c9b0b1155769eef22b43f1cade7152fca9
                                    • Opcode Fuzzy Hash: 25838155a07724deea7506e28cf2246fd269850ebacd07b7104b1603ccda9686
                                    • Instruction Fuzzy Hash: 86A12732A002488FDF1AAF68DC51BAD7BA0EB0A320F14415EF855AF3D2D7759D52CB91

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 000C3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00191418,?,000C2E7F,?,?,?,00000000), ref: 000C3A78
                                      • Part of subcall function 000C3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 000C3379
                                    • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 000C356A
                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0010318D
                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001031CE
                                    • RegCloseKey.ADVAPI32(?), ref: 00103210
                                    • _wcslen.LIBCMT ref: 00103277
                                    • _wcslen.LIBCMT ref: 00103286
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                    • API String ID: 98802146-2727554177
                                    • Opcode ID: 2a477fd627efd3907658db8a4ed10d1d5215076196b16eba76bdddfe05630589
                                    • Instruction ID: af32e742863418d70d3f016eeb32dd102594d11a6e200a039f543b555654bf6b
                                    • Opcode Fuzzy Hash: 2a477fd627efd3907658db8a4ed10d1d5215076196b16eba76bdddfe05630589
                                    • Instruction Fuzzy Hash: 5471A171505301AEC314DF25DC82DAFBBE8FF89340F40452EF495971A1EB709A88CBA1

                                    Control-flow Graph

                                    APIs
                                    • GetSysColorBrush.USER32(0000000F), ref: 000C2B8E
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 000C2B9D
                                    • LoadIconW.USER32(00000063), ref: 000C2BB3
                                    • LoadIconW.USER32(000000A4), ref: 000C2BC5
                                    • LoadIconW.USER32(000000A2), ref: 000C2BD7
                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 000C2BEF
                                    • RegisterClassExW.USER32(?), ref: 000C2C40
                                      • Part of subcall function 000C2CD4: GetSysColorBrush.USER32(0000000F), ref: 000C2D07
                                      • Part of subcall function 000C2CD4: RegisterClassExW.USER32(00000030), ref: 000C2D31
                                      • Part of subcall function 000C2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 000C2D42
                                      • Part of subcall function 000C2CD4: InitCommonControlsEx.COMCTL32(?), ref: 000C2D5F
                                      • Part of subcall function 000C2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 000C2D6F
                                      • Part of subcall function 000C2CD4: LoadIconW.USER32(000000A9), ref: 000C2D85
                                      • Part of subcall function 000C2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 000C2D94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                    • String ID: #$0$AutoIt v3
                                    • API String ID: 423443420-4155596026
                                    • Opcode ID: f4e985a3e25f49e24d66b73e1dff63fd20246cfa61c166f0e8fd7e89ed860d6c
                                    • Instruction ID: fe26e3582c81eb33e1c8bf37f8c71140ac77193b9c675fbedcdc58c8f1bc6d6e
                                    • Opcode Fuzzy Hash: f4e985a3e25f49e24d66b73e1dff63fd20246cfa61c166f0e8fd7e89ed860d6c
                                    • Instruction Fuzzy Hash: 24210770E10319BFDB109FA5EC95AAD7FB4FB48B60F04412BE504A6AA0D7B516C0CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 443 c3170-c3185 444 c31e5-c31e7 443->444 445 c3187-c318a 443->445 444->445 448 c31e9 444->448 446 c318c-c3193 445->446 447 c31eb 445->447 449 c3199-c319e 446->449 450 c3265-c326d PostQuitMessage 446->450 452 102dfb-102e23 call c18e2 call de499 447->452 453 c31f1-c31f6 447->453 451 c31d0-c31d8 DefWindowProcW 448->451 457 c31a4-c31a8 449->457 458 102e7c-102e90 call 12bf30 449->458 460 c3219-c321b 450->460 459 c31de-c31e4 451->459 488 102e28-102e2f 452->488 454 c321d-c3244 SetTimer RegisterWindowMessageW 453->454 455 c31f8-c31fb 453->455 454->460 464 c3246-c3251 CreatePopupMenu 454->464 461 102d9c-102d9f 455->461 462 c3201-c320f KillTimer call c30f2 455->462 465 c31ae-c31b3 457->465 466 102e68-102e72 call 12c161 457->466 458->460 482 102e96 458->482 460->459 474 102da1-102da5 461->474 475 102dd7-102df6 MoveWindow 461->475 477 c3214 call c3c50 462->477 464->460 471 c31b9-c31be 465->471 472 102e4d-102e54 465->472 478 102e77 466->478 480 c31c4-c31ca 471->480 481 c3253-c3263 call c326f 471->481 472->451 476 102e5a-102e63 call 120ad7 472->476 483 102dc6-102dd2 SetFocus 474->483 484 102da7-102daa 474->484 475->460 476->451 477->460 478->460 480->451 480->488 481->460 482->451 483->460 484->480 489 102db0-102dc1 call c18e2 484->489 488->451 493 102e35-102e48 call c30f2 call c3837 488->493 489->460 493->451
                                    APIs
                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,000C316A,?,?), ref: 000C31D8
                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,000C316A,?,?), ref: 000C3204
                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 000C3227
                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,000C316A,?,?), ref: 000C3232
                                    • CreatePopupMenu.USER32 ref: 000C3246
                                    • PostQuitMessage.USER32(00000000), ref: 000C3267
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                    • String ID: TaskbarCreated
                                    • API String ID: 129472671-2362178303
                                    • Opcode ID: f763381fa28a60b8ddedb3576dac06cc44bf65b1b0431a7566e7d686bf57c7a6
                                    • Instruction ID: cd355492a345d4dfcc7de5553b5c1b6df36b864a425c3d3cd418806d0746e26f
                                    • Opcode Fuzzy Hash: f763381fa28a60b8ddedb3576dac06cc44bf65b1b0431a7566e7d686bf57c7a6
                                    • Instruction Fuzzy Hash: CF41F835264305BEDF251B789D0EFBD3A65E709354F08811EF90196992CB718EC09BA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 499 12b12f-12b13c 500 12b148-12b15d GetCurrentThreadId 499->500 501 12b13e-12b142 499->501 503 12b163-12b186 GetForegroundWindow GetWindowThreadProcessId AttachThreadInput 500->503 504 12b1ea-12b1f2 500->504 501->500 502 12b220-12b223 501->502 507 12b1c0 503->507 508 12b188-12b1a0 GetWindowThreadProcessId 503->508 505 12b214 504->505 506 12b1f4-12b20c AttachThreadInput 504->506 509 12b219-12b21d AttachThreadInput 505->509 506->509 510 12b20e-12b212 AttachThreadInput 506->510 513 12b1c3-12b1c7 507->513 511 12b1a2-12b1af AttachThreadInput 508->511 512 12b1b4-12b1be AttachThreadInput 508->512 514 12b21f 509->514 510->505 511->512 512->513 513->514 515 12b1c9-12b1cd 513->515 514->502 515->514 516 12b1cf-12b1d1 515->516 516->514 517 12b1d3-12b1da 516->517 517->514 518 12b1dc-12b1e2 517->518 518->514 519 12b1e4-12b1e8 518->519 519->514
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 0012B151
                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B165
                                    • GetWindowThreadProcessId.USER32(00000000), ref: 0012B16C
                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B17B
                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0012B18D
                                    • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B1A6
                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B1B8
                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B1FD
                                    • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B212
                                    • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B21D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                    • String ID:
                                    • API String ID: 2156557900-0
                                    • Opcode ID: ce6ce91d7e0a40c5bf98e1defffd55e89edd840974f165ba5ad9ac37fe9e1282
                                    • Instruction ID: 1b4a304dbdd65811d61518f5bfa29920f329e0232cb87178a1fbf0754cbc6ab4
                                    • Opcode Fuzzy Hash: ce6ce91d7e0a40c5bf98e1defffd55e89edd840974f165ba5ad9ac37fe9e1282
                                    • Instruction Fuzzy Hash: FB319C75514314FFDB10DF24EC88B7EBBA9BB51312F144006FA11DA691D7B4AAA0CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 520 c1410-c1449 521 c144f-c1465 mciSendStringW 520->521 522 1024b8-1024b9 DestroyWindow 520->522 523 c146b-c1473 521->523 524 c16c6-c16d3 521->524 525 1024c4-1024d1 522->525 523->525 526 c1479-c1488 call c182e 523->526 527 c16f8-c16ff 524->527 528 c16d5-c16f0 UnregisterHotKey 524->528 529 102500-102507 525->529 530 1024d3-1024d6 525->530 541 c148e-c1496 526->541 542 10250e-10251a 526->542 527->523 533 c1705 527->533 528->527 532 c16f2-c16f3 call c10d0 528->532 529->525 538 102509 529->538 534 1024e2-1024e5 FindClose 530->534 535 1024d8-1024e0 call c6246 530->535 532->527 533->524 540 1024eb-1024f8 534->540 535->540 538->542 540->529 546 1024fa-1024fb call 1332b1 540->546 547 c149c-c14c1 call ccfa0 541->547 548 102532-10253f 541->548 543 102524-10252b 542->543 544 10251c-10251e FreeLibrary 542->544 543->542 549 10252d 543->549 544->543 546->529 558 c14f8-c1503 OleUninitialize 547->558 559 c14c3 547->559 550 102541-10255e VirtualFree 548->550 551 102566-10256d 548->551 549->548 550->551 554 102560-102561 call 133317 550->554 551->548 555 10256f 551->555 554->551 560 102574-102578 555->560 558->560 561 c1509-c150e 558->561 562 c14c6-c14f6 call c1a05 call c19ae 559->562 560->561 565 10257e-102584 560->565 563 c1514-c151e 561->563 564 102589-102596 call 1332eb 561->564 562->558 569 c1524-c15a5 call c988f call c1944 call c17d5 call dfe14 call c177c call c988f call ccfa0 call c17fe call dfe14 563->569 570 c1707-c1714 call df80e 563->570 576 102598 564->576 565->561 582 10259d-1025bf call dfdcd 569->582 610 c15ab-c15cf call dfe14 569->610 570->569 580 c171a 570->580 576->582 580->570 588 1025c1 582->588 591 1025c6-1025e8 call dfdcd 588->591 598 1025ea 591->598 601 1025ef-102611 call dfdcd 598->601 606 102613 601->606 609 102618-102625 call 1264d4 606->609 615 102627 609->615 610->591 616 c15d5-c15f9 call dfe14 610->616 618 10262c-102639 call dac64 615->618 616->601 621 c15ff-c1619 call dfe14 616->621 625 10263b 618->625 621->609 626 c161f-c1643 call c17d5 call dfe14 621->626 628 102640-10264d call 133245 625->628 626->618 635 c1649-c1651 626->635 633 10264f 628->633 636 102654-102661 call 1332cc 633->636 635->628 637 c1657-c1675 call c988f call c190a 635->637 642 102663 636->642 637->636 646 c167b-c1689 637->646 645 102668-102675 call 1332cc 642->645 652 102677 645->652 646->645 648 c168f-c16c5 call c988f * 3 call c1876 646->648 652->652
                                    APIs
                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 000C1459
                                    • OleUninitialize.OLE32(?,00000000), ref: 000C14F8
                                    • UnregisterHotKey.USER32(?), ref: 000C16DD
                                    • DestroyWindow.USER32(?), ref: 001024B9
                                    • FreeLibrary.KERNEL32(?), ref: 0010251E
                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0010254B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                    • String ID: close all
                                    • API String ID: 469580280-3243417748
                                    • Opcode ID: 3b5ac0d16037461fd0641ed198c62a6c86bf24595f7fc7062f7e01b13300ce6a
                                    • Instruction ID: 69568ff0d45a32e05222bfa901ecd9196ce48dd209dfc150f9f58caf9732078f
                                    • Opcode Fuzzy Hash: 3b5ac0d16037461fd0641ed198c62a6c86bf24595f7fc7062f7e01b13300ce6a
                                    • Instruction Fuzzy Hash: 0ED13B31601212CFCB29EF14C899FADF7A5BF05700F14429DE84A6B292DB71AD16CF94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 669 c2c63-c2cd3 CreateWindowExW * 2 ShowWindow * 2
                                    APIs
                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 000C2C91
                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 000C2CB2
                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,000C1CAD,?), ref: 000C2CC6
                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,000C1CAD,?), ref: 000C2CCF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$CreateShow
                                    • String ID: AutoIt v3$edit
                                    • API String ID: 1584632944-3779509399
                                    • Opcode ID: c2a1766012652c63616c3f8a17f2384799addf727d85c704eb20f6d8e0103e20
                                    • Instruction ID: 555858e77866bac33c99a308619502770e0a3a0de833dc73a82619dd23d1d54b
                                    • Opcode Fuzzy Hash: c2a1766012652c63616c3f8a17f2384799addf727d85c704eb20f6d8e0103e20
                                    • Instruction Fuzzy Hash: C7F0DA75540391BEEB311B27AC08E773EBDE7CAF61B00005AFD14A69A0C67119D4DAB1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 784 14ad64-14ad9c call ca961 call e2340 789 14add1-14add5 784->789 790 14ad9e-14adb5 call c7510 784->790 792 14add7-14adee call c7510 call c7620 789->792 793 14adf1-14adf5 789->793 790->789 798 14adb7-14adce call c7510 call c7620 790->798 792->793 796 14adf7-14ae0e call c7510 793->796 797 14ae3a 793->797 800 14ae3c-14ae40 796->800 807 14ae10-14ae21 call c9b47 796->807 797->800 798->789 805 14ae42-14ae50 call cb567 800->805 806 14ae53-14aeae call e2340 call c7510 ShellExecuteExW 800->806 805->806 821 14aeb7-14aeb9 806->821 822 14aeb0-14aeb6 call dfe14 806->822 807->797 820 14ae23-14ae2e call c7510 807->820 820->797 829 14ae30-14ae35 call ca8c7 820->829 826 14aec2-14aec6 821->826 827 14aebb-14aec1 call dfe14 821->827 822->821 831 14aec8-14aed6 826->831 832 14af0a-14af0e 826->832 827->826 829->797 837 14aed8 831->837 838 14aedb-14aeeb 831->838 833 14af10-14af19 832->833 834 14af1b-14af33 call ccfa0 832->834 839 14af6d-14af7b call c988f 833->839 834->839 847 14af35-14af46 GetProcessId 834->847 837->838 841 14aef0-14af08 call ccfa0 838->841 842 14aeed 838->842 841->839 842->841 849 14af4e-14af67 call ccfa0 CloseHandle 847->849 850 14af48 847->850 849->839 850->849
                                    APIs
                                    • ShellExecuteExW.SHELL32(0000003C), ref: 0014AEA3
                                      • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                    • GetProcessId.KERNEL32(00000000), ref: 0014AF38
                                    • CloseHandle.KERNEL32(00000000), ref: 0014AF67
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                    • String ID: <$@
                                    • API String ID: 146682121-1426351568
                                    • Opcode ID: 0493f4a1f1075235a013af2ae4ece2f63824c938519b59d94a669457b247051e
                                    • Instruction ID: 4df0c0bd07eb5199abf6723ce891d0f79aed648646556e079d7c9c484ac3a949
                                    • Opcode Fuzzy Hash: 0493f4a1f1075235a013af2ae4ece2f63824c938519b59d94a669457b247051e
                                    • Instruction Fuzzy Hash: 55713671A00619DFCB14DFA4C494A9EBBF0BF08314F458499E85AAB3A2CB74ED45CB91

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                      • Part of subcall function 00122DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00122DC5
                                      • Part of subcall function 00122DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00122DD6
                                      • Part of subcall function 00122DA7: GetCurrentThreadId.KERNEL32 ref: 00122DDD
                                      • Part of subcall function 00122DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00122DE4
                                    • GetFocus.USER32 ref: 00122F78
                                      • Part of subcall function 00122DEE: GetParent.USER32(00000000), ref: 00122DF9
                                    • GetClassNameW.USER32(?,?,00000100), ref: 00122FC3
                                    • EnumChildWindows.USER32(?,0012303B), ref: 00122FEB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                    • String ID: %s%d
                                    • API String ID: 1272988791-1110647743
                                    • Opcode ID: 136d2123c2a548f9963da30c590a623b0fff2486d091bb46ef6446261c4c9e76
                                    • Instruction ID: 29ee919053ab3be76429d9a3aef2dd747c3e7158eaece97f74d3d6217bae698d
                                    • Opcode Fuzzy Hash: 136d2123c2a548f9963da30c590a623b0fff2486d091bb46ef6446261c4c9e76
                                    • Instruction Fuzzy Hash: B511E471200319ABCF14BFB09C95EEE37AAAF94304F044079F9199B252DF349A598B70

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 912 c3b1c-c3b27 913 c3b99-c3b9b 912->913 914 c3b29-c3b2e 912->914 915 c3b8c-c3b8f 913->915 914->913 916 c3b30-c3b48 RegOpenKeyExW 914->916 916->913 917 c3b4a-c3b69 RegQueryValueExW 916->917 918 c3b6b-c3b76 917->918 919 c3b80-c3b8b RegCloseKey 917->919 920 c3b78-c3b7a 918->920 921 c3b90-c3b97 918->921 919->915 922 c3b7e 920->922 921->922 922->919
                                    APIs
                                    • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,000C3B0F,SwapMouseButtons,00000004,?), ref: 000C3B40
                                    • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,000C3B0F,SwapMouseButtons,00000004,?), ref: 000C3B61
                                    • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,000C3B0F,SwapMouseButtons,00000004,?), ref: 000C3B83
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID: Control Panel\Mouse
                                    • API String ID: 3677997916-824357125
                                    • Opcode ID: 97fb02fb39f1050f6d84a9fb68eb34c8ed1313218f22f1c37adb634a02781225
                                    • Instruction ID: f4b6254dbcab8f999431eebd78de3660539647761d391235f085f1c03dc3d8bd
                                    • Opcode Fuzzy Hash: 97fb02fb39f1050f6d84a9fb68eb34c8ed1313218f22f1c37adb634a02781225
                                    • Instruction Fuzzy Hash: 66112AB5520208FFDB608FA5DC44EEFB7BCEF44755B108459BA05D7150D3319E409BA0
                                    APIs
                                    • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 0012ABF1
                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 0012AC0D
                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 0012AC74
                                    • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 0012ACC6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: KeyboardState$InputMessagePostSend
                                    • String ID:
                                    • API String ID: 432972143-0
                                    • Opcode ID: 00f57bd0e99bfecb1bd56951bce020a3ef84535ed25c8a38cc74487627c7cd24
                                    • Instruction ID: f4af0d687ffba7f4fffba653c7e76c2b9bd81ed11d6b7b080cb0c1110595987c
                                    • Opcode Fuzzy Hash: 00f57bd0e99bfecb1bd56951bce020a3ef84535ed25c8a38cc74487627c7cd24
                                    • Instruction Fuzzy Hash: FB312830A04328AFFF38CF64EC047FE7BA5AF85310F84421AE481562D1C3749AB58792
                                    APIs
                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0012ACD3,?,00008000), ref: 0012B0C4
                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0012ACD3,?,00008000), ref: 0012B0E9
                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0012ACD3,?,00008000), ref: 0012B0F3
                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0012ACD3,?,00008000), ref: 0012B126
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CounterPerformanceQuerySleep
                                    • String ID:
                                    • API String ID: 2875609808-0
                                    • Opcode ID: 127bae2073eef5212a4aec2389173524c9b03542aa48fa38a4bda71aba130080
                                    • Instruction ID: 8b604d23a39c10258e0c71522f56c6206ee31d21a667480fc0f9c3630310d499
                                    • Opcode Fuzzy Hash: 127bae2073eef5212a4aec2389173524c9b03542aa48fa38a4bda71aba130080
                                    • Instruction Fuzzy Hash: 0E113C71C05A39DBCF04AFA4F9A86EEBB78FF09711F114085D941B6141CB3056608B95
                                    APIs
                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00122DC5
                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00122DD6
                                    • GetCurrentThreadId.KERNEL32 ref: 00122DDD
                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00122DE4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                    • String ID:
                                    • API String ID: 2710830443-0
                                    • Opcode ID: fe62b11faf6eebfd1ff1998d2e3d8a3bbba2f1127e531f70895fa90fb17243ff
                                    • Instruction ID: 5380fb42fb313400a98b59ace4d83c881a7bb8eea34c155c187364d76db16aaa
                                    • Opcode Fuzzy Hash: fe62b11faf6eebfd1ff1998d2e3d8a3bbba2f1127e531f70895fa90fb17243ff
                                    • Instruction Fuzzy Hash: 50E06D72101338BBD7201BB2AC0DEEB3E6CEB42BA2F000015F105D95809AA48980C6F0
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 000CFE66
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Init_thread_footer
                                    • String ID:
                                    • API String ID: 1385522511-0
                                    • Opcode ID: 987a99133679969f016d21d0a1aa3569781771c604a522ca067ffc0fe7a35dce
                                    • Instruction ID: 67ea8bc8094f9a5e2f465139a5cd0944db60841e7ceb3e7514c10712e064c2fc
                                    • Opcode Fuzzy Hash: 987a99133679969f016d21d0a1aa3569781771c604a522ca067ffc0fe7a35dce
                                    • Instruction Fuzzy Hash: F9B26B74608342CFDB68CF14C480B6EB7E2BB99714F24486EE8869B351D771ED85CB52
                                    APIs
                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001033A2
                                      • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 000C3A04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: IconLoadNotifyShell_String_wcslen
                                    • String ID: Line:
                                    • API String ID: 2289894680-1585850449
                                    • Opcode ID: faf099b89b40d2714237635b94ed07e1149c3e9efa287b5a93bccc10875bdd4d
                                    • Instruction ID: d24c7d4d8b9e56d99962dacae7caeb79f1e62206e2ea377e4b29f5604a9d7308
                                    • Opcode Fuzzy Hash: faf099b89b40d2714237635b94ed07e1149c3e9efa287b5a93bccc10875bdd4d
                                    • Instruction Fuzzy Hash: 8431C171518305AED725EB20DC46FEFB7E8AB40720F00892EF59993592DB709B89C7C2
                                    APIs
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 000E0668
                                      • Part of subcall function 000E32A4: RaiseException.KERNEL32(?,?,?,000E068A,?,00191444,?,?,?,?,?,?,000E068A,000C1129,00188738,000C1129), ref: 000E3304
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 000E0685
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise
                                    • String ID: Unknown exception
                                    • API String ID: 3476068407-410509341
                                    • Opcode ID: 7ebbaa5cc9a1f1de4de363476c0e1e696995e2c1dbd0974cf9af060bb7d8e95e
                                    • Instruction ID: 42c8da9bfb702ed683406a43a58495406c7d7ef068cf3c2404e29fc82b78b6bc
                                    • Opcode Fuzzy Hash: 7ebbaa5cc9a1f1de4de363476c0e1e696995e2c1dbd0974cf9af060bb7d8e95e
                                    • Instruction Fuzzy Hash: D2F0C83490038DBBCB10B666D846DDE7BBD5F40310BA04535B924F65D2EFB1DB55CA90
                                    APIs
                                      • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 000C1BF4
                                      • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 000C1BFC
                                      • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 000C1C07
                                      • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 000C1C12
                                      • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 000C1C1A
                                      • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 000C1C22
                                      • Part of subcall function 000C1B4A: RegisterWindowMessageW.USER32(00000004,?,000C12C4), ref: 000C1BA2
                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 000C136A
                                    • OleInitialize.OLE32 ref: 000C1388
                                    • CloseHandle.KERNEL32(00000000,00000000), ref: 001024AB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                    • String ID:
                                    • API String ID: 1986988660-0
                                    • Opcode ID: 4497153e40484b13a5ca7a6bd70ea5b9a4cb44e12925bf930734bcf3add4849a
                                    • Instruction ID: 51b19cdaaf0505a943bdb5370a3129b00d8625052b37545a85874a1a374d7769
                                    • Opcode Fuzzy Hash: 4497153e40484b13a5ca7a6bd70ea5b9a4cb44e12925bf930734bcf3add4849a
                                    • Instruction Fuzzy Hash: B271CFB4901303AFE785DF79AA45A993AE1FB8A344357822FD41AD7B62EB3044C5CF41
                                    APIs
                                      • Part of subcall function 000C3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 000C3A04
                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0012C259
                                    • KillTimer.USER32(?,00000001,?,?), ref: 0012C261
                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0012C270
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: IconNotifyShell_Timer$Kill
                                    • String ID:
                                    • API String ID: 3500052701-0
                                    • Opcode ID: 374989e53cc62e994d269715cb67722fbc4585087790e7ec14ecffe75e30f115
                                    • Instruction ID: 5cf572107fb08a5f805b10cee61c0099c0c8c9fc1a1d09e2f70ac94921ee6cfc
                                    • Opcode Fuzzy Hash: 374989e53cc62e994d269715cb67722fbc4585087790e7ec14ecffe75e30f115
                                    • Instruction Fuzzy Hash: FB31C570904354EFEB26DF64A855BEBBBECAF16304F00049ED2DA97241C7745A84CB91
                                    APIs
                                    • FindCloseChangeNotification.KERNEL32(00000000,00000000,?,?,000F85CC,?,00188CC8,0000000C), ref: 000F8704
                                    • GetLastError.KERNEL32(?,000F85CC,?,00188CC8,0000000C), ref: 000F870E
                                    • __dosmaperr.LIBCMT ref: 000F8739
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                    • String ID:
                                    • API String ID: 490808831-0
                                    • Opcode ID: a28971cf563fc162dbc94362d74cb1ba01aff939504861363a9b69eadb4b444d
                                    • Instruction ID: d7169c14a8ec4a80ba0a944bd0e38212085f0bfae8e6ab91dc2ad744c60cd834
                                    • Opcode Fuzzy Hash: a28971cf563fc162dbc94362d74cb1ba01aff939504861363a9b69eadb4b444d
                                    • Instruction Fuzzy Hash: 2E014C336047285AC2A062346C497FE37C54B82779F254119EB04DB9D3DE60CD81A390
                                    APIs
                                    • TranslateMessage.USER32(?), ref: 000CDB7B
                                    • DispatchMessageW.USER32(?), ref: 000CDB89
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000CDB9F
                                    • Sleep.KERNEL32(0000000A), ref: 000CDBB1
                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 00111CC9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                    • String ID:
                                    • API String ID: 3288985973-0
                                    • Opcode ID: 65cc1173bde993173c4c3bedad73afbd2bc4109abb64ba1bb540f94fbc09ae33
                                    • Instruction ID: 506f5838a1ee4ef7f8c55fc901c628f66792f0d6e46a70e4bec5a621fc9da3e3
                                    • Opcode Fuzzy Hash: 65cc1173bde993173c4c3bedad73afbd2bc4109abb64ba1bb540f94fbc09ae33
                                    • Instruction Fuzzy Hash: 33F05430644381EBE734CB60CC45FDE73ACEB44311F504529E60A874C0DB3094C89B65
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 000D17F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Init_thread_footer
                                    • String ID: CALL
                                    • API String ID: 1385522511-4196123274
                                    • Opcode ID: 9db7bb5b3890f545676ed1dc898f125354d3eeec89515be6551f1a100a949e6e
                                    • Instruction ID: 308528c44cec28ed306c58f38d0e974840aa8552e43bc58a9241bddc3e1cd597
                                    • Opcode Fuzzy Hash: 9db7bb5b3890f545676ed1dc898f125354d3eeec89515be6551f1a100a949e6e
                                    • Instruction Fuzzy Hash: F1228E70608301EFC714DF14D484AAABBF1BF85314F14856EF49A8B362DB76E985CB62
                                    APIs
                                    • GetOpenFileNameW.COMDLG32(?), ref: 00102C8C
                                      • Part of subcall function 000C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000C3A97,?,?,000C2E7F,?,?,?,00000000), ref: 000C3AC2
                                      • Part of subcall function 000C2DA5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 000C2DC4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Name$Path$FileFullLongOpen
                                    • String ID: X
                                    • API String ID: 779396738-3081909835
                                    • Opcode ID: 8949581d72b05628e57ca6a6395ab7691f592e379477b4a7e28ea09b654f0b43
                                    • Instruction ID: 3f137b3d2f21d416521dda66e55c7defd06fe712f4accad0d8fffebac898d2bd
                                    • Opcode Fuzzy Hash: 8949581d72b05628e57ca6a6395ab7691f592e379477b4a7e28ea09b654f0b43
                                    • Instruction Fuzzy Hash: C2217571A102589FDB11EF94C849BEE7BFCAF49314F00805DE545BB281DBF45A898FA1
                                    APIs
                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 000C3908
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: IconNotifyShell_
                                    • String ID:
                                    • API String ID: 1144537725-0
                                    • Opcode ID: 28e8464e715d84ff62ca00f22613d4b59483b02c22f4d3ea83da3c7ac2be768e
                                    • Instruction ID: e996329e0dbd43ae21edc3b36fa6cb3e57f568df8d932491f2e056a3fa39fd41
                                    • Opcode Fuzzy Hash: 28e8464e715d84ff62ca00f22613d4b59483b02c22f4d3ea83da3c7ac2be768e
                                    • Instruction Fuzzy Hash: 8A319170504301DFD760DF24D885B9BBBF8FB49718F00092EF59987680E7B1AA88CB92
                                    APIs
                                    • timeGetTime.WINMM ref: 000DF661
                                      • Part of subcall function 000CD730: GetInputState.USER32 ref: 000CD807
                                    • Sleep.KERNEL32(00000000), ref: 0011F2DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: InputSleepStateTimetime
                                    • String ID:
                                    • API String ID: 4149333218-0
                                    • Opcode ID: a23f3370bd8bf8b18b412fbe6aaae35537c49ad87ee97f5085cec2f39e5fb4ab
                                    • Instruction ID: e783cd76d78ac6c69b983e8aa0766d0bf1cdd9883ffe9d30566ca50c1ae58ff6
                                    • Opcode Fuzzy Hash: a23f3370bd8bf8b18b412fbe6aaae35537c49ad87ee97f5085cec2f39e5fb4ab
                                    • Instruction Fuzzy Hash: EFF05831240B059FD314EF69D44AFAEB7E8AB59761F00402AF85ACB7A1DB70A8408B90
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 000CBB4E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Init_thread_footer
                                    • String ID:
                                    • API String ID: 1385522511-0
                                    • Opcode ID: 4ca939ce61fdb22c7e67609ead7fd0ac9170d1ab642fd494774b7c71a80888b5
                                    • Instruction ID: f9378a0d6214b1129e4a7bcdb8cfa59961e70530dd6cfae57127ea7de0947396
                                    • Opcode Fuzzy Hash: 4ca939ce61fdb22c7e67609ead7fd0ac9170d1ab642fd494774b7c71a80888b5
                                    • Instruction Fuzzy Hash: 0C328D34A04209AFDB29CF54C895FBEB7B9FF48310F15806AE915AB251C7B4EE81CB51
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 00145930
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Init_thread_footer
                                    • String ID:
                                    • API String ID: 1385522511-0
                                    • Opcode ID: ba227a219659a42cf9469aa396f0d771ac94e37af1dbc6dd5e1da81faafbf714
                                    • Instruction ID: dc58da91e294a73d4f1c6d93f2f75339590c29289b8f021c8ca21d6c6f022849
                                    • Opcode Fuzzy Hash: ba227a219659a42cf9469aa396f0d771ac94e37af1dbc6dd5e1da81faafbf714
                                    • Instruction Fuzzy Hash: FC718A30600605AFCB24DF54C881EBEB7F6FF58314F20856AFA559B2A2D771AD81CB90
                                    APIs
                                      • Part of subcall function 000C4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,000C4EDD,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E9C
                                      • Part of subcall function 000C4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 000C4EAE
                                      • Part of subcall function 000C4E90: FreeLibrary.KERNEL32(00000000,?,?,000C4EDD,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4EC0
                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4EFD
                                      • Part of subcall function 000C4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00103CDE,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E62
                                      • Part of subcall function 000C4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 000C4E74
                                      • Part of subcall function 000C4E59: FreeLibrary.KERNEL32(00000000,?,?,00103CDE,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E87
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Library$Load$AddressFreeProc
                                    • String ID:
                                    • API String ID: 2632591731-0
                                    • Opcode ID: c64c41c966566ad2551665c1671b301869ca6e63b9c072a77b934046f1b3675d
                                    • Instruction ID: 82070dd278fd2c6fec7ff5b1fd63f1653bbd557ffe39849652b8979407b5d51b
                                    • Opcode Fuzzy Hash: c64c41c966566ad2551665c1671b301869ca6e63b9c072a77b934046f1b3675d
                                    • Instruction Fuzzy Hash: D511E332610305AADB24FF60DC22FED77A5AF50711F20842EF552AA1D2EFB1AA459790
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: __wsopen_s
                                    • String ID:
                                    • API String ID: 3347428461-0
                                    • Opcode ID: 544b0cd8e59c201a4d4f0d914284f9386aa8299b636b69c2cd36c4c31226f002
                                    • Instruction ID: c98f3178f9e28ae50027352d5168cd0601d15c8055f37839926cfd85a56b326c
                                    • Opcode Fuzzy Hash: 544b0cd8e59c201a4d4f0d914284f9386aa8299b636b69c2cd36c4c31226f002
                                    • Instruction Fuzzy Hash: 5211487590410AAFCB05DF58E9419EE7BF8FF48304F148059F908AB312DB30EA11DBA4
                                    APIs
                                      • Part of subcall function 000F4C7D: RtlAllocateHeap.NTDLL(00000008,000C1129,00000000,?,000F2E29,00000001,00000364,?,?,?,000EF2DE,000F3863,00191444,?,000DFDF5,?), ref: 000F4CBE
                                    • _free.LIBCMT ref: 000F506C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AllocateHeap_free
                                    • String ID:
                                    • API String ID: 614378929-0
                                    • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                    • Instruction ID: 74932b80cf2b035b94cf5a32ffa1ad7aca3a2fb769e3c7e1623b3d332a376451
                                    • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                    • Instruction Fuzzy Hash: 91014E722047095BE3318F55DC459AAFBECFB85370F25051DE794836C1EA706805C7B4
                                    APIs
                                    • GetForegroundWindow.USER32(00000000,?,?,?,001514B5,?), ref: 00152A01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ForegroundWindow
                                    • String ID:
                                    • API String ID: 2020703349-0
                                    • Opcode ID: fc8476f2e4f20c6dd4dba9eb109980ddd83ecaa3ea8029cac6ded55216c45e25
                                    • Instruction ID: f595e148f04eca276a39129245631c81814c0cd40d35e38653bfd27dbbfff549
                                    • Opcode Fuzzy Hash: fc8476f2e4f20c6dd4dba9eb109980ddd83ecaa3ea8029cac6ded55216c45e25
                                    • Instruction Fuzzy Hash: DA019237300651DFE3258A2CC454B227792EB9631AF298468C4678F651D732EC46C790
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                    • Instruction ID: f581a561ca329b3a9bce4854d4037c4476bd8fa2bf7fe93f7032546f97956e43
                                    • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                    • Instruction Fuzzy Hash: 81F0F432511A9C9ECA313A6BDC05BEA33989F523B4F100716FA20B35D3DB70D80196A5
                                    APIs
                                    • GetForegroundWindow.USER32(?), ref: 001514EB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ForegroundWindow
                                    • String ID:
                                    • API String ID: 2020703349-0
                                    • Opcode ID: 855be57689b5bdfe066a8c4858327ae8dde3e56a67d14a7a2c8769ae96c4eb67
                                    • Instruction ID: 12c3bc033c6f8476d5b6457b08b050b7b6b42343e02410722f81734f9c6a717b
                                    • Opcode Fuzzy Hash: 855be57689b5bdfe066a8c4858327ae8dde3e56a67d14a7a2c8769ae96c4eb67
                                    • Instruction Fuzzy Hash: 2A01B135208751EF9321CF69C440926BB95EB95325754806DEC5A8F702D732DD86C780
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen
                                    • String ID:
                                    • API String ID: 176396367-0
                                    • Opcode ID: e8927a259a13a384b7f8d17d197a21d4458e0330a19322b0a8ddd77362a479d3
                                    • Instruction ID: 3cbd0f52e6902c0b8fc8e55e937682b7455cdc6cdc956000d61b77fa7d9b6667
                                    • Opcode Fuzzy Hash: e8927a259a13a384b7f8d17d197a21d4458e0330a19322b0a8ddd77362a479d3
                                    • Instruction Fuzzy Hash: 90F0A4B36007016ED7249F29D806FAABB98EB44760F10853AF61ADB2D2DB71E51086A0
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,000C1129,00000000,?,000F2E29,00000001,00000364,?,?,?,000EF2DE,000F3863,00191444,?,000DFDF5,?), ref: 000F4CBE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: a3571135a1dd7114326b77d20622eaf5a8b80f74dd9b12620206994daa30f7b5
                                    • Instruction ID: 5ab14480cdc7a3ee8c19fb5a5a7ece19f40ab6e6c73c5a50b06646613d6a9d79
                                    • Opcode Fuzzy Hash: a3571135a1dd7114326b77d20622eaf5a8b80f74dd9b12620206994daa30f7b5
                                    • Instruction Fuzzy Hash: 6FF0BB3150226C6ADBA15F629C05B7B37D8BF41761B145125BF19A7A81CA30D80065D0
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,00191444,?,000DFDF5,?,?,000CA976,00000010,00191440,000C13FC,?,000C13C6,?,000C1129), ref: 000F3852
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: dcbf13906800e252306d2841bf747753c0ac3232d4fe320570f822de82ff811f
                                    • Instruction ID: 83955f0597e0c6aab9be7531c696f51e6a4da2896ce8deffb275a942b3965516
                                    • Opcode Fuzzy Hash: dcbf13906800e252306d2841bf747753c0ac3232d4fe320570f822de82ff811f
                                    • Instruction Fuzzy Hash: 5CE0E53110036DAAD6712A779D01BFA36C8AB42BF0F090021BE04A6E81DF19DE03A1E0
                                    APIs
                                    • FreeLibrary.KERNEL32(?,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4F6D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID:
                                    • API String ID: 3664257935-0
                                    • Opcode ID: 40b4ded9df539fc131fac9c3a57e49c25021a966966fcb8cbda6cf08cbdf73d1
                                    • Instruction ID: 9fe2efde7b695aad62b140791c359ee0754f92812b66b0fa0f9f41747cccc1f0
                                    • Opcode Fuzzy Hash: 40b4ded9df539fc131fac9c3a57e49c25021a966966fcb8cbda6cf08cbdf73d1
                                    • Instruction Fuzzy Hash: 5EF03971105752CFDB349F64D4A0E6ABBE4BF14329320897EE1EA82621CB319885DF50
                                    APIs
                                    • IsWindow.USER32(00000000), ref: 00152A66
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window
                                    • String ID:
                                    • API String ID: 2353593579-0
                                    • Opcode ID: 55601fda02ff09615281772897f97574462f25665a50d52cbdc349caef2212ff
                                    • Instruction ID: 98325035840a1135c2744baa49719cfd6adcfea0b5b3b1b6c35500fb2426e304
                                    • Opcode Fuzzy Hash: 55601fda02ff09615281772897f97574462f25665a50d52cbdc349caef2212ff
                                    • Instruction Fuzzy Hash: ACE04F36354226EBC718EA30EC808FA735CEB65396B104536EC26CB540DB349AA986E0
                                    APIs
                                    • Shell_NotifyIconW.SHELL32(00000002,?), ref: 000C314E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: IconNotifyShell_
                                    • String ID:
                                    • API String ID: 1144537725-0
                                    • Opcode ID: 2405f6c8c5a6581247ce02722bc4dc73be47c20c0340ab92ead9c0cdd7c63c8d
                                    • Instruction ID: 62fff5467fa4433d8ef61e6599aebfb1449b7c2d7358aa7d248221a6c3d7f844
                                    • Opcode Fuzzy Hash: 2405f6c8c5a6581247ce02722bc4dc73be47c20c0340ab92ead9c0cdd7c63c8d
                                    • Instruction Fuzzy Hash: 70F0A770910304AFE7529F24DC46BD97BFCB70170CF0001EAA54896582D7704BC8CF41
                                    APIs
                                    • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 000C2DC4
                                      • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: LongNamePath_wcslen
                                    • String ID:
                                    • API String ID: 541455249-0
                                    • Opcode ID: 02d332c0da421b48bf0fb589910e83e5456f9ad59d0677da3677dd8a1573942f
                                    • Instruction ID: 8eeb0c6cbfad30ec64d43f42d9a94b49a7cbd55a8abe81d4788ed978a1c7198f
                                    • Opcode Fuzzy Hash: 02d332c0da421b48bf0fb589910e83e5456f9ad59d0677da3677dd8a1573942f
                                    • Instruction Fuzzy Hash: 37E0C272A002246BCB20E7989C06FEA77EDDFC8790F0400B5FD09E7248DAA4ADC48690
                                    APIs
                                      • Part of subcall function 000C3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 000C3908
                                      • Part of subcall function 000CD730: GetInputState.USER32 ref: 000CD807
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 000C2B6B
                                      • Part of subcall function 000C30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 000C314E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                    • String ID:
                                    • API String ID: 3667716007-0
                                    • Opcode ID: a10963dc38fd25abf999284d3a4222758ad2a1bcd214509e83721e932aafe469
                                    • Instruction ID: be1fc837e0f7f3d01c25b24c65a8b706fe8941f4676c93dc0b1eb71c3887bf43
                                    • Opcode Fuzzy Hash: a10963dc38fd25abf999284d3a4222758ad2a1bcd214509e83721e932aafe469
                                    • Instruction Fuzzy Hash: 26E0862230434516CA04BB74A856FFDB7599BD5351F40553EF142471A3DF2489CA4251
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,00000000,?,00100704,?,?,00000000,?,00100704,00000000,0000000C), ref: 001003B7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: b361be10b0e00002bae87d68e464da797d7746894510e8ec70cf6ac496f1c008
                                    • Instruction ID: 2e89f02ddee3c7705cc33bc6bc8e645745fc4774387fc3c987b322dc5e6a8ec4
                                    • Opcode Fuzzy Hash: b361be10b0e00002bae87d68e464da797d7746894510e8ec70cf6ac496f1c008
                                    • Instruction Fuzzy Hash: 8CD06C3204020DFFDF029F84DD46EDA3BAAFB48714F014000BE185A020C732E861AB90
                                    APIs
                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 000C1CBC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: InfoParametersSystem
                                    • String ID:
                                    • API String ID: 3098949447-0
                                    • Opcode ID: b09a23bbbe24cd81e790c24804f3d509a3bf5a94f209aa1b9b9955293ddc6caa
                                    • Instruction ID: 6786e4fb22ba81df57cf4a6fd9f2fd0cfbc65183e2e0fd3c039f356b7d2295b6
                                    • Opcode Fuzzy Hash: b09a23bbbe24cd81e790c24804f3d509a3bf5a94f209aa1b9b9955293ddc6caa
                                    • Instruction Fuzzy Hash: 6EC0483A380306AEF2148B90AC4AF507764A348B11F448002F619A99E392B228A0EA90
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0015961A
                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0015965B
                                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0015969F
                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001596C9
                                    • SendMessageW.USER32 ref: 001596F2
                                    • GetKeyState.USER32(00000011), ref: 0015978B
                                    • GetKeyState.USER32(00000009), ref: 00159798
                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001597AE
                                    • GetKeyState.USER32(00000010), ref: 001597B8
                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001597E9
                                    • SendMessageW.USER32 ref: 00159810
                                    • SendMessageW.USER32(?,00001030,?,00157E95), ref: 00159918
                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0015992E
                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00159941
                                    • SetCapture.USER32(?), ref: 0015994A
                                    • ClientToScreen.USER32(?,?), ref: 001599AF
                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 001599BC
                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001599D6
                                    • ReleaseCapture.USER32 ref: 001599E1
                                    • GetCursorPos.USER32(?), ref: 00159A19
                                    • ScreenToClient.USER32(?,?), ref: 00159A26
                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00159A80
                                    • SendMessageW.USER32 ref: 00159AAE
                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00159AEB
                                    • SendMessageW.USER32 ref: 00159B1A
                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00159B3B
                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00159B4A
                                    • GetCursorPos.USER32(?), ref: 00159B68
                                    • ScreenToClient.USER32(?,?), ref: 00159B75
                                    • GetParent.USER32(?), ref: 00159B93
                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00159BFA
                                    • SendMessageW.USER32 ref: 00159C2B
                                    • ClientToScreen.USER32(?,?), ref: 00159C84
                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00159CB4
                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00159CDE
                                    • SendMessageW.USER32 ref: 00159D01
                                    • ClientToScreen.USER32(?,?), ref: 00159D4E
                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00159D82
                                      • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00159E05
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                    • String ID: @GUI_DRAGID$F
                                    • API String ID: 3429851547-4164748364
                                    • Opcode ID: 48227972548a8ca69a2371dd2ca5c65a2dcdcdd0d7073c69fa0901dcb1ac00ae
                                    • Instruction ID: 5d1c605c6e40d2b424feef0e14b729146206454f46baa6e0fa3d669961f9f85b
                                    • Opcode Fuzzy Hash: 48227972548a8ca69a2371dd2ca5c65a2dcdcdd0d7073c69fa0901dcb1ac00ae
                                    • Instruction Fuzzy Hash: 8A429C74204301EFDB25CF24CD44AAABBE5FF48315F10061EF9698B6A1D731A998DF92
                                    APIs
                                    • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 001548F3
                                    • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00154908
                                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00154927
                                    • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0015494B
                                    • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0015495C
                                    • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0015497B
                                    • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 001549AE
                                    • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 001549D4
                                    • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00154A0F
                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00154A56
                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00154A7E
                                    • IsMenu.USER32(?), ref: 00154A97
                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00154AF2
                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00154B20
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00154B94
                                    • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00154BE3
                                    • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00154C82
                                    • wsprintfW.USER32 ref: 00154CAE
                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00154CC9
                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00154CF1
                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00154D13
                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00154D33
                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00154D5A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                    • String ID: %d/%02d/%02d
                                    • API String ID: 4054740463-328681919
                                    • Opcode ID: ac20e11ecafb0b55c268326f83075eb9f87ad1c0c4e63ef5050f5660dcc82b47
                                    • Instruction ID: f6dbd103fef0e1047808425eb319563f75f11c78759474e50ea748510d39a147
                                    • Opcode Fuzzy Hash: ac20e11ecafb0b55c268326f83075eb9f87ad1c0c4e63ef5050f5660dcc82b47
                                    • Instruction Fuzzy Hash: F712CF71600314EFEB258F68CC49FEE7BB8EB45719F10411AF926DE2A1DB749A84CB50
                                    APIs
                                    • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 000DF998
                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0011F474
                                    • IsIconic.USER32(00000000), ref: 0011F47D
                                    • ShowWindow.USER32(00000000,00000009), ref: 0011F48A
                                    • SetForegroundWindow.USER32(00000000), ref: 0011F494
                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0011F4AA
                                    • GetCurrentThreadId.KERNEL32 ref: 0011F4B1
                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0011F4BD
                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0011F4CE
                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0011F4D6
                                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0011F4DE
                                    • SetForegroundWindow.USER32(00000000), ref: 0011F4E1
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0011F4F6
                                    • keybd_event.USER32(00000012,00000000), ref: 0011F501
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0011F50B
                                    • keybd_event.USER32(00000012,00000000), ref: 0011F510
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0011F519
                                    • keybd_event.USER32(00000012,00000000), ref: 0011F51E
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0011F528
                                    • keybd_event.USER32(00000012,00000000), ref: 0011F52D
                                    • SetForegroundWindow.USER32(00000000), ref: 0011F530
                                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0011F557
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 4125248594-2988720461
                                    • Opcode ID: fa67de7864ebb8172223bfe342b5ca3bb656711e73e407d3f3b4fb43e5ade5c5
                                    • Instruction ID: b6074ddf2ee5d394851224cb2c93f1173152f61514ba9bf3f6673b8149705daf
                                    • Opcode Fuzzy Hash: fa67de7864ebb8172223bfe342b5ca3bb656711e73e407d3f3b4fb43e5ade5c5
                                    • Instruction Fuzzy Hash: 6D318D71B40318BEEB246FB55C4AFBF7E6DEB44B51F100069FA00EA1D1D7B05981AAA0
                                    APIs
                                      • Part of subcall function 001216C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0012170D
                                      • Part of subcall function 001216C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0012173A
                                      • Part of subcall function 001216C3: GetLastError.KERNEL32 ref: 0012174A
                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00121286
                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 001212A8
                                    • CloseHandle.KERNEL32(?), ref: 001212B9
                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001212D1
                                    • GetProcessWindowStation.USER32 ref: 001212EA
                                    • SetProcessWindowStation.USER32(00000000), ref: 001212F4
                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00121310
                                      • Part of subcall function 001210BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001211FC), ref: 001210D4
                                      • Part of subcall function 001210BF: CloseHandle.KERNEL32(?,?,001211FC), ref: 001210E9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                    • String ID: $default$winsta0
                                    • API String ID: 22674027-1027155976
                                    • Opcode ID: 0a6abb759bfcae3d7743b9cfef4d27eb618344190bfe412c76118dbebf1cff0b
                                    • Instruction ID: a5ec81c4a355613b55f8165e9c946ab9614473473f32ef94565e00f48ed500f4
                                    • Opcode Fuzzy Hash: 0a6abb759bfcae3d7743b9cfef4d27eb618344190bfe412c76118dbebf1cff0b
                                    • Instruction Fuzzy Hash: C481AD71900359BFDF20EFA4EC49BEE7BB9EF14700F144129F915A62A0D7708AA4CB60
                                    APIs
                                      • Part of subcall function 001210F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00121114
                                      • Part of subcall function 001210F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121120
                                      • Part of subcall function 001210F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 0012112F
                                      • Part of subcall function 001210F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121136
                                      • Part of subcall function 001210F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0012114D
                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00120BCC
                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00120C00
                                    • GetLengthSid.ADVAPI32(?), ref: 00120C17
                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00120C51
                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00120C6D
                                    • GetLengthSid.ADVAPI32(?), ref: 00120C84
                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00120C8C
                                    • HeapAlloc.KERNEL32(00000000), ref: 00120C93
                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00120CB4
                                    • CopySid.ADVAPI32(00000000), ref: 00120CBB
                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00120CEA
                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00120D0C
                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00120D1E
                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120D45
                                    • HeapFree.KERNEL32(00000000), ref: 00120D4C
                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120D55
                                    • HeapFree.KERNEL32(00000000), ref: 00120D5C
                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120D65
                                    • HeapFree.KERNEL32(00000000), ref: 00120D6C
                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00120D78
                                    • HeapFree.KERNEL32(00000000), ref: 00120D7F
                                      • Part of subcall function 00121193: GetProcessHeap.KERNEL32(00000008,00120BB1,?,00000000,?,00120BB1,?), ref: 001211A1
                                      • Part of subcall function 00121193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00120BB1,?), ref: 001211A8
                                      • Part of subcall function 00121193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00120BB1,?), ref: 001211B7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                    • String ID:
                                    • API String ID: 4175595110-0
                                    • Opcode ID: e32eff31de3325c9b337da8195d85bfafbac9e399e12f8f8e9c326a62cce97ee
                                    • Instruction ID: 4c170a9acf8b738c55cc20a3bd803a9d51d08bcdd59c538f5d8ee7bb87b00b32
                                    • Opcode Fuzzy Hash: e32eff31de3325c9b337da8195d85bfafbac9e399e12f8f8e9c326a62cce97ee
                                    • Instruction Fuzzy Hash: ED716A7590131AEFDF11DFE4EC44BAEBBB8EF08311F044215F914AA292D771AA55CBA0
                                    APIs
                                    • OpenClipboard.USER32(0015CC08), ref: 0013EB29
                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0013EB37
                                    • GetClipboardData.USER32(0000000D), ref: 0013EB43
                                    • CloseClipboard.USER32 ref: 0013EB4F
                                    • GlobalLock.KERNEL32(00000000), ref: 0013EB87
                                    • CloseClipboard.USER32 ref: 0013EB91
                                    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 0013EBBC
                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0013EBC9
                                    • GetClipboardData.USER32(00000001), ref: 0013EBD1
                                    • GlobalLock.KERNEL32(00000000), ref: 0013EBE2
                                    • GlobalUnlock.KERNEL32(00000000,?), ref: 0013EC22
                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 0013EC38
                                    • GetClipboardData.USER32(0000000F), ref: 0013EC44
                                    • GlobalLock.KERNEL32(00000000), ref: 0013EC55
                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0013EC77
                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0013EC94
                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0013ECD2
                                    • GlobalUnlock.KERNEL32(00000000,?,?), ref: 0013ECF3
                                    • CountClipboardFormats.USER32 ref: 0013ED14
                                    • CloseClipboard.USER32 ref: 0013ED59
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                    • String ID:
                                    • API String ID: 420908878-0
                                    • Opcode ID: 20b53fc997128f997d98f04248fc179e4e04ddee1395c0a7ee1dac4b2776ecd8
                                    • Instruction ID: 64c18a18df515a6f6d969ca9bba311ca4801362ac9f3bb187aacb7dff6a02174
                                    • Opcode Fuzzy Hash: 20b53fc997128f997d98f04248fc179e4e04ddee1395c0a7ee1dac4b2776ecd8
                                    • Instruction Fuzzy Hash: EB61AB34204301AFD310EF64D899F6AB7E4EF84714F14455DF4569B2E2CB71EA85CBA2
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?), ref: 001369BE
                                    • FindClose.KERNEL32(00000000), ref: 00136A12
                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00136A4E
                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00136A75
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00136AB2
                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00136ADF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                    • API String ID: 3830820486-3289030164
                                    • Opcode ID: ef96875fbfd36ca3a234e0ccec87b97bcdb796a5a6a94cf813186a9c1110bab6
                                    • Instruction ID: ae95291748b613a023416962041e84ca580752b6d6bfca8e34f67b561b9f8e14
                                    • Opcode Fuzzy Hash: ef96875fbfd36ca3a234e0ccec87b97bcdb796a5a6a94cf813186a9c1110bab6
                                    • Instruction Fuzzy Hash: 43D14171508340AFC714EBA4C886EAFB7ECAF88704F44491DF589D7192EB74DA49CB62
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00139663
                                    • GetFileAttributesW.KERNEL32(?), ref: 001396A1
                                    • SetFileAttributesW.KERNEL32(?,?), ref: 001396BB
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 001396D3
                                    • FindClose.KERNEL32(00000000), ref: 001396DE
                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 001396FA
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0013974A
                                    • SetCurrentDirectoryW.KERNEL32(00186B7C), ref: 00139768
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00139772
                                    • FindClose.KERNEL32(00000000), ref: 0013977F
                                    • FindClose.KERNEL32(00000000), ref: 0013978F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                    • String ID: *.*
                                    • API String ID: 1409584000-438819550
                                    • Opcode ID: 22cac37931d8a3bd398360795bb55ed5066e73643b7fbc3c96c03bd8f0185c52
                                    • Instruction ID: ca328e2ce59952a3fe0ba1af424e2579a1362189401a65fd945e64ebeb9ef132
                                    • Opcode Fuzzy Hash: 22cac37931d8a3bd398360795bb55ed5066e73643b7fbc3c96c03bd8f0185c52
                                    • Instruction Fuzzy Hash: 1631F13264131AAFDF14AFB4DC49ADE77ACAF09322F144055F915E60E0EBB4DE848E90
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 001397BE
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00139819
                                    • FindClose.KERNEL32(00000000), ref: 00139824
                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00139840
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00139890
                                    • SetCurrentDirectoryW.KERNEL32(00186B7C), ref: 001398AE
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001398B8
                                    • FindClose.KERNEL32(00000000), ref: 001398C5
                                    • FindClose.KERNEL32(00000000), ref: 001398D5
                                      • Part of subcall function 0012DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0012DB00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                    • String ID: *.*
                                    • API String ID: 2640511053-438819550
                                    • Opcode ID: 5eb7a3c5a5a6d2922a9190e7b573a9ce56da2599c7278b2dcfbfce378315a26a
                                    • Instruction ID: c4c14ed6f4700d1a6af0bbb87d468a715dab0e2e164c30e89f66f9bf9a11c78f
                                    • Opcode Fuzzy Hash: 5eb7a3c5a5a6d2922a9190e7b573a9ce56da2599c7278b2dcfbfce378315a26a
                                    • Instruction Fuzzy Hash: 2D31D23250035EAEDF10EFB4EC48ADE77ACAF46325F1441A5E950A60A1DBB4DE84CF60
                                    APIs
                                      • Part of subcall function 0014C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0014B6AE,?,?), ref: 0014C9B5
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014C9F1
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA68
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA9E
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014BF3E
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0014BFA9
                                    • RegCloseKey.ADVAPI32(00000000), ref: 0014BFCD
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0014C02C
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0014C0E7
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0014C154
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0014C1E9
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0014C23A
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0014C2E3
                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0014C382
                                    • RegCloseKey.ADVAPI32(00000000), ref: 0014C38F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                    • String ID:
                                    • API String ID: 3102970594-0
                                    • Opcode ID: 3ae927e04115700848645ffb2d82596e9fb461aa61211ce860ceb711d1af93c1
                                    • Instruction ID: cd0f45c9572e17e7d7f7db2bce3539f81c6be2cbd2c99906dd394873f8886232
                                    • Opcode Fuzzy Hash: 3ae927e04115700848645ffb2d82596e9fb461aa61211ce860ceb711d1af93c1
                                    • Instruction Fuzzy Hash: 2B023C716042009FD754DF28C895E2ABBE5EF89318F18C49DF84ACB2A2DB31ED45CB91
                                    APIs
                                    • GetLocalTime.KERNEL32(?), ref: 00138257
                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00138267
                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00138273
                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00138310
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00138324
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00138356
                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0013838C
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00138395
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CurrentDirectoryTime$File$Local$System
                                    • String ID: *.*
                                    • API String ID: 1464919966-438819550
                                    • Opcode ID: 695f708c618102c9fefa003003ea0e049d855c4aec3fb4e3b2f2206d6731c6a2
                                    • Instruction ID: 85d21375b86c2f073419f34e2cc51610a4901858191ae54d321f1c4cf9de86ca
                                    • Opcode Fuzzy Hash: 695f708c618102c9fefa003003ea0e049d855c4aec3fb4e3b2f2206d6731c6a2
                                    • Instruction Fuzzy Hash: 226169725043459FCB10EF60C841EAEB3E8FF89314F04892EF98997252DB35E949CB92
                                    APIs
                                      • Part of subcall function 000C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000C3A97,?,?,000C2E7F,?,?,?,00000000), ref: 000C3AC2
                                      • Part of subcall function 0012E199: GetFileAttributesW.KERNEL32(?,0012CF95), ref: 0012E19A
                                    • FindFirstFileW.KERNEL32(?,?), ref: 0012D122
                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0012D1DD
                                    • MoveFileW.KERNEL32(?,?), ref: 0012D1F0
                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 0012D20D
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0012D237
                                      • Part of subcall function 0012D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0012D21C,?,?), ref: 0012D2B2
                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 0012D253
                                    • FindClose.KERNEL32(00000000), ref: 0012D264
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                    • String ID: \*.*
                                    • API String ID: 1946585618-1173974218
                                    • Opcode ID: 30a1ab0502685d1fd0a5370f6a82410954e9486c328b4ec4114e1efffd6b171e
                                    • Instruction ID: 6f7c3366f8023294738cedc79e3bf108b9ddda3f654fbfb08451f2ee71fd5cbf
                                    • Opcode Fuzzy Hash: 30a1ab0502685d1fd0a5370f6a82410954e9486c328b4ec4114e1efffd6b171e
                                    • Instruction Fuzzy Hash: 6E615C3190125D9FCF05EBA0EA92EEDB7B5AF15300F608169E40277192EB30AF19CB61
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                    • String ID:
                                    • API String ID: 1737998785-0
                                    • Opcode ID: 4088ad22b00fe0ec347332d481df1eb305824750531a8d29ae728ec434f22122
                                    • Instruction ID: 45ddf7d4db2b3db4d5dd696e289fb0e351c12449a1f439e0f4ed8fc0e9369192
                                    • Opcode Fuzzy Hash: 4088ad22b00fe0ec347332d481df1eb305824750531a8d29ae728ec434f22122
                                    • Instruction Fuzzy Hash: 5A416A35604711EFE710DF15D888F5ABBE5EF44329F1480A9E4198FAA2C735ED82CB90
                                    APIs
                                      • Part of subcall function 001216C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0012170D
                                      • Part of subcall function 001216C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0012173A
                                      • Part of subcall function 001216C3: GetLastError.KERNEL32 ref: 0012174A
                                    • ExitWindowsEx.USER32(?,00000000), ref: 0012E932
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                    • String ID: $ $@$SeShutdownPrivilege
                                    • API String ID: 2234035333-3163812486
                                    • Opcode ID: 83d9d6c01d07755ec08e1bc4ca280104463bb34e2baf8417bb0ac3c54b601a94
                                    • Instruction ID: a89eb6d170ddfca038460e8f77f5ec637d4abc1daa477d6aa957b370952dc7ff
                                    • Opcode Fuzzy Hash: 83d9d6c01d07755ec08e1bc4ca280104463bb34e2baf8417bb0ac3c54b601a94
                                    • Instruction Fuzzy Hash: 9801D672A10331AFEF5466B8BC8ABBF729CA724759F150423F902E61D1E7A05CE4C6D4
                                    APIs
                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00141276
                                    • WSAGetLastError.WSOCK32 ref: 00141283
                                    • bind.WSOCK32(00000000,?,00000010), ref: 001412BA
                                    • WSAGetLastError.WSOCK32 ref: 001412C5
                                    • closesocket.WSOCK32(00000000), ref: 001412F4
                                    • listen.WSOCK32(00000000,00000005), ref: 00141303
                                    • WSAGetLastError.WSOCK32 ref: 0014130D
                                    • closesocket.WSOCK32(00000000), ref: 0014133C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                    • String ID:
                                    • API String ID: 540024437-0
                                    • Opcode ID: 0635fe02fc3b3cbfec56ee985ee150a4c2d7245d7782b03c3ca484fe120e073c
                                    • Instruction ID: 328f79ed3a120bed43919b1aed8ea51e3b189a4dcc9f1ed55a3d42eb6d1d934c
                                    • Opcode Fuzzy Hash: 0635fe02fc3b3cbfec56ee985ee150a4c2d7245d7782b03c3ca484fe120e073c
                                    • Instruction Fuzzy Hash: 9D414E31600200AFD714DF64C485F69BBE6BF46318F288198E8569F2A6C771EDC2CBE1
                                    APIs
                                    • _free.LIBCMT ref: 000FB9D4
                                    • _free.LIBCMT ref: 000FB9F8
                                    • _free.LIBCMT ref: 000FBB7F
                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00163700), ref: 000FBB91
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0019121C,000000FF,00000000,0000003F,00000000,?,?), ref: 000FBC09
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00191270,000000FF,?,0000003F,00000000,?), ref: 000FBC36
                                    • _free.LIBCMT ref: 000FBD4B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                    • String ID:
                                    • API String ID: 314583886-0
                                    • Opcode ID: c2235ffe8cdff44366b8681d5e4e3ac3b95a2be03963ab8625900bb55f7d4aa1
                                    • Instruction ID: 60b8a71aa092daf4b1a40c9b633c957adf44d5ce45a93aff0c6c1180416903d2
                                    • Opcode Fuzzy Hash: c2235ffe8cdff44366b8681d5e4e3ac3b95a2be03963ab8625900bb55f7d4aa1
                                    • Instruction Fuzzy Hash: 3CC12A7190420DAFCB20EF69DC51ABE7BE9EF41310F24415AE650D7952E7709E41EF90
                                    APIs
                                      • Part of subcall function 000C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000C3A97,?,?,000C2E7F,?,?,?,00000000), ref: 000C3AC2
                                      • Part of subcall function 0012E199: GetFileAttributesW.KERNEL32(?,0012CF95), ref: 0012E19A
                                    • FindFirstFileW.KERNEL32(?,?), ref: 0012D420
                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 0012D470
                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0012D481
                                    • FindClose.KERNEL32(00000000), ref: 0012D498
                                    • FindClose.KERNEL32(00000000), ref: 0012D4A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                    • String ID: \*.*
                                    • API String ID: 2649000838-1173974218
                                    • Opcode ID: 668091ce3aeec634f25fcda9c63b3eb8dfb89ee54bce9c45097bc45a7a41cdb7
                                    • Instruction ID: ca41c5c4da0b3f02345ba387cd78b02c9f1eee507c027a6e337c0c728e175678
                                    • Opcode Fuzzy Hash: 668091ce3aeec634f25fcda9c63b3eb8dfb89ee54bce9c45097bc45a7a41cdb7
                                    • Instruction Fuzzy Hash: 41316F310083959FC204EF64E855DEF77A8AF96314F444A1DF4D153192EB30AA19CB63
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: __floor_pentium4
                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                    • API String ID: 4168288129-2761157908
                                    • Opcode ID: 34d9f2d45f9533c6b358f12e7917ce322b9070a1e395aa0335b0c3b43628a890
                                    • Instruction ID: facc1f046acf5843595898a69fe43feaab5f4c898d87d0ecd95efaec6ec0be1b
                                    • Opcode Fuzzy Hash: 34d9f2d45f9533c6b358f12e7917ce322b9070a1e395aa0335b0c3b43628a890
                                    • Instruction Fuzzy Hash: A4C25872E086298FDB64CE28DD407FAB7B5EB44304F1441EADA0DE7651E778AE819F40
                                    APIs
                                    • _wcslen.LIBCMT ref: 001364DC
                                    • CoInitialize.OLE32(00000000), ref: 00136639
                                    • CoCreateInstance.OLE32(0015FCF8,00000000,00000001,0015FB68,?), ref: 00136650
                                    • CoUninitialize.OLE32 ref: 001368D4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                    • String ID: .lnk
                                    • API String ID: 886957087-24824748
                                    • Opcode ID: f524565184024166e8538e44389a547062b5133553994394f2f843d2c62d8112
                                    • Instruction ID: ce5be1620e316509957a47a630d095e63d83f84d983e290b7717e0c6659eb2b3
                                    • Opcode Fuzzy Hash: f524565184024166e8538e44389a547062b5133553994394f2f843d2c62d8112
                                    • Instruction Fuzzy Hash: 2BD12A71508301AFD314EF24C881EABB7E8EF99704F50896DF5558B292DB71E906CB92
                                    APIs
                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 001422E8
                                      • Part of subcall function 0013E4EC: GetWindowRect.USER32(?,?), ref: 0013E504
                                    • GetDesktopWindow.USER32 ref: 00142312
                                    • GetWindowRect.USER32(00000000), ref: 00142319
                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00142355
                                    • GetCursorPos.USER32(?), ref: 00142381
                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 001423DF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                    • String ID:
                                    • API String ID: 2387181109-0
                                    • Opcode ID: 8bcbea19aaf3aa5cd6231f3c552353996514b9c512a5bc241ea563266d5c2cf2
                                    • Instruction ID: 34249d109f7c249f7585bf60807f20b4b3efabb2c542f6a6f981bb03cbf00d97
                                    • Opcode Fuzzy Hash: 8bcbea19aaf3aa5cd6231f3c552353996514b9c512a5bc241ea563266d5c2cf2
                                    • Instruction Fuzzy Hash: B131DE72504315AFCB20DF54D849B9BBBE9FF88314F400A19F9859B191DB74EA88CBD2
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00139B78
                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00139C8B
                                      • Part of subcall function 00133874: GetInputState.USER32 ref: 001338CB
                                      • Part of subcall function 00133874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00133966
                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00139BA8
                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00139C75
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                    • String ID: *.*
                                    • API String ID: 1972594611-438819550
                                    • Opcode ID: 34cb344971fff941395c567f55d8d11e302d48c6dc3d1689a23a597af82b8f02
                                    • Instruction ID: 84e00c77be1a4f644101be8d447ee1ff954f64f310b71f49594754ac97c27627
                                    • Opcode Fuzzy Hash: 34cb344971fff941395c567f55d8d11e302d48c6dc3d1689a23a597af82b8f02
                                    • Instruction Fuzzy Hash: 1F41407190420A9FDF15DFA4C989EEEBBB8EF05311F244159E815A7191EB709E84CFA0
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 000D9A4E
                                    • GetSysColor.USER32(0000000F), ref: 000D9B23
                                    • SetBkColor.GDI32(?,00000000), ref: 000D9B36
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Color$LongProcWindow
                                    • String ID:
                                    • API String ID: 3131106179-0
                                    • Opcode ID: 48c011ad5ecc2b97f36ea975d01babe8c9866c361953640fca2d578ea7dfac06
                                    • Instruction ID: c3ab8990297ea0961d8dc42fe186d89394f93761fe7e66a009944c2a2610ac99
                                    • Opcode Fuzzy Hash: 48c011ad5ecc2b97f36ea975d01babe8c9866c361953640fca2d578ea7dfac06
                                    • Instruction Fuzzy Hash: E9A1F771208604FEE739AA2C8C59DBF36ADDB42350F15021BF512DABD1DB259D81D2B3
                                    APIs
                                      • Part of subcall function 0014304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0014307A
                                      • Part of subcall function 0014304E: _wcslen.LIBCMT ref: 0014309B
                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0014185D
                                    • WSAGetLastError.WSOCK32 ref: 00141884
                                    • bind.WSOCK32(00000000,?,00000010), ref: 001418DB
                                    • WSAGetLastError.WSOCK32 ref: 001418E6
                                    • closesocket.WSOCK32(00000000), ref: 00141915
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                    • String ID:
                                    • API String ID: 1601658205-0
                                    • Opcode ID: b3b8ac8a21a4c504985d2bc7be117bcd5ae13ecacc425704f2a2659970d230e6
                                    • Instruction ID: d743a702904d5f1eac80f92ddf855cca5d642b8fb4d5128690956551c9e690f7
                                    • Opcode Fuzzy Hash: b3b8ac8a21a4c504985d2bc7be117bcd5ae13ecacc425704f2a2659970d230e6
                                    • Instruction Fuzzy Hash: DB518275A00210AFEB10AF24C886F6E77E5AF44718F58845CF91A5F3D3D771AD828BA1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                    • String ID:
                                    • API String ID: 292994002-0
                                    • Opcode ID: bd37ee20edc8dbf6e56ab8260bc8a7ca7e093d2eab30cbe834f96f3c691dad24
                                    • Instruction ID: 7eaf7446c71c640527b3a4b6254985b7820eff138de8e003c54c855acc3a8c2c
                                    • Opcode Fuzzy Hash: bd37ee20edc8dbf6e56ab8260bc8a7ca7e093d2eab30cbe834f96f3c691dad24
                                    • Instruction Fuzzy Hash: 59219131740211EFD7228F1AC884F6A7BA5AF95326B59806CEC5A8F351D772EC46CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                    • API String ID: 0-1546025612
                                    • Opcode ID: 0ac5fca57935855bef588b8e1e422e2c109edec0d239854d71dd5114d4a01200
                                    • Instruction ID: bcb9f5da3d53189d31ad1bfc75a8ed28ccc248fb836e8312290ebb979463bdca
                                    • Opcode Fuzzy Hash: 0ac5fca57935855bef588b8e1e422e2c109edec0d239854d71dd5114d4a01200
                                    • Instruction Fuzzy Hash: E6A28470E0061ACBDF34CF58C944BAEB7B2BF54310F2481AAE855A7285EBB49D91CF54
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 0014A6AC
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0014A6BA
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • Process32NextW.KERNEL32(00000000,?), ref: 0014A79C
                                    • CloseHandle.KERNEL32(00000000), ref: 0014A7AB
                                      • Part of subcall function 000DCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00103303,?), ref: 000DCE8A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                    • String ID:
                                    • API String ID: 1991900642-0
                                    • Opcode ID: 6d741fe7d807eecc20a0da0d1db02947eaf5a586be8be66fc2cfe458ffcdb5c7
                                    • Instruction ID: e16b1ae372f47376193db9afcd8ea7ffa8e1e89b6d6fe7ad8de9fb20bd11fbfc
                                    • Opcode Fuzzy Hash: 6d741fe7d807eecc20a0da0d1db02947eaf5a586be8be66fc2cfe458ffcdb5c7
                                    • Instruction Fuzzy Hash: 895108715083019FD710DF24C886EAEBBE8FF89754F40491DF59A972A2EB31D905CBA2
                                    APIs
                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 0013CE89
                                    • GetLastError.KERNEL32(?,00000000), ref: 0013CEEA
                                    • SetEvent.KERNEL32(?,?,00000000), ref: 0013CEFE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorEventFileInternetLastRead
                                    • String ID:
                                    • API String ID: 234945975-0
                                    • Opcode ID: 9f5d1874e3ce7b65695395cc492a0232441eb43523e312183c6b285455f70680
                                    • Instruction ID: c6be232bac8370517148c79276cf7bdb498aca5f1b8d4203b6c2f6c7288562ea
                                    • Opcode Fuzzy Hash: 9f5d1874e3ce7b65695395cc492a0232441eb43523e312183c6b285455f70680
                                    • Instruction Fuzzy Hash: 6A21BAB1500705EFEB20DFA5C948BAABBFCEB40358F10442EE646A6151E770EE448BA0
                                    APIs
                                    • lstrlenW.KERNEL32(?,00105222), ref: 0012DBCE
                                    • GetFileAttributesW.KERNEL32(?), ref: 0012DBDD
                                    • FindFirstFileW.KERNEL32(?,?), ref: 0012DBEE
                                    • FindClose.KERNEL32(00000000), ref: 0012DBFA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FileFind$AttributesCloseFirstlstrlen
                                    • String ID:
                                    • API String ID: 2695905019-0
                                    • Opcode ID: def91458aadf37262f6dc29bf64214f0161d874ae701f306d898c94f327c03a1
                                    • Instruction ID: c370d8df1162d1e897619221db79ca135d4e1cc66fae14f974dc8b436ed284cc
                                    • Opcode Fuzzy Hash: def91458aadf37262f6dc29bf64214f0161d874ae701f306d898c94f327c03a1
                                    • Instruction Fuzzy Hash: B1F0A030810B209B82246F78FC0D8AA376D9F02336B10470AF836D24E0EBB059B4C6D6
                                    APIs
                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 001282AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: lstrlen
                                    • String ID: ($|
                                    • API String ID: 1659193697-1631851259
                                    • Opcode ID: 17db832f07dd0fdfe70fbe5594d2e0d5c4c8ee45fcc65e42e23269b234aa1912
                                    • Instruction ID: de142dacf061b0bcea1a70d23d5400b6179f202124812df7364798c8645f5f2e
                                    • Opcode Fuzzy Hash: 17db832f07dd0fdfe70fbe5594d2e0d5c4c8ee45fcc65e42e23269b234aa1912
                                    • Instruction Fuzzy Hash: 78323474A007159FCB28CF19D481AAAB7F0FF48710B15C46EE49ADB3A1EB70E991CB50
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?), ref: 00135CC1
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00135D17
                                    • FindClose.KERNEL32(?), ref: 00135D5F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Find$File$CloseFirstNext
                                    • String ID:
                                    • API String ID: 3541575487-0
                                    • Opcode ID: 4f09f6e2d1659b9dc48a536e5ab4853106427d38369eb1dc1f74c20be69ee89d
                                    • Instruction ID: d6588f328656fa5a9ff5216632ccc0ed825dc2bc19ce010cfd1c18eca090a039
                                    • Opcode Fuzzy Hash: 4f09f6e2d1659b9dc48a536e5ab4853106427d38369eb1dc1f74c20be69ee89d
                                    • Instruction Fuzzy Hash: 19518874604B019FC718CF68C494E9AB7E5FF49324F14855EE99A8B3A2CB30ED45CB91
                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 000F271A
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 000F2724
                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 000F2731
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                    • String ID:
                                    • API String ID: 3906539128-0
                                    • Opcode ID: 2ed8c6f8099ee39833d07d86007028c6d7428354f2c686701a00e6e74d1fa1a6
                                    • Instruction ID: 503d0e49cdbd4f5d9859389cdbedd17b651b57b5171377a6f43db7bef4a3651d
                                    • Opcode Fuzzy Hash: 2ed8c6f8099ee39833d07d86007028c6d7428354f2c686701a00e6e74d1fa1a6
                                    • Instruction Fuzzy Hash: 2F31B47491131CDBCB61EF65DC897D9B7B8AF18310F5041EAE41CA6261E7709F818F45
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 001351DA
                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00135238
                                    • SetErrorMode.KERNEL32(00000000), ref: 001352A1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorMode$DiskFreeSpace
                                    • String ID:
                                    • API String ID: 1682464887-0
                                    • Opcode ID: a8780a57debadbba4af31378951155e5a176dba3d900d20c5deed2668e0a30b7
                                    • Instruction ID: da583d01b93b81c1d22b092f28e4ab961b2920ed3efca2804f5f2d6a22019db5
                                    • Opcode Fuzzy Hash: a8780a57debadbba4af31378951155e5a176dba3d900d20c5deed2668e0a30b7
                                    • Instruction Fuzzy Hash: B6312F75A00618DFDB00DF54D884FAEBBB5FF49314F448099E8099B352DB71E856CB90
                                    APIs
                                      • Part of subcall function 000DFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 000E0668
                                      • Part of subcall function 000DFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 000E0685
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0012170D
                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0012173A
                                    • GetLastError.KERNEL32 ref: 0012174A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                    • String ID:
                                    • API String ID: 577356006-0
                                    • Opcode ID: 6bb1e218d4ebd6a53be0a969373f86862f3d5b6a06957db177a494223244bfd0
                                    • Instruction ID: dd6456e5fb9edd36784c2567934c126a314c7690a2b819000fe6adbe30d57025
                                    • Opcode Fuzzy Hash: 6bb1e218d4ebd6a53be0a969373f86862f3d5b6a06957db177a494223244bfd0
                                    • Instruction Fuzzy Hash: 4F1191B2404305BFD718DF54EC86DABB7BAEB44725B20852EF05657641EB70BC51CA60
                                    APIs
                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0012D608
                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0012D645
                                    • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0012D650
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CloseControlCreateDeviceFileHandle
                                    • String ID:
                                    • API String ID: 33631002-0
                                    • Opcode ID: dc30ee7cee2f6e1cc73734792fcc4bf832d1de54d8b1fc552a12676bb6fb3753
                                    • Instruction ID: 175c35e730bdfe0af6229cc78e2c436d0b275f9c6f266c8003388e706aa71db5
                                    • Opcode Fuzzy Hash: dc30ee7cee2f6e1cc73734792fcc4bf832d1de54d8b1fc552a12676bb6fb3753
                                    • Instruction Fuzzy Hash: D4112A75A05328BFDB108F95EC45BAFBBBCEB45B50F108115F914A7290D6704A058BE1
                                    APIs
                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0012168C
                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 001216A1
                                    • FreeSid.ADVAPI32(?), ref: 001216B1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                    • String ID:
                                    • API String ID: 3429775523-0
                                    • Opcode ID: 76124bd3b3aa1ffe34d436ba771debc7ec2139a71cf29ea34f3be660b1919f2e
                                    • Instruction ID: 9755391efd243871cd512cf0776f58ce490adcc57a80c436b7057bc31fb146d8
                                    • Opcode Fuzzy Hash: 76124bd3b3aa1ffe34d436ba771debc7ec2139a71cf29ea34f3be660b1919f2e
                                    • Instruction Fuzzy Hash: F1F0F475950309FFDB00DFE49C89AAEBBBCFB08605F504565E501E6181E774AA848A90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: /
                                    • API String ID: 0-2043925204
                                    • Opcode ID: 802ca95a89219b985e151c83d86cb958af4139782ae3e3e79329b41b65edd8dc
                                    • Instruction ID: 692e0714861022b332f7e76f77586b75620ec189908a145ad9b7799e53fc9a7a
                                    • Opcode Fuzzy Hash: 802ca95a89219b985e151c83d86cb958af4139782ae3e3e79329b41b65edd8dc
                                    • Instruction Fuzzy Hash: 3B415B7290021DAFDB209FB9CD4ADBB77B8EBC4354F104269FA05D7581E6709E80DB50
                                    APIs
                                    • GetUserNameW.ADVAPI32(?,?), ref: 0011D28C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: NameUser
                                    • String ID: X64
                                    • API String ID: 2645101109-893830106
                                    • Opcode ID: b3f74d578713cff5cf66f419bd28fa7afd30c0439f0c257ef254a4031173e3f2
                                    • Instruction ID: 10607fe7b41f377026fca243f8ce891669d7aba2b04a70328e63fd852b3f4a07
                                    • Opcode Fuzzy Hash: b3f74d578713cff5cf66f419bd28fa7afd30c0439f0c257ef254a4031173e3f2
                                    • Instruction Fuzzy Hash: AFD0C9B480121DEECF94CB90EC88DDDB7BCBB04305F100152F106A2140D77495888F20
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                    • Instruction ID: d18c819ce543c4553193f1225d589858fb06fe27032c3b3b226e889b80d46367
                                    • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                    • Instruction Fuzzy Hash: 48020D71E012599FEF14CFA9C880AADFBF1EF48314F25416AD919F7384D731A9428B94
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?), ref: 00136918
                                    • FindClose.KERNEL32(00000000), ref: 00136961
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID:
                                    • API String ID: 2295610775-0
                                    • Opcode ID: f30a49bae1391b7428c09ebe100717a7bcd02561846f0dc9fa7134befb3349fd
                                    • Instruction ID: 703e1f863f072150b11493b37a1c503e39af75cc562169807cc7e8405bd257ce
                                    • Opcode Fuzzy Hash: f30a49bae1391b7428c09ebe100717a7bcd02561846f0dc9fa7134befb3349fd
                                    • Instruction Fuzzy Hash: 02117C31604600AFD710DF29D484F1ABBE5EF85329F15C6ADE4699F6A2C730EC46CB91
                                    APIs
                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00144891,?,?,00000035,?), ref: 001337E4
                                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00144891,?,?,00000035,?), ref: 001337F4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorFormatLastMessage
                                    • String ID:
                                    • API String ID: 3479602957-0
                                    • Opcode ID: 1dd633261a2408ab390be69be1a1295b95a5f7cd1e9563b850b68c9870750d5f
                                    • Instruction ID: bdd302aa19936d476591579ccafcd3cbe5b466602637b4926f352a6ce12977cd
                                    • Opcode Fuzzy Hash: 1dd633261a2408ab390be69be1a1295b95a5f7cd1e9563b850b68c9870750d5f
                                    • Instruction Fuzzy Hash: 13F0E5B06043296AE72017668C4DFEB3AAEEFC4761F000165F519D2691DA609944C7F0
                                    APIs
                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001211FC), ref: 001210D4
                                    • CloseHandle.KERNEL32(?,?,001211FC), ref: 001210E9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AdjustCloseHandlePrivilegesToken
                                    • String ID:
                                    • API String ID: 81990902-0
                                    • Opcode ID: 716bbd22bc396bd98d5875f19ef2415cac89be1efccfe175d2d08dc6395f8684
                                    • Instruction ID: dceaa8d01bf5b5fc6d5ed2aa3b99623eb69282d3441e4142f1ed522b2b7e2c56
                                    • Opcode Fuzzy Hash: 716bbd22bc396bd98d5875f19ef2415cac89be1efccfe175d2d08dc6395f8684
                                    • Instruction Fuzzy Hash: 64E04F32004711EEE7252B51FC05EB377A9EB04311B10C82EF4A6844B2DB626CE0DB60
                                    Strings
                                    • Variable is not of type 'Object'., xrefs: 00110C40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Variable is not of type 'Object'.
                                    • API String ID: 0-1840281001
                                    • Opcode ID: b045b902a468bd6732cd0feb1ec87f164802fc58d2cb032d2efd87d60b26c839
                                    • Instruction ID: 9979707c0b50a7abf1641d50c85473d600861e4d040bd5c92c532e790d046c47
                                    • Opcode Fuzzy Hash: b045b902a468bd6732cd0feb1ec87f164802fc58d2cb032d2efd87d60b26c839
                                    • Instruction Fuzzy Hash: 66327E74900218DBEF18DF94D881FEDB7B5BF09304F14406DE80AAB292D775AE86CB61
                                    APIs
                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,000F6766,?,?,00000008,?,?,000FFEFE,00000000), ref: 000F6998
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ExceptionRaise
                                    • String ID:
                                    • API String ID: 3997070919-0
                                    • Opcode ID: 3d38beff9b730ad736290ed9ddfe32c8526d361d6fc7438ce93ee7d1cde36725
                                    • Instruction ID: 895153ecf58358ce0267c247208f493558a8d0cf2063f83394a9e3ce3737edc8
                                    • Opcode Fuzzy Hash: 3d38beff9b730ad736290ed9ddfe32c8526d361d6fc7438ce93ee7d1cde36725
                                    • Instruction Fuzzy Hash: BEB16C31610608DFD755CF28C486B647BE0FF45364F29865CE99ACF6A2C736E982DB40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID: 0-3916222277
                                    • Opcode ID: 2df3c592bf445074fe3cd051023d91f9f603b7fd656f093ed65bd13792bc200a
                                    • Instruction ID: e4f8145430d1d2876609337952a3140a967ae97fae00ba0bd1c44ae1e3f2fbc7
                                    • Opcode Fuzzy Hash: 2df3c592bf445074fe3cd051023d91f9f603b7fd656f093ed65bd13792bc200a
                                    • Instruction Fuzzy Hash: F7124175900229DBDB64CF58C881AEEB7F5FF48710F15816AE849EB255DB309E81CBA0
                                    APIs
                                    • BlockInput.USER32(00000001), ref: 0013EABD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: BlockInput
                                    • String ID:
                                    • API String ID: 3456056419-0
                                    • Opcode ID: b6061960566172e262e5adcca9175863928d346bfde5d985963917e142937582
                                    • Instruction ID: 1dd19c41904bc87e2d50f6432a8098db728ad200409080f89841ac4314d389d7
                                    • Opcode Fuzzy Hash: b6061960566172e262e5adcca9175863928d346bfde5d985963917e142937582
                                    • Instruction Fuzzy Hash: B2E04F312003059FD710EF59D805E9AF7E9AF98760F00842AFC49CB391DB70E8418B90
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,000E03EE), ref: 000E09DA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 03391f66fb04785be65405be740459772f58e877bccce36d50f0432b68ca1e3a
                                    • Instruction ID: dcf4ef48895afd9597ad5215be1ea7a8f1ab6bdb81cc765ab5c9fb2bc9d243ec
                                    • Opcode Fuzzy Hash: 03391f66fb04785be65405be740459772f58e877bccce36d50f0432b68ca1e3a
                                    • Instruction Fuzzy Hash:
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0
                                    • API String ID: 0-4108050209
                                    • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                    • Instruction ID: 09da0e2873799e4f8b458868389a39aa8fd1336a06e8cfb83cf2f498919d77fb
                                    • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                    • Instruction Fuzzy Hash: 2451977168C6C55FDBB8856B8A597FE23C99F62300F18051AD98EF7283CE11DE01D352
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed164f075aef45cbf62344498d9acb0b56fd6f53942877fa71c08462a0db5d79
                                    • Instruction ID: 83e1b719a77c3f9e1b37c8abd5cf33fa2eed58322d96203af69dad9430a4ed7f
                                    • Opcode Fuzzy Hash: ed164f075aef45cbf62344498d9acb0b56fd6f53942877fa71c08462a0db5d79
                                    • Instruction Fuzzy Hash: C2323222D29F054DD7639634CC22336A289AFB73C5F15C737E81AB5EAAEB69C4C35101
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a1daeb65b9b887988e0d5492a9fe2890e00cdc49ec5d53346e7f0deafe4ef91a
                                    • Instruction ID: 9ec4cc2e1abdf30387b77ddf22867a9f6e50c9886598dcb02bb9aeeaa7b6b11a
                                    • Opcode Fuzzy Hash: a1daeb65b9b887988e0d5492a9fe2890e00cdc49ec5d53346e7f0deafe4ef91a
                                    • Instruction Fuzzy Hash: B5320131A842168BDF2CCA28C594AFD7BA1AF45300F29817BD95A8B791E330DDC1DBD1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2b2b4492daed18c04564ecb48a4901b2b21185ca0061d6a3f2a567e1bad22cf0
                                    • Instruction ID: 3c31fdb879a3ca499b5864be6133bd625d96bae0837d560d6aa964c72ef2455d
                                    • Opcode Fuzzy Hash: 2b2b4492daed18c04564ecb48a4901b2b21185ca0061d6a3f2a567e1bad22cf0
                                    • Instruction Fuzzy Hash: 41227D70A0460A9FDF14CFA4C881BEEB7B6FF44300F144529E856AB291EB76AE55CF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a93b62b36c87902d89e0f8a68888d7e6a61ca28cdb476b9465d9d5d16e8993ea
                                    • Instruction ID: 527bba27562e6b7fee4cf4fab65104abc428ae5ca697ed64da699e87014f551e
                                    • Opcode Fuzzy Hash: a93b62b36c87902d89e0f8a68888d7e6a61ca28cdb476b9465d9d5d16e8993ea
                                    • Instruction Fuzzy Hash: 0E02C5B0A0020AEBDB04DF55D981BAEB7F5FF44300F118569E8569B3D1EB71EA60CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 30ca1fd8d81b0cba7fb012033828080419b2c722fd7c69da08ce72450fbada8e
                                    • Instruction ID: 433662b67baf602453a4bd049faa5d086f73dbfdd06aff0391860febcfbb5e02
                                    • Opcode Fuzzy Hash: 30ca1fd8d81b0cba7fb012033828080419b2c722fd7c69da08ce72450fbada8e
                                    • Instruction Fuzzy Hash: 85B1D020E2AF414DD22396398C75336B65CBFBB6D5B91D71BFC2A74E62EB2186C34140
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2a4ed5df518b71ff1141161c4ca5776b39a58ea48c0641888a82d93f6dd532c0
                                    • Instruction ID: 43e36337a6b00c3a361aec025f8c72ffa79d6bd9efd61115ee6c8d4604ec960c
                                    • Opcode Fuzzy Hash: 2a4ed5df518b71ff1141161c4ca5776b39a58ea48c0641888a82d93f6dd532c0
                                    • Instruction Fuzzy Hash: F5616A716087C99EDAB4992B4855BFF33D8DF81700F28492DE94EFB282D7119E42C316
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a3676d619fea96b7672b781962a8bd76f7ee755a8a224e947ea0908db589811d
                                    • Instruction ID: 0175598e64e41a756dca68d92176390ebbe10a6eced97735d38570edcbc48924
                                    • Opcode Fuzzy Hash: a3676d619fea96b7672b781962a8bd76f7ee755a8a224e947ea0908db589811d
                                    • Instruction Fuzzy Hash: 1E61897120C7C96EDAB84A2B4C91BFE23E9DF46700F10495AE84FFB382DA129D428311
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5ee4ba6130d4f83a450e2360fc425a827998d09906dc4116e31f1cd4938c05e9
                                    • Instruction ID: 6a96f9a6200a82dd70e9322c4ec9f8a680acdde617eb360df9d1431bad13ed2b
                                    • Opcode Fuzzy Hash: 5ee4ba6130d4f83a450e2360fc425a827998d09906dc4116e31f1cd4938c05e9
                                    • Instruction Fuzzy Hash: 9E21E7322216118BDB2CCF79C8236BE73E5A754320F14862EE4A7C37D0DE39A944CB80
                                    APIs
                                    • DeleteObject.GDI32(00000000), ref: 00142B30
                                    • DeleteObject.GDI32(00000000), ref: 00142B43
                                    • DestroyWindow.USER32 ref: 00142B52
                                    • GetDesktopWindow.USER32 ref: 00142B6D
                                    • GetWindowRect.USER32(00000000), ref: 00142B74
                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00142CA3
                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00142CB1
                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142CF8
                                    • GetClientRect.USER32(00000000,?), ref: 00142D04
                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00142D40
                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D62
                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D75
                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D80
                                    • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D89
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D98
                                    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142DA1
                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142DA8
                                    • GlobalFree.KERNEL32(00000000), ref: 00142DB3
                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142DC5
                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,0015FC38,00000000), ref: 00142DDB
                                    • GlobalFree.KERNEL32(00000000), ref: 00142DEB
                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00142E11
                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00142E30
                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142E52
                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0014303F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                    • String ID: $AutoIt v3$DISPLAY$static
                                    • API String ID: 2211948467-2373415609
                                    • Opcode ID: 7363406f8dcebc8360c5071a2104ff5fb8dcd94dc4e7ec7224bdaa4fea7c5db3
                                    • Instruction ID: 4de34e1fb412a2601c910401f35bf77e640deb5981bd2cc4c83d74c21d60fe5b
                                    • Opcode Fuzzy Hash: 7363406f8dcebc8360c5071a2104ff5fb8dcd94dc4e7ec7224bdaa4fea7c5db3
                                    • Instruction Fuzzy Hash: 52025A71900205EFDB14DF64CC89EAE7BB9FB48711F048158F915AB2A1CB70AE81CFA0
                                    APIs
                                    • SetTextColor.GDI32(?,00000000), ref: 0015712F
                                    • GetSysColorBrush.USER32(0000000F), ref: 00157160
                                    • GetSysColor.USER32(0000000F), ref: 0015716C
                                    • SetBkColor.GDI32(?,000000FF), ref: 00157186
                                    • SelectObject.GDI32(?,?), ref: 00157195
                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 001571C0
                                    • GetSysColor.USER32(00000010), ref: 001571C8
                                    • CreateSolidBrush.GDI32(00000000), ref: 001571CF
                                    • FrameRect.USER32(?,?,00000000), ref: 001571DE
                                    • DeleteObject.GDI32(00000000), ref: 001571E5
                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00157230
                                    • FillRect.USER32(?,?,?), ref: 00157262
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00157284
                                      • Part of subcall function 001573E8: GetSysColor.USER32(00000012), ref: 00157421
                                      • Part of subcall function 001573E8: SetTextColor.GDI32(?,?), ref: 00157425
                                      • Part of subcall function 001573E8: GetSysColorBrush.USER32(0000000F), ref: 0015743B
                                      • Part of subcall function 001573E8: GetSysColor.USER32(0000000F), ref: 00157446
                                      • Part of subcall function 001573E8: GetSysColor.USER32(00000011), ref: 00157463
                                      • Part of subcall function 001573E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00157471
                                      • Part of subcall function 001573E8: SelectObject.GDI32(?,00000000), ref: 00157482
                                      • Part of subcall function 001573E8: SetBkColor.GDI32(?,00000000), ref: 0015748B
                                      • Part of subcall function 001573E8: SelectObject.GDI32(?,?), ref: 00157498
                                      • Part of subcall function 001573E8: InflateRect.USER32(?,000000FF,000000FF), ref: 001574B7
                                      • Part of subcall function 001573E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001574CE
                                      • Part of subcall function 001573E8: GetWindowLongW.USER32(00000000,000000F0), ref: 001574DB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                    • String ID:
                                    • API String ID: 4124339563-0
                                    • Opcode ID: 29e13ffbd6e3c3572fb21e74748dea0f8d8050e03f2bcf65410123d14ab49be1
                                    • Instruction ID: 02c6def1ba9cedb79cbe5dbbef64dfce3deb2ab31fdc2b09f191e32d9507cd87
                                    • Opcode Fuzzy Hash: 29e13ffbd6e3c3572fb21e74748dea0f8d8050e03f2bcf65410123d14ab49be1
                                    • Instruction Fuzzy Hash: F1A1A572108701FFD7019F60DC49E5BBBAAFF89322F100A19F9629A5E1D771E984CB91
                                    APIs
                                    • DestroyWindow.USER32(00000000), ref: 0014273E
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0014286A
                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 001428A9
                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 001428B9
                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00142900
                                    • GetClientRect.USER32(00000000,?), ref: 0014290C
                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00142955
                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00142964
                                    • GetStockObject.GDI32(00000011), ref: 00142974
                                    • SelectObject.GDI32(00000000,00000000), ref: 00142978
                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00142988
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00142991
                                    • DeleteDC.GDI32(00000000), ref: 0014299A
                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 001429C6
                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 001429DD
                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00142A1D
                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00142A31
                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00142A42
                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00142A77
                                    • GetStockObject.GDI32(00000011), ref: 00142A82
                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00142A8D
                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00142A97
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                    • API String ID: 2910397461-517079104
                                    • Opcode ID: e1eb5a711548eb622f23fb6431964f457ef3011db29f117bf7ca2ec293040e3b
                                    • Instruction ID: 19d972074b38e38aa07cca1a40d5eff3890e5c26af8a50782d8d77fb41b9c231
                                    • Opcode Fuzzy Hash: e1eb5a711548eb622f23fb6431964f457ef3011db29f117bf7ca2ec293040e3b
                                    • Instruction Fuzzy Hash: D9B13C71A00615AFEB14DF68CC86FAE7BB9FB08711F004519F915EB6A1D774AD80CB90
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 00134AED
                                    • GetDriveTypeW.KERNEL32(?,0015CB68,?,\\.\,0015CC08), ref: 00134BCA
                                    • SetErrorMode.KERNEL32(00000000,0015CB68,?,\\.\,0015CC08), ref: 00134D36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorMode$DriveType
                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                    • API String ID: 2907320926-4222207086
                                    • Opcode ID: 7ab2efcc88827ce9c520f5d304fa2c582ea18289893750708d038a7fe1aa9ca3
                                    • Instruction ID: 998e03fb4a306c50beadfce79322d0515ef682594c7de93f43e773dff12036af
                                    • Opcode Fuzzy Hash: 7ab2efcc88827ce9c520f5d304fa2c582ea18289893750708d038a7fe1aa9ca3
                                    • Instruction Fuzzy Hash: D661B030605205DFCB08EF64CA82EADB7A0EB04340F249519F846AB692DB76FE45DF81
                                    APIs
                                    • GetSysColor.USER32(00000012), ref: 00157421
                                    • SetTextColor.GDI32(?,?), ref: 00157425
                                    • GetSysColorBrush.USER32(0000000F), ref: 0015743B
                                    • GetSysColor.USER32(0000000F), ref: 00157446
                                    • CreateSolidBrush.GDI32(?), ref: 0015744B
                                    • GetSysColor.USER32(00000011), ref: 00157463
                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00157471
                                    • SelectObject.GDI32(?,00000000), ref: 00157482
                                    • SetBkColor.GDI32(?,00000000), ref: 0015748B
                                    • SelectObject.GDI32(?,?), ref: 00157498
                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 001574B7
                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001574CE
                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 001574DB
                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0015752A
                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00157554
                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00157572
                                    • DrawFocusRect.USER32(?,?), ref: 0015757D
                                    • GetSysColor.USER32(00000011), ref: 0015758E
                                    • SetTextColor.GDI32(?,00000000), ref: 00157596
                                    • DrawTextW.USER32(?,001570F5,000000FF,?,00000000), ref: 001575A8
                                    • SelectObject.GDI32(?,?), ref: 001575BF
                                    • DeleteObject.GDI32(?), ref: 001575CA
                                    • SelectObject.GDI32(?,?), ref: 001575D0
                                    • DeleteObject.GDI32(?), ref: 001575D5
                                    • SetTextColor.GDI32(?,?), ref: 001575DB
                                    • SetBkColor.GDI32(?,?), ref: 001575E5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                    • String ID:
                                    • API String ID: 1996641542-0
                                    • Opcode ID: 9d1ce0cd1a2514c9d3af9708338ab5602bf9b95ce685270483ff797f3cbe4e78
                                    • Instruction ID: 25e42a27f3b71664d526bb835423b42d41127c5a032021fce651c8bedc5e7b25
                                    • Opcode Fuzzy Hash: 9d1ce0cd1a2514c9d3af9708338ab5602bf9b95ce685270483ff797f3cbe4e78
                                    • Instruction Fuzzy Hash: 13613B72904318EFDB019FA4EC49AEEBFB9EB08322F114115F915AB2E1D7759980CB90
                                    APIs
                                    • GetCursorPos.USER32(?), ref: 00151128
                                    • GetDesktopWindow.USER32 ref: 0015113D
                                    • GetWindowRect.USER32(00000000), ref: 00151144
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00151199
                                    • DestroyWindow.USER32(?), ref: 001511B9
                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 001511ED
                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0015120B
                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0015121D
                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 00151232
                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00151245
                                    • IsWindowVisible.USER32(00000000), ref: 001512A1
                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 001512BC
                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 001512D0
                                    • GetWindowRect.USER32(00000000,?), ref: 001512E8
                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 0015130E
                                    • GetMonitorInfoW.USER32(00000000,?), ref: 00151328
                                    • CopyRect.USER32(?,?), ref: 0015133F
                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 001513AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                    • String ID: ($0$tooltips_class32
                                    • API String ID: 698492251-4156429822
                                    • Opcode ID: 81e81707e42c2c5c192aa5265c2fc888cdb9e0bb677eb29d19ed63df39699e03
                                    • Instruction ID: e569b84d83ba31c074701402a7c62c3421f1caa326d5d55af9177731a0552f2a
                                    • Opcode Fuzzy Hash: 81e81707e42c2c5c192aa5265c2fc888cdb9e0bb677eb29d19ed63df39699e03
                                    • Instruction Fuzzy Hash: 22B15771604341EFD705DF64C885BAABBE4FF88351F00891CF9A99B2A2D771E849CB91
                                    APIs
                                    • CharUpperBuffW.USER32(?,?), ref: 001502E5
                                    • _wcslen.LIBCMT ref: 0015031F
                                    • _wcslen.LIBCMT ref: 00150389
                                    • _wcslen.LIBCMT ref: 001503F1
                                    • _wcslen.LIBCMT ref: 00150475
                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 001504C5
                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00150504
                                      • Part of subcall function 000DF9F2: _wcslen.LIBCMT ref: 000DF9FD
                                      • Part of subcall function 0012223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00122258
                                      • Part of subcall function 0012223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0012228A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                    • API String ID: 1103490817-719923060
                                    • Opcode ID: 947efd535be31f880c613a88cba985d0f7d0fff22bd670fcd4f70d7e71f90306
                                    • Instruction ID: 86faf56df8482f9db5729510d1396a03423cff82021908b26d9a4039e94887e0
                                    • Opcode Fuzzy Hash: 947efd535be31f880c613a88cba985d0f7d0fff22bd670fcd4f70d7e71f90306
                                    • Instruction Fuzzy Hash: 60E19C31208301CFC715EF64C55196EB3E6BF98315B54496DF8A6AB3A2DB30EE49CB81
                                    APIs
                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 000D8968
                                    • GetSystemMetrics.USER32(00000007), ref: 000D8970
                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 000D899B
                                    • GetSystemMetrics.USER32(00000008), ref: 000D89A3
                                    • GetSystemMetrics.USER32(00000004), ref: 000D89C8
                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 000D89E5
                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 000D89F5
                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 000D8A28
                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 000D8A3C
                                    • GetClientRect.USER32(00000000,000000FF), ref: 000D8A5A
                                    • GetStockObject.GDI32(00000011), ref: 000D8A76
                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 000D8A81
                                      • Part of subcall function 000D912D: GetCursorPos.USER32(?), ref: 000D9141
                                      • Part of subcall function 000D912D: ScreenToClient.USER32(00000000,?), ref: 000D915E
                                      • Part of subcall function 000D912D: GetAsyncKeyState.USER32(00000001), ref: 000D9183
                                      • Part of subcall function 000D912D: GetAsyncKeyState.USER32(00000002), ref: 000D919D
                                    • SetTimer.USER32(00000000,00000000,00000028,000D90FC), ref: 000D8AA8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                    • String ID: AutoIt v3 GUI
                                    • API String ID: 1458621304-248962490
                                    • Opcode ID: 1f78814a1e22475077a8b61667a4015b93e3a52c6824e92c2c763fb39e0d9543
                                    • Instruction ID: 645244f3f7e8e79d5ac68d25678058ebd5b2a51b972d79b111b419c0005ef56b
                                    • Opcode Fuzzy Hash: 1f78814a1e22475077a8b61667a4015b93e3a52c6824e92c2c763fb39e0d9543
                                    • Instruction Fuzzy Hash: C2B16F75A0030AEFDB14DFA8CC55BEE7BB5FB48315F10412AFA15AB290DB70A981CB51
                                    APIs
                                      • Part of subcall function 001210F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00121114
                                      • Part of subcall function 001210F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121120
                                      • Part of subcall function 001210F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 0012112F
                                      • Part of subcall function 001210F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121136
                                      • Part of subcall function 001210F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0012114D
                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00120DF5
                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00120E29
                                    • GetLengthSid.ADVAPI32(?), ref: 00120E40
                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00120E7A
                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00120E96
                                    • GetLengthSid.ADVAPI32(?), ref: 00120EAD
                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00120EB5
                                    • HeapAlloc.KERNEL32(00000000), ref: 00120EBC
                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00120EDD
                                    • CopySid.ADVAPI32(00000000), ref: 00120EE4
                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00120F13
                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00120F35
                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00120F47
                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120F6E
                                    • HeapFree.KERNEL32(00000000), ref: 00120F75
                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120F7E
                                    • HeapFree.KERNEL32(00000000), ref: 00120F85
                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120F8E
                                    • HeapFree.KERNEL32(00000000), ref: 00120F95
                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00120FA1
                                    • HeapFree.KERNEL32(00000000), ref: 00120FA8
                                      • Part of subcall function 00121193: GetProcessHeap.KERNEL32(00000008,00120BB1,?,00000000,?,00120BB1,?), ref: 001211A1
                                      • Part of subcall function 00121193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00120BB1,?), ref: 001211A8
                                      • Part of subcall function 00121193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00120BB1,?), ref: 001211B7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                    • String ID:
                                    • API String ID: 4175595110-0
                                    • Opcode ID: da880f43b62944f5c6a9a5d1690f618fa77749f5845f190df08a65cf3efe32e0
                                    • Instruction ID: 19652e365b2a03c1d3318dc9a9e76091de2655cdd5446f682e5a368ccdf26ebf
                                    • Opcode Fuzzy Hash: da880f43b62944f5c6a9a5d1690f618fa77749f5845f190df08a65cf3efe32e0
                                    • Instruction Fuzzy Hash: E3717D7290031AEFDF219FA4ED44BAEBBB8FF08311F044215F919A6192D7319955CBA0
                                    APIs
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014C4BD
                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,0015CC08,00000000,?,00000000,?,?), ref: 0014C544
                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0014C5A4
                                    • _wcslen.LIBCMT ref: 0014C5F4
                                    • _wcslen.LIBCMT ref: 0014C66F
                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0014C6B2
                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0014C7C1
                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0014C84D
                                    • RegCloseKey.ADVAPI32(?), ref: 0014C881
                                    • RegCloseKey.ADVAPI32(00000000), ref: 0014C88E
                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0014C960
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                    • API String ID: 9721498-966354055
                                    • Opcode ID: 50499ac90cd3702c9b2cc431699c17b7589af3de1b4f796ad528e53da67091a6
                                    • Instruction ID: e6687634511ce4ecaddcc61b7109a915ac0af0a325da96162150e83c2df140d9
                                    • Opcode Fuzzy Hash: 50499ac90cd3702c9b2cc431699c17b7589af3de1b4f796ad528e53da67091a6
                                    • Instruction Fuzzy Hash: C91224356046019FD754DF14C891F6EB7E5EF88724F15889CF88A9B2A2DB31ED41CB81
                                    APIs
                                    • CharUpperBuffW.USER32(?,?), ref: 001509C6
                                    • _wcslen.LIBCMT ref: 00150A01
                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00150A54
                                    • _wcslen.LIBCMT ref: 00150A8A
                                    • _wcslen.LIBCMT ref: 00150B06
                                    • _wcslen.LIBCMT ref: 00150B81
                                      • Part of subcall function 000DF9F2: _wcslen.LIBCMT ref: 000DF9FD
                                      • Part of subcall function 00122BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00122BFA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                    • API String ID: 1103490817-4258414348
                                    • Opcode ID: 0a12f698144fa67f0a4fe7570abbae9e7acd99ec8ab38528609ca9a10c5512ad
                                    • Instruction ID: 2408238242c4c18d087d56b1da5a220560f726e0fbc177d3ac40108de0f904c8
                                    • Opcode Fuzzy Hash: 0a12f698144fa67f0a4fe7570abbae9e7acd99ec8ab38528609ca9a10c5512ad
                                    • Instruction Fuzzy Hash: F7E1DF35208301CFC715DFA4C49096EB7E1BF98314B15895CF8AAAB3A2D730EE49CB81
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$BuffCharUpper
                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                    • API String ID: 1256254125-909552448
                                    • Opcode ID: 6de378dadab809f07c84dade009ff97e38042545585b314a18bdfdd4d3237031
                                    • Instruction ID: ba71192b8de4c67bc6f792799368609e041d7518f69318802a0f1b4c6feaa0ae
                                    • Opcode Fuzzy Hash: 6de378dadab809f07c84dade009ff97e38042545585b314a18bdfdd4d3237031
                                    • Instruction Fuzzy Hash: 0671F33260116A8BCB60DF7CC9915FE3391AFA1794B350528F866A72A5FB31CE44C7E0
                                    APIs
                                    • _wcslen.LIBCMT ref: 0015835A
                                    • _wcslen.LIBCMT ref: 0015836E
                                    • _wcslen.LIBCMT ref: 00158391
                                    • _wcslen.LIBCMT ref: 001583B4
                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 001583F2
                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00155BF2), ref: 0015844E
                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00158487
                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 001584CA
                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00158501
                                    • FreeLibrary.KERNEL32(?), ref: 0015850D
                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0015851D
                                    • DestroyIcon.USER32(?,?,?,?,?,00155BF2), ref: 0015852C
                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00158549
                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00158555
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                    • String ID: .dll$.exe$.icl
                                    • API String ID: 799131459-1154884017
                                    • Opcode ID: 5ea143b0b7b2a1a90818490b03d3079eacb38f8f2ef5ac0ac1d9ae790ed22348
                                    • Instruction ID: 7df2516ab6c7da0ac2d8d2d898f3f6545676ad3b5ec096f8992cb94430fc5223
                                    • Opcode Fuzzy Hash: 5ea143b0b7b2a1a90818490b03d3079eacb38f8f2ef5ac0ac1d9ae790ed22348
                                    • Instruction Fuzzy Hash: A2619E71510715FEEB149F64CC85BFE77A8BB08722F104509FD25EA1D1EBB4AA84CBA0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                    • API String ID: 0-1645009161
                                    • Opcode ID: 4aec171f0ae3ff798423a67f26ca169e1abeeb678515c7690620d6c5c71b917d
                                    • Instruction ID: 1e6e35bf46f4cc2f33a3c10eb107cdc4cc941da42b55dc8f86a87f3617b15e56
                                    • Opcode Fuzzy Hash: 4aec171f0ae3ff798423a67f26ca169e1abeeb678515c7690620d6c5c71b917d
                                    • Instruction Fuzzy Hash: 6781C671644605BFDB20AF60DD42FEF37A9AF15300F044029F949AA2D7EBB0DA15DBA1
                                    APIs
                                    • CharLowerBuffW.USER32(?,?), ref: 00133EF8
                                    • _wcslen.LIBCMT ref: 00133F03
                                    • _wcslen.LIBCMT ref: 00133F5A
                                    • _wcslen.LIBCMT ref: 00133F98
                                    • GetDriveTypeW.KERNEL32(?), ref: 00133FD6
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0013401E
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00134059
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00134087
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: SendString_wcslen$BuffCharDriveLowerType
                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                    • API String ID: 1839972693-4113822522
                                    • Opcode ID: 4e6bc5a21c1b73bff13f3b1bc674cbfe9da8b3800a78197e9249454c8b2686e9
                                    • Instruction ID: e1324fc5dd033e8f354b299519768571aed88a4d96f33b628c37b87ee71531f3
                                    • Opcode Fuzzy Hash: 4e6bc5a21c1b73bff13f3b1bc674cbfe9da8b3800a78197e9249454c8b2686e9
                                    • Instruction Fuzzy Hash: 6871E4326043019FC714EF24C8819AEB7F4EF94758F50492DF8A697252EB31EE45CB92
                                    APIs
                                    • LoadIconW.USER32(00000063), ref: 00125A2E
                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00125A40
                                    • SetWindowTextW.USER32(?,?), ref: 00125A57
                                    • GetDlgItem.USER32(?,000003EA), ref: 00125A6C
                                    • SetWindowTextW.USER32(00000000,?), ref: 00125A72
                                    • GetDlgItem.USER32(?,000003E9), ref: 00125A82
                                    • SetWindowTextW.USER32(00000000,?), ref: 00125A88
                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00125AA9
                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00125AC3
                                    • GetWindowRect.USER32(?,?), ref: 00125ACC
                                    • _wcslen.LIBCMT ref: 00125B33
                                    • SetWindowTextW.USER32(?,?), ref: 00125B6F
                                    • GetDesktopWindow.USER32 ref: 00125B75
                                    • GetWindowRect.USER32(00000000), ref: 00125B7C
                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00125BD3
                                    • GetClientRect.USER32(?,?), ref: 00125BE0
                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 00125C05
                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00125C2F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                    • String ID:
                                    • API String ID: 895679908-0
                                    • Opcode ID: 4dc8b35a2e6ac1b94ede25e18b5fe45451c9df37b958aa25a92dd932edd23ae1
                                    • Instruction ID: 01ead19fd84c7799bd9ebce1306edf65559687e8f77d4d2c062cf4c5e9ef6f6e
                                    • Opcode Fuzzy Hash: 4dc8b35a2e6ac1b94ede25e18b5fe45451c9df37b958aa25a92dd932edd23ae1
                                    • Instruction Fuzzy Hash: 9771AD31900B19EFDB20DFA8DE85AAEBBF6FF48705F104518E182A76A0D770E950CB50
                                    APIs
                                    • LoadCursorW.USER32(00000000,00007F89), ref: 0013FE27
                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0013FE32
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0013FE3D
                                    • LoadCursorW.USER32(00000000,00007F03), ref: 0013FE48
                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 0013FE53
                                    • LoadCursorW.USER32(00000000,00007F01), ref: 0013FE5E
                                    • LoadCursorW.USER32(00000000,00007F81), ref: 0013FE69
                                    • LoadCursorW.USER32(00000000,00007F88), ref: 0013FE74
                                    • LoadCursorW.USER32(00000000,00007F80), ref: 0013FE7F
                                    • LoadCursorW.USER32(00000000,00007F86), ref: 0013FE8A
                                    • LoadCursorW.USER32(00000000,00007F83), ref: 0013FE95
                                    • LoadCursorW.USER32(00000000,00007F85), ref: 0013FEA0
                                    • LoadCursorW.USER32(00000000,00007F82), ref: 0013FEAB
                                    • LoadCursorW.USER32(00000000,00007F84), ref: 0013FEB6
                                    • LoadCursorW.USER32(00000000,00007F04), ref: 0013FEC1
                                    • LoadCursorW.USER32(00000000,00007F02), ref: 0013FECC
                                    • GetCursorInfo.USER32(?), ref: 0013FEDC
                                    • GetLastError.KERNEL32 ref: 0013FF1E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Cursor$Load$ErrorInfoLast
                                    • String ID:
                                    • API String ID: 3215588206-0
                                    • Opcode ID: 46e601b02e6e887497568bcdaf9b34c5cc6ee5fdec8574cf1ce6d2717dc663ba
                                    • Instruction ID: 8227b8106438cdfcf4e1ad1017a549735355ed5643a1fb5fb64055f5f4fa9014
                                    • Opcode Fuzzy Hash: 46e601b02e6e887497568bcdaf9b34c5cc6ee5fdec8574cf1ce6d2717dc663ba
                                    • Instruction Fuzzy Hash: 5D4124B1D04319AADB109FBA8C89C5EBFE8FF04754B50452AE51DEB281DB78D901CF91
                                    APIs
                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 000E00C6
                                      • Part of subcall function 000E00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0019070C,00000FA0,C7D13A1C,?,?,?,?,001023B3,000000FF), ref: 000E011C
                                      • Part of subcall function 000E00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,001023B3,000000FF), ref: 000E0127
                                      • Part of subcall function 000E00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,001023B3,000000FF), ref: 000E0138
                                      • Part of subcall function 000E00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 000E014E
                                      • Part of subcall function 000E00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 000E015C
                                      • Part of subcall function 000E00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 000E016A
                                      • Part of subcall function 000E00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 000E0195
                                      • Part of subcall function 000E00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 000E01A0
                                    • ___scrt_fastfail.LIBCMT ref: 000E00E7
                                      • Part of subcall function 000E00A3: __onexit.LIBCMT ref: 000E00A9
                                    Strings
                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 000E0122
                                    • SleepConditionVariableCS, xrefs: 000E0154
                                    • kernel32.dll, xrefs: 000E0133
                                    • InitializeConditionVariable, xrefs: 000E0148
                                    • WakeAllConditionVariable, xrefs: 000E0162
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                    • API String ID: 66158676-1714406822
                                    • Opcode ID: 760f69713b5321131463fec95190ac7a8132f6708318221ccf88951f578287c9
                                    • Instruction ID: 236bb34a75d5f244cce21c7547222afc45e7153933c5d9457546064ce3327cfc
                                    • Opcode Fuzzy Hash: 760f69713b5321131463fec95190ac7a8132f6708318221ccf88951f578287c9
                                    • Instruction Fuzzy Hash: 1C21F932645751EFE7115FB5AC45B6A33E4EB04B62F00012AF841BE692DFF09C808AD0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen
                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                    • API String ID: 176396367-1603158881
                                    • Opcode ID: 00c441e81a6089ce720a64ec8007df639cba6ee77662d1f387ecb5788f41c859
                                    • Instruction ID: 247c8405862d2c4b2935202e5087541e389075fec99b45b63e3c799692ec0870
                                    • Opcode Fuzzy Hash: 00c441e81a6089ce720a64ec8007df639cba6ee77662d1f387ecb5788f41c859
                                    • Instruction Fuzzy Hash: F3E11632A00626ABCB18EF64D451BEDFBB1FF14710F15811AE466F7241DB34AFA58B90
                                    APIs
                                    • CharLowerBuffW.USER32(00000000,00000000,0015CC08), ref: 00134527
                                    • _wcslen.LIBCMT ref: 0013453B
                                    • _wcslen.LIBCMT ref: 00134599
                                    • _wcslen.LIBCMT ref: 001345F4
                                    • _wcslen.LIBCMT ref: 0013463F
                                    • _wcslen.LIBCMT ref: 001346A7
                                      • Part of subcall function 000DF9F2: _wcslen.LIBCMT ref: 000DF9FD
                                    • GetDriveTypeW.KERNEL32(?,00186BF0,00000061), ref: 00134743
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$BuffCharDriveLowerType
                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                    • API String ID: 2055661098-1000479233
                                    • Opcode ID: 3a6554f11013941db30dfe0acf29dff70e65c25557ba8210728b74beac4ad7dd
                                    • Instruction ID: c103ab668acc3ceb852348c2e8eb574703daf677a8d59328495e2b5f83d6b7f0
                                    • Opcode Fuzzy Hash: 3a6554f11013941db30dfe0acf29dff70e65c25557ba8210728b74beac4ad7dd
                                    • Instruction Fuzzy Hash: 51B122716083029FC710DF28C891AAEB7E4BFA5764F50491DF496D7292E730E944CB92
                                    APIs
                                    • _wcslen.LIBCMT ref: 0014B198
                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0014B1B0
                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0014B1D4
                                    • _wcslen.LIBCMT ref: 0014B200
                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0014B214
                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0014B236
                                    • _wcslen.LIBCMT ref: 0014B332
                                      • Part of subcall function 001305A7: GetStdHandle.KERNEL32(000000F6), ref: 001305C6
                                    • _wcslen.LIBCMT ref: 0014B34B
                                    • _wcslen.LIBCMT ref: 0014B366
                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0014B3B6
                                    • GetLastError.KERNEL32(00000000), ref: 0014B407
                                    • CloseHandle.KERNEL32(?), ref: 0014B439
                                    • CloseHandle.KERNEL32(00000000), ref: 0014B44A
                                    • CloseHandle.KERNEL32(00000000), ref: 0014B45C
                                    • CloseHandle.KERNEL32(00000000), ref: 0014B46E
                                    • CloseHandle.KERNEL32(?), ref: 0014B4E3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                    • String ID:
                                    • API String ID: 2178637699-0
                                    • Opcode ID: ffbd4065367d177bb623e011eed3c9e21bff23a6125b2fbd5b6c3ec98d8c09c5
                                    • Instruction ID: 57007b457383b4ece040b3c5ecc82f850602d4a5b9f61c2d314e7d55f49cdb79
                                    • Opcode Fuzzy Hash: ffbd4065367d177bb623e011eed3c9e21bff23a6125b2fbd5b6c3ec98d8c09c5
                                    • Instruction Fuzzy Hash: 4BF18B316083409FC714EF24C891B6EBBE5BF85714F18855DF89A9B2A2CB71EC45CB92
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,0015CC08), ref: 001440BB
                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 001440CD
                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0015CC08), ref: 001440F2
                                    • FreeLibrary.KERNEL32(00000000,?,0015CC08), ref: 0014413E
                                    • StringFromGUID2.OLE32(?,?,00000028,?,0015CC08), ref: 001441A8
                                    • SysFreeString.OLEAUT32(00000009), ref: 00144262
                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 001442C8
                                    • SysFreeString.OLEAUT32(?), ref: 001442F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                    • String ID: GetModuleHandleExW$kernel32.dll
                                    • API String ID: 354098117-199464113
                                    • Opcode ID: a7ce5a45a06a3a801a3a4a005256586d1d59e5b252913a52ce681c337ac7ca90
                                    • Instruction ID: 3c3b514c0ff2d360c41ce67fa40362df074de20b6a22c852abe0133463f44bc5
                                    • Opcode Fuzzy Hash: a7ce5a45a06a3a801a3a4a005256586d1d59e5b252913a52ce681c337ac7ca90
                                    • Instruction Fuzzy Hash: 97122775A00219EFDB14CF94C884EAEBBB5BF45314F258098F905AB261D731ED86CBA0
                                    APIs
                                    • GetMenuItemCount.USER32(00191990), ref: 00102F8D
                                    • GetMenuItemCount.USER32(00191990), ref: 0010303D
                                    • GetCursorPos.USER32(?), ref: 00103081
                                    • SetForegroundWindow.USER32(00000000), ref: 0010308A
                                    • TrackPopupMenuEx.USER32(00191990,00000000,?,00000000,00000000,00000000), ref: 0010309D
                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001030A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                    • String ID: 0
                                    • API String ID: 36266755-4108050209
                                    • Opcode ID: 4ce8080633882b9bf8d667f4ca5e7d6ed969b2afa6dd39ee71560d541c9fffdc
                                    • Instruction ID: 3a08711eb1169e27aa523df3b0738d10d8216f2ce975fdcf56c8612a88a28428
                                    • Opcode Fuzzy Hash: 4ce8080633882b9bf8d667f4ca5e7d6ed969b2afa6dd39ee71560d541c9fffdc
                                    • Instruction Fuzzy Hash: 2371F370644216BFEB259F64DC89FAEBF68FF05364F208216F5256A1E0C7B1A950CB90
                                    APIs
                                    • DestroyWindow.USER32(00000000,?), ref: 00156DEB
                                      • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00156E5F
                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00156E81
                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00156E94
                                    • DestroyWindow.USER32(?), ref: 00156EB5
                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,000C0000,00000000), ref: 00156EE4
                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00156EFD
                                    • GetDesktopWindow.USER32 ref: 00156F16
                                    • GetWindowRect.USER32(00000000), ref: 00156F1D
                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00156F35
                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00156F4D
                                      • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                    • String ID: 0$tooltips_class32
                                    • API String ID: 2429346358-3619404913
                                    • Opcode ID: 7eaa074694f524a8d4f232a1e85890d5640e446b0e7a9fb2d493316559fde984
                                    • Instruction ID: d2980b75ff6e75737208885cc1f0d7b50dc683c001117cde9582acf292676948
                                    • Opcode Fuzzy Hash: 7eaa074694f524a8d4f232a1e85890d5640e446b0e7a9fb2d493316559fde984
                                    • Instruction Fuzzy Hash: 34717970504341EFDB21CF18DC54FAABBE9FB99305F44051EF9998B261C770A98ACB91
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    • DragQueryPoint.SHELL32(?,?), ref: 00159147
                                      • Part of subcall function 00157674: ClientToScreen.USER32(?,?), ref: 0015769A
                                      • Part of subcall function 00157674: GetWindowRect.USER32(?,?), ref: 00157710
                                      • Part of subcall function 00157674: PtInRect.USER32(?,?,00158B89), ref: 00157720
                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 001591B0
                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 001591BB
                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 001591DE
                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00159225
                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0015923E
                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00159255
                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00159277
                                    • DragFinish.SHELL32(?), ref: 0015927E
                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00159371
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                    • API String ID: 221274066-3440237614
                                    • Opcode ID: 4f842aca364a5cc84d2dd075e7646cdd3437f70892afec0ca5612dc04b418657
                                    • Instruction ID: 8f56bcae9c06a40d9ba44279aef907fe2b3af17fbbcf772b7234567bf0220311
                                    • Opcode Fuzzy Hash: 4f842aca364a5cc84d2dd075e7646cdd3437f70892afec0ca5612dc04b418657
                                    • Instruction Fuzzy Hash: 7D616B71108301EFD701EF64DC85EAFBBE8EF89750F00092EF5A5961A1DB709A49CB92
                                    APIs
                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0013C4B0
                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0013C4C3
                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0013C4D7
                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0013C4F0
                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0013C533
                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0013C549
                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0013C554
                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0013C584
                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0013C5DC
                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0013C5F0
                                    • InternetCloseHandle.WININET(00000000), ref: 0013C5FB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                    • String ID:
                                    • API String ID: 3800310941-3916222277
                                    • Opcode ID: d19888c2a921183d54c650650c8e2e847c450c8aa866fa2d91dd59d42f53eed4
                                    • Instruction ID: 5f23fd5e2e8e4be735ef458e4e079bc816384679c890b866a131984e1052eb96
                                    • Opcode Fuzzy Hash: d19888c2a921183d54c650650c8e2e847c450c8aa866fa2d91dd59d42f53eed4
                                    • Instruction Fuzzy Hash: BC514AB1600709FFDB219FA4CD88AAB7BBCFF08755F004419F945AA610DB35E944DBA0
                                    APIs
                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00158592
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001585A2
                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001585AD
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001585BA
                                    • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001585C8
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001585D7
                                    • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001585E0
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001585E7
                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001585F8
                                    • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0015FC38,?), ref: 00158611
                                    • GlobalFree.KERNEL32(00000000), ref: 00158621
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00158641
                                    • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00158671
                                    • DeleteObject.GDI32(?), ref: 00158699
                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 001586AF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                    • String ID:
                                    • API String ID: 3840717409-0
                                    • Opcode ID: 0c8fa17a97642f755febb525b334915dbabbf168e3137a1df8689729a8cbff3e
                                    • Instruction ID: b0f1f65f32c0a6856486671a90a9eadb47acc76410925d20c70a015f5acbdc6c
                                    • Opcode Fuzzy Hash: 0c8fa17a97642f755febb525b334915dbabbf168e3137a1df8689729a8cbff3e
                                    • Instruction Fuzzy Hash: 4D411975600308EFDB119FA5CC88EAA7BB8FF89716F104158F916EB260DB309945CF60
                                    APIs
                                    • VariantInit.OLEAUT32(00000000), ref: 00131502
                                    • VariantCopy.OLEAUT32(?,?), ref: 0013150B
                                    • VariantClear.OLEAUT32(?), ref: 00131517
                                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 001315FB
                                    • VarR8FromDec.OLEAUT32(?,?), ref: 00131657
                                    • VariantInit.OLEAUT32(?), ref: 00131708
                                    • SysFreeString.OLEAUT32(?), ref: 0013178C
                                    • VariantClear.OLEAUT32(?), ref: 001317D8
                                    • VariantClear.OLEAUT32(?), ref: 001317E7
                                    • VariantInit.OLEAUT32(00000000), ref: 00131823
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                                    • API String ID: 1234038744-3931177956
                                    • Opcode ID: 0cf3d7cdc10f1ca0c5a00fc8cf2dc3a635a867adc81e6c8fa2b4cc7426f0e187
                                    • Instruction ID: 0915a7c330b09240b3886f15c830174774ab2cfe60df5b1d81c46a24b7f5bf9a
                                    • Opcode Fuzzy Hash: 0cf3d7cdc10f1ca0c5a00fc8cf2dc3a635a867adc81e6c8fa2b4cc7426f0e187
                                    • Instruction Fuzzy Hash: CFD11031A00205FFDB18AF65E885BBDB7B5BF46700F15845AF806AB681DB30EC45DBA1
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 0014C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0014B6AE,?,?), ref: 0014C9B5
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014C9F1
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA68
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA9E
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014B6F4
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0014B772
                                    • RegDeleteValueW.ADVAPI32(?,?), ref: 0014B80A
                                    • RegCloseKey.ADVAPI32(?), ref: 0014B87E
                                    • RegCloseKey.ADVAPI32(?), ref: 0014B89C
                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0014B8F2
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0014B904
                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 0014B922
                                    • FreeLibrary.KERNEL32(00000000), ref: 0014B983
                                    • RegCloseKey.ADVAPI32(00000000), ref: 0014B994
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                    • API String ID: 146587525-4033151799
                                    • Opcode ID: 769c6c14a399efb5f71800481e405605ddd8211c8b38300c2c04e9a10c1770bc
                                    • Instruction ID: 8fbe726e8f38adfeba607226fa23e26b618d025a73c7fa4f196586af40bcc72d
                                    • Opcode Fuzzy Hash: 769c6c14a399efb5f71800481e405605ddd8211c8b38300c2c04e9a10c1770bc
                                    • Instruction Fuzzy Hash: A4C17874208202EFD714DF24C4D5F6ABBE5BF84318F14849CF49A8B6A2CB71E946CB91
                                    APIs
                                    • GetDC.USER32(00000000), ref: 001425D8
                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 001425E8
                                    • CreateCompatibleDC.GDI32(?), ref: 001425F4
                                    • SelectObject.GDI32(00000000,?), ref: 00142601
                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0014266D
                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 001426AC
                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 001426D0
                                    • SelectObject.GDI32(?,?), ref: 001426D8
                                    • DeleteObject.GDI32(?), ref: 001426E1
                                    • DeleteDC.GDI32(?), ref: 001426E8
                                    • ReleaseDC.USER32(00000000,?), ref: 001426F3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                    • String ID: (
                                    • API String ID: 2598888154-3887548279
                                    • Opcode ID: 6d843bf7ba55d0e84169159f92e95c0263c92e360e5b281639b418324503f74a
                                    • Instruction ID: 4c2e3508312c2c9584858dc80d611fe734d5d996d389a6372e76109831cfebda
                                    • Opcode Fuzzy Hash: 6d843bf7ba55d0e84169159f92e95c0263c92e360e5b281639b418324503f74a
                                    • Instruction Fuzzy Hash: C861C2B5D00319EFCF04CFA4D884AAEBBB6FF58310F208529E955A7250D774A991CFA4
                                    APIs
                                    • ___free_lconv_mon.LIBCMT ref: 000FDAA1
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD659
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD66B
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD67D
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD68F
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6A1
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6B3
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6C5
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6D7
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6E9
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6FB
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD70D
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD71F
                                      • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD731
                                    • _free.LIBCMT ref: 000FDA96
                                      • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                      • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                    • _free.LIBCMT ref: 000FDAB8
                                    • _free.LIBCMT ref: 000FDACD
                                    • _free.LIBCMT ref: 000FDAD8
                                    • _free.LIBCMT ref: 000FDAFA
                                    • _free.LIBCMT ref: 000FDB0D
                                    • _free.LIBCMT ref: 000FDB1B
                                    • _free.LIBCMT ref: 000FDB26
                                    • _free.LIBCMT ref: 000FDB5E
                                    • _free.LIBCMT ref: 000FDB65
                                    • _free.LIBCMT ref: 000FDB82
                                    • _free.LIBCMT ref: 000FDB9A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                    • String ID:
                                    • API String ID: 161543041-0
                                    • Opcode ID: 44a7414a05fab99229b56e84bab1b8cc108dcfb15be0be11828b64f3651803f2
                                    • Instruction ID: 54801464c650d73b0089b187211de4d4d6f7d060ebbdc5af317783c079803a48
                                    • Opcode Fuzzy Hash: 44a7414a05fab99229b56e84bab1b8cc108dcfb15be0be11828b64f3651803f2
                                    • Instruction Fuzzy Hash: 1C315D31648209DFDB61AA38E845BBA77EAFF00311F11451AE648D7992DB71EC40A724
                                    APIs
                                    • GetClassNameW.USER32(?,?,00000100), ref: 0012369C
                                    • _wcslen.LIBCMT ref: 001236A7
                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00123797
                                    • GetClassNameW.USER32(?,?,00000400), ref: 0012380C
                                    • GetDlgCtrlID.USER32(?), ref: 0012385D
                                    • GetWindowRect.USER32(?,?), ref: 00123882
                                    • GetParent.USER32(?), ref: 001238A0
                                    • ScreenToClient.USER32(00000000), ref: 001238A7
                                    • GetClassNameW.USER32(?,?,00000100), ref: 00123921
                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0012395D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                    • String ID: %s%u
                                    • API String ID: 4010501982-679674701
                                    • Opcode ID: a414ec4f4a48b544e73420125e2dcc6239389b2c5c2ff14e543a0bd79a6bc7c2
                                    • Instruction ID: 480a31db8b32b5e535182d0387b0e098785cb1b9e162939a7e21de1952dec1e7
                                    • Opcode Fuzzy Hash: a414ec4f4a48b544e73420125e2dcc6239389b2c5c2ff14e543a0bd79a6bc7c2
                                    • Instruction Fuzzy Hash: 1E91E371204316AFDB08DF24D884BEAF7A9FF45304F004619F9A9D6190DB34EAA5CB91
                                    APIs
                                    • GetClassNameW.USER32(?,?,00000400), ref: 00124994
                                    • GetWindowTextW.USER32(?,?,00000400), ref: 001249DA
                                    • _wcslen.LIBCMT ref: 001249EB
                                    • CharUpperBuffW.USER32(?,00000000), ref: 001249F7
                                    • _wcsstr.LIBVCRUNTIME ref: 00124A2C
                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00124A64
                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00124A9D
                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00124AE6
                                    • GetClassNameW.USER32(?,?,00000400), ref: 00124B20
                                    • GetWindowRect.USER32(?,?), ref: 00124B8B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                    • String ID: ThumbnailClass
                                    • API String ID: 1311036022-1241985126
                                    • Opcode ID: 774ec917a8806edc80b66cb58104122b97878c658cb22f91a0482f2b6aa09a11
                                    • Instruction ID: 5090bb3938485a6161690a36c5c875d10435fc34155902632d65c64268a50c82
                                    • Opcode Fuzzy Hash: 774ec917a8806edc80b66cb58104122b97878c658cb22f91a0482f2b6aa09a11
                                    • Instruction Fuzzy Hash: 3D91DE710043259FDB04DF14E985FAA77E8FF84314F048469FD869A196EB30EE65CBA1
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00158D5A
                                    • GetFocus.USER32 ref: 00158D6A
                                    • GetDlgCtrlID.USER32(00000000), ref: 00158D75
                                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00158E1D
                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00158ECF
                                    • GetMenuItemCount.USER32(?), ref: 00158EEC
                                    • GetMenuItemID.USER32(?,00000000), ref: 00158EFC
                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00158F2E
                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00158F70
                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00158FA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                    • String ID: 0
                                    • API String ID: 1026556194-4108050209
                                    • Opcode ID: 5bad55311fdd9a8ad62b0ad389f8d3304d63c645df7b5969fb43bf4bb15b7a43
                                    • Instruction ID: af844f726131f46bf7bccf6ea476c6bea17e437a341c74bff9174a86be3cb9b8
                                    • Opcode Fuzzy Hash: 5bad55311fdd9a8ad62b0ad389f8d3304d63c645df7b5969fb43bf4bb15b7a43
                                    • Instruction Fuzzy Hash: 5881AF71604301EFD710CF24C885AABB7E9FB88355F04091AFDA5AB291DB70DD49CBA1
                                    APIs
                                    • GetMenuItemInfoW.USER32(00191990,000000FF,00000000,00000030), ref: 0012BFAC
                                    • SetMenuItemInfoW.USER32(00191990,00000004,00000000,00000030), ref: 0012BFE1
                                    • Sleep.KERNEL32(000001F4), ref: 0012BFF3
                                    • GetMenuItemCount.USER32(?), ref: 0012C039
                                    • GetMenuItemID.USER32(?,00000000), ref: 0012C056
                                    • GetMenuItemID.USER32(?,-00000001), ref: 0012C082
                                    • GetMenuItemID.USER32(?,?), ref: 0012C0C9
                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0012C10F
                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0012C124
                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0012C145
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Info$CheckCountRadioSleep
                                    • String ID: 0
                                    • API String ID: 1460738036-4108050209
                                    • Opcode ID: f4e2b2e354930da7819962315734a12a2a86b08339fd03552b69d5e48cf95c71
                                    • Instruction ID: c86eed222bebbf01e171fc6fa06880ad389cd12d8aee5ca19b3b10d34afd9baa
                                    • Opcode Fuzzy Hash: f4e2b2e354930da7819962315734a12a2a86b08339fd03552b69d5e48cf95c71
                                    • Instruction Fuzzy Hash: 4E619E70A00366EFDB15CF64ED89AEEBBB8EF05344F140015FA01A7291D731AE65CBA0
                                    APIs
                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0012DC20
                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0012DC46
                                    • _wcslen.LIBCMT ref: 0012DC50
                                    • _wcsstr.LIBVCRUNTIME ref: 0012DCA0
                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0012DCBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                    • API String ID: 1939486746-1459072770
                                    • Opcode ID: d0d5a4300fd2744917bba2f09efcf210a943364d4195f8cc70665ce47705ed7e
                                    • Instruction ID: 2a1cc05b5ad6869759eb14e684a51ea5eebc6631de531b13ed35e3c05582e572
                                    • Opcode Fuzzy Hash: d0d5a4300fd2744917bba2f09efcf210a943364d4195f8cc70665ce47705ed7e
                                    • Instruction Fuzzy Hash: F641F032940315BEDB04ABA5EC07EFF37ACEF56750F10406AF901B6183EB759A1087A5
                                    APIs
                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0014CC64
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0014CC8D
                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0014CD48
                                      • Part of subcall function 0014CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0014CCAA
                                      • Part of subcall function 0014CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0014CCBD
                                      • Part of subcall function 0014CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0014CCCF
                                      • Part of subcall function 0014CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0014CD05
                                      • Part of subcall function 0014CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0014CD28
                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 0014CCF3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                    • API String ID: 2734957052-4033151799
                                    • Opcode ID: d0af634a031b4a05b1823aec30b54fa9eda5a19ba3d89a7935f3658f370c6403
                                    • Instruction ID: 17e2d857282f53764eb53dca7a893d6bf258bca37461a61be06c5ec37b728b77
                                    • Opcode Fuzzy Hash: d0af634a031b4a05b1823aec30b54fa9eda5a19ba3d89a7935f3658f370c6403
                                    • Instruction Fuzzy Hash: C2316975902229FBDB209F94DC88EEFBB7CEF45751F000165B906E6260DB309A85DAE0
                                    APIs
                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00133D40
                                    • _wcslen.LIBCMT ref: 00133D6D
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00133D9D
                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00133DBE
                                    • RemoveDirectoryW.KERNEL32(?), ref: 00133DCE
                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00133E55
                                    • CloseHandle.KERNEL32(00000000), ref: 00133E60
                                    • CloseHandle.KERNEL32(00000000), ref: 00133E6B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                    • String ID: :$\$\??\%s
                                    • API String ID: 1149970189-3457252023
                                    • Opcode ID: e2d8c329fcc4c14f5a61f8cb2a95ba4b11d595abf7eba5e790a9bfe804e0bc0c
                                    • Instruction ID: ef5e767c80928eb84f85cfa2056a9666bc53ce23669ed370d4d7d9ffa64e9293
                                    • Opcode Fuzzy Hash: e2d8c329fcc4c14f5a61f8cb2a95ba4b11d595abf7eba5e790a9bfe804e0bc0c
                                    • Instruction Fuzzy Hash: 6F31A171900209ABDB219FA0DC49FEB37BDEF88701F5040B6F619E6061EB7497848B68
                                    APIs
                                    • timeGetTime.WINMM ref: 0012E6B4
                                      • Part of subcall function 000DE551: timeGetTime.WINMM(?,?,0012E6D4), ref: 000DE555
                                    • Sleep.KERNEL32(0000000A), ref: 0012E6E1
                                    • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0012E705
                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0012E727
                                    • SetActiveWindow.USER32 ref: 0012E746
                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0012E754
                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0012E773
                                    • Sleep.KERNEL32(000000FA), ref: 0012E77E
                                    • IsWindow.USER32 ref: 0012E78A
                                    • EndDialog.USER32(00000000), ref: 0012E79B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                    • String ID: BUTTON
                                    • API String ID: 1194449130-3405671355
                                    • Opcode ID: f1666b891133d20e7e25230337679ec41063a87a9ab86da56b3d1505cc3b3cef
                                    • Instruction ID: a58cd018d3710180bd8d65ffac8d44d0f9de0e42b03d2402974624867fe727ad
                                    • Opcode Fuzzy Hash: f1666b891133d20e7e25230337679ec41063a87a9ab86da56b3d1505cc3b3cef
                                    • Instruction Fuzzy Hash: 6A21A570204315FFEB105F60FCC9A253BA9F75474AF200426F91686EB2DB71ADE08BA4
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0012EA5D
                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0012EA73
                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0012EA84
                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0012EA96
                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0012EAA7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: SendString$_wcslen
                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                    • API String ID: 2420728520-1007645807
                                    • Opcode ID: f5f292b8f586311f2c79e24e577079637851aa5b2111ba9efbf35c728e5cd5cb
                                    • Instruction ID: 4fea441773fe8b1a09985cf6a30ba43b2cd82b4a57931bd6c05a91cf430b7c37
                                    • Opcode Fuzzy Hash: f5f292b8f586311f2c79e24e577079637851aa5b2111ba9efbf35c728e5cd5cb
                                    • Instruction Fuzzy Hash: DE112131A902697DD724B7A1EC4AEFF6ABCEBD1B04F400429B411A20D1EF705A55CAB0
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 0012A012
                                    • SetKeyboardState.USER32(?), ref: 0012A07D
                                    • GetAsyncKeyState.USER32(000000A0), ref: 0012A09D
                                    • GetKeyState.USER32(000000A0), ref: 0012A0B4
                                    • GetAsyncKeyState.USER32(000000A1), ref: 0012A0E3
                                    • GetKeyState.USER32(000000A1), ref: 0012A0F4
                                    • GetAsyncKeyState.USER32(00000011), ref: 0012A120
                                    • GetKeyState.USER32(00000011), ref: 0012A12E
                                    • GetAsyncKeyState.USER32(00000012), ref: 0012A157
                                    • GetKeyState.USER32(00000012), ref: 0012A165
                                    • GetAsyncKeyState.USER32(0000005B), ref: 0012A18E
                                    • GetKeyState.USER32(0000005B), ref: 0012A19C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: State$Async$Keyboard
                                    • String ID:
                                    • API String ID: 541375521-0
                                    • Opcode ID: 4f4633daaeafec9a5e0c36d0d7b01e6a71497215247a43fc95859a09cd1cda32
                                    • Instruction ID: 31eac235040f3ab7f83e59c9af97000a8d3e053d9c4869e1257ca020fd28132a
                                    • Opcode Fuzzy Hash: 4f4633daaeafec9a5e0c36d0d7b01e6a71497215247a43fc95859a09cd1cda32
                                    • Instruction Fuzzy Hash: 74513B309047A86BFB35DBB0A9107EABFF49F12380F484589D5C25B1C2DB54AA5CCB63
                                    APIs
                                    • GetDlgItem.USER32(?,00000001), ref: 00125CE2
                                    • GetWindowRect.USER32(00000000,?), ref: 00125CFB
                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00125D59
                                    • GetDlgItem.USER32(?,00000002), ref: 00125D69
                                    • GetWindowRect.USER32(00000000,?), ref: 00125D7B
                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00125DCF
                                    • GetDlgItem.USER32(?,000003E9), ref: 00125DDD
                                    • GetWindowRect.USER32(00000000,?), ref: 00125DEF
                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00125E31
                                    • GetDlgItem.USER32(?,000003EA), ref: 00125E44
                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00125E5A
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00125E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$ItemMoveRect$Invalidate
                                    • String ID:
                                    • API String ID: 3096461208-0
                                    • Opcode ID: d24021537454a9bf3f907bff1e5ebea5b89bb2bab4d9252a0a944edb1858ad3e
                                    • Instruction ID: e0b0a436e47fad12bc0bf8fb4459cd6f825917ef28f508afe612e0341c615152
                                    • Opcode Fuzzy Hash: d24021537454a9bf3f907bff1e5ebea5b89bb2bab4d9252a0a944edb1858ad3e
                                    • Instruction Fuzzy Hash: 23510E71A00719AFDB18CFA8DD89AAEBBB6FB48301F148129F515E6690D7709E50CB60
                                    APIs
                                      • Part of subcall function 000D8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,000D8BE8,?,00000000,?,?,?,?,000D8BBA,00000000,?), ref: 000D8FC5
                                    • DestroyWindow.USER32(?), ref: 000D8C81
                                    • KillTimer.USER32(00000000,?,?,?,?,000D8BBA,00000000,?), ref: 000D8D1B
                                    • DestroyAcceleratorTable.USER32(00000000), ref: 00116973
                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,000D8BBA,00000000,?), ref: 001169A1
                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,000D8BBA,00000000,?), ref: 001169B8
                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,000D8BBA,00000000), ref: 001169D4
                                    • DeleteObject.GDI32(00000000), ref: 001169E6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                    • String ID:
                                    • API String ID: 641708696-0
                                    • Opcode ID: 4a060a5a6ba761a35917cdb94e5adba54827bc5c7a44a6de5f4502540710a681
                                    • Instruction ID: 4a78b3fe1fae012fc03417ef33207089292cc313ab8526b2cb5d0c57e93de223
                                    • Opcode Fuzzy Hash: 4a060a5a6ba761a35917cdb94e5adba54827bc5c7a44a6de5f4502540710a681
                                    • Instruction Fuzzy Hash: BD615B31512705EFCB359F14D958B69B7F1FB40316F14952EE0429BAA0CB72A9D0DFA0
                                    APIs
                                      • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                    • GetSysColor.USER32(0000000F), ref: 000D9862
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ColorLongWindow
                                    • String ID:
                                    • API String ID: 259745315-0
                                    • Opcode ID: 96ca41e5ccdc8fe27e111c38c50eef29cd3f8d4002b39584020aa135d6538297
                                    • Instruction ID: 14cfb096628b35d54e8bcd075968483ad8bad871b7f520c589705faf64c6e289
                                    • Opcode Fuzzy Hash: 96ca41e5ccdc8fe27e111c38c50eef29cd3f8d4002b39584020aa135d6538297
                                    • Instruction Fuzzy Hash: 35418331104740EFDB205F389C84BB977A6AB46731F144616F9A28B3E1DB319D81EB70
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0010F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00129717
                                    • LoadStringW.USER32(00000000,?,0010F7F8,00000001), ref: 00129720
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0010F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00129742
                                    • LoadStringW.USER32(00000000,?,0010F7F8,00000001), ref: 00129745
                                    • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00129866
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: HandleLoadModuleString$Message_wcslen
                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                    • API String ID: 747408836-2268648507
                                    • Opcode ID: f1a321dcdf90c45ccc40e6bcb364b49a5488283173b3ab2f2665a457a6af29c9
                                    • Instruction ID: 5876df78d53a17464e70d115a336cc4da9f8bdc0eb4f0bc5b85f1fca4be8a5fe
                                    • Opcode Fuzzy Hash: f1a321dcdf90c45ccc40e6bcb364b49a5488283173b3ab2f2665a457a6af29c9
                                    • Instruction Fuzzy Hash: 0A413D72900219AADF14FBE4DD86EEE7778AF15340F504129F60672092EF356F58CB61
                                    APIs
                                      • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001207A2
                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001207BE
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001207DA
                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00120804
                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0012082C
                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00120837
                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0012083C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                    • API String ID: 323675364-22481851
                                    • Opcode ID: 4bb11b2108d3daf2a92c0ab430004c1664d622db696f67f984437899e420f64a
                                    • Instruction ID: de6f8bf96aeee6857be974838c53e2b797d65c6300a1f1f802d0518801f81bc0
                                    • Opcode Fuzzy Hash: 4bb11b2108d3daf2a92c0ab430004c1664d622db696f67f984437899e420f64a
                                    • Instruction Fuzzy Hash: E341E476D10229AFDB11EFA4DC85DEEB778FF48354B044129F901A71A2EB309E54CBA0
                                    APIs
                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0015403B
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00154042
                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00154055
                                    • SelectObject.GDI32(00000000,00000000), ref: 0015405D
                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00154068
                                    • DeleteDC.GDI32(00000000), ref: 00154072
                                    • GetWindowLongW.USER32(?,000000EC), ref: 0015407C
                                    • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00154092
                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 0015409E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                    • String ID: static
                                    • API String ID: 2559357485-2160076837
                                    • Opcode ID: 091d854a50c51e37b2030eab73277393d9dea0721da431e4c0a3261cf0f54101
                                    • Instruction ID: 7968fc448a6dc3f2a670f2fc497576012108683754f6bf4468fa173b176815a2
                                    • Opcode Fuzzy Hash: 091d854a50c51e37b2030eab73277393d9dea0721da431e4c0a3261cf0f54101
                                    • Instruction Fuzzy Hash: 32317C32500315EFDF219FA4DC48FDA3B69EF0D366F110211FA25AA1A0C775D895DB90
                                    APIs
                                    • VariantInit.OLEAUT32(?), ref: 00143C5C
                                    • CoInitialize.OLE32(00000000), ref: 00143C8A
                                    • CoUninitialize.OLE32 ref: 00143C94
                                    • _wcslen.LIBCMT ref: 00143D2D
                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 00143DB1
                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00143ED5
                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00143F0E
                                    • CoGetObject.OLE32(?,00000000,0015FB98,?), ref: 00143F2D
                                    • SetErrorMode.KERNEL32(00000000), ref: 00143F40
                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00143FC4
                                    • VariantClear.OLEAUT32(?), ref: 00143FD8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                    • String ID:
                                    • API String ID: 429561992-0
                                    • Opcode ID: 85be2c767c776b56c02f5d746bc9f2c1c05caf88e5439ccf48afb8b93c69f85e
                                    • Instruction ID: bf9b1c57f587a15db3651fe17e555c5cfcb80080e9e6a9a1d19609d508ccd787
                                    • Opcode Fuzzy Hash: 85be2c767c776b56c02f5d746bc9f2c1c05caf88e5439ccf48afb8b93c69f85e
                                    • Instruction Fuzzy Hash: A9C123716083019FD700DF68C88496BB7E9FF89744F10491DF99A9B261D731EE46CB92
                                    APIs
                                    • CoInitialize.OLE32(00000000), ref: 00137AF3
                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00137B8F
                                    • SHGetDesktopFolder.SHELL32(?), ref: 00137BA3
                                    • CoCreateInstance.OLE32(0015FD08,00000000,00000001,00186E6C,?), ref: 00137BEF
                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00137C74
                                    • CoTaskMemFree.OLE32(?,?), ref: 00137CCC
                                    • SHBrowseForFolderW.SHELL32(?), ref: 00137D57
                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00137D7A
                                    • CoTaskMemFree.OLE32(00000000), ref: 00137D81
                                    • CoTaskMemFree.OLE32(00000000), ref: 00137DD6
                                    • CoUninitialize.OLE32 ref: 00137DDC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                    • String ID:
                                    • API String ID: 2762341140-0
                                    • Opcode ID: 1e661f7f2d2b64ed23411624f0684ed65b3edd7f9eacda93ef1ed0073f84ec82
                                    • Instruction ID: f0c3504625483b165e4b9c42c63b18c625737d6a8c6a15e751a433dda88d5b96
                                    • Opcode Fuzzy Hash: 1e661f7f2d2b64ed23411624f0684ed65b3edd7f9eacda93ef1ed0073f84ec82
                                    • Instruction Fuzzy Hash: 17C1EA75A04209AFCB14DFA4C884DAEBBF9FF48314F148499E8199B662D731EE45CB90
                                    APIs
                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00155504
                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00155515
                                    • CharNextW.USER32(00000158), ref: 00155544
                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00155585
                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0015559B
                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001555AC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$CharNext
                                    • String ID:
                                    • API String ID: 1350042424-0
                                    • Opcode ID: 6e2bb8ecdbd72e361acbca0e8c431f025595fdaa690cd0dfe625722e8ca9b562
                                    • Instruction ID: 7ee0a0b14d8fb4fd04923b4e9f5abff2cb74e370b505bf5d8549d86ed8c4a423
                                    • Opcode Fuzzy Hash: 6e2bb8ecdbd72e361acbca0e8c431f025595fdaa690cd0dfe625722e8ca9b562
                                    • Instruction Fuzzy Hash: 37617C30904609EFDF109F94CC95AFE7BBAFB09726F104145F935AE290E7749A88DB60
                                    APIs
                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0011FAAF
                                    • SafeArrayAllocData.OLEAUT32(?), ref: 0011FB08
                                    • VariantInit.OLEAUT32(?), ref: 0011FB1A
                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 0011FB3A
                                    • VariantCopy.OLEAUT32(?,?), ref: 0011FB8D
                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 0011FBA1
                                    • VariantClear.OLEAUT32(?), ref: 0011FBB6
                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 0011FBC3
                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0011FBCC
                                    • VariantClear.OLEAUT32(?), ref: 0011FBDE
                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0011FBE9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                    • String ID:
                                    • API String ID: 2706829360-0
                                    • Opcode ID: c6c68d8941ae88bd72afc0fb0589d402170e194057bb1ef3e655bba06954b599
                                    • Instruction ID: b4cb496ccc4a2975796af34420fc9f6ad9b866fa8f6d292d2dd75eb1752ee07c
                                    • Opcode Fuzzy Hash: c6c68d8941ae88bd72afc0fb0589d402170e194057bb1ef3e655bba06954b599
                                    • Instruction Fuzzy Hash: E0415F75A00319DFCB04DF64D854DEEBBB9FF58345F008079E945AB261DB30A986CBA0
                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 00129CA1
                                    • GetAsyncKeyState.USER32(000000A0), ref: 00129D22
                                    • GetKeyState.USER32(000000A0), ref: 00129D3D
                                    • GetAsyncKeyState.USER32(000000A1), ref: 00129D57
                                    • GetKeyState.USER32(000000A1), ref: 00129D6C
                                    • GetAsyncKeyState.USER32(00000011), ref: 00129D84
                                    • GetKeyState.USER32(00000011), ref: 00129D96
                                    • GetAsyncKeyState.USER32(00000012), ref: 00129DAE
                                    • GetKeyState.USER32(00000012), ref: 00129DC0
                                    • GetAsyncKeyState.USER32(0000005B), ref: 00129DD8
                                    • GetKeyState.USER32(0000005B), ref: 00129DEA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: State$Async$Keyboard
                                    • String ID:
                                    • API String ID: 541375521-0
                                    • Opcode ID: 1b620b3900e70a997cfca1c9bf225d2bec416e30a6ca06fcfdb947a8610949a0
                                    • Instruction ID: 7c9cd0d0256c75f54ab36da518254ac273a8ebc6ac2c2c9a1e88b229d29df6eb
                                    • Opcode Fuzzy Hash: 1b620b3900e70a997cfca1c9bf225d2bec416e30a6ca06fcfdb947a8610949a0
                                    • Instruction Fuzzy Hash: 0741FC345047DE6DFF348BA8E4043B5BEE06F11344F04805ED6C65A5C2E7A499F4D7A2
                                    APIs
                                    • WSAStartup.WSOCK32(00000101,?), ref: 001405BC
                                    • inet_addr.WSOCK32(?), ref: 0014061C
                                    • gethostbyname.WSOCK32(?), ref: 00140628
                                    • IcmpCreateFile.IPHLPAPI ref: 00140636
                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 001406C6
                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 001406E5
                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 001407B9
                                    • WSACleanup.WSOCK32 ref: 001407BF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                    • String ID: Ping
                                    • API String ID: 1028309954-2246546115
                                    • Opcode ID: 0fadb745b97a1aded8b24a9c0c5bfa6157fa5a4b9a9fe99401e5de841915c4aa
                                    • Instruction ID: 46ec6937932cda903066112976072cb269d454940828f2c1cd91040e92de4694
                                    • Opcode Fuzzy Hash: 0fadb745b97a1aded8b24a9c0c5bfa6157fa5a4b9a9fe99401e5de841915c4aa
                                    • Instruction Fuzzy Hash: 1C916E355047019FD321DF16C889F1ABBE0EF48319F1585A9E5AA8BAB2C730ED45CF92
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$BuffCharLower
                                    • String ID: cdecl$none$stdcall$winapi
                                    • API String ID: 707087890-567219261
                                    • Opcode ID: 529fce010819f0901a7c7c537ecda959fbbcf596872a6b4daf42c90e3193fd42
                                    • Instruction ID: 37b8f98a9e250c87da76ce246a956fe6c76d74ab0641e8e85e6da8600c6f535a
                                    • Opcode Fuzzy Hash: 529fce010819f0901a7c7c537ecda959fbbcf596872a6b4daf42c90e3193fd42
                                    • Instruction Fuzzy Hash: 82519F31A011169BCB24EFACC9509BEB7A5BF64724B214229E826F72D5EF31DE41C790
                                    APIs
                                    • CoInitialize.OLE32 ref: 00143774
                                    • CoUninitialize.OLE32 ref: 0014377F
                                    • CoCreateInstance.OLE32(?,00000000,00000017,0015FB78,?), ref: 001437D9
                                    • IIDFromString.OLE32(?,?), ref: 0014384C
                                    • VariantInit.OLEAUT32(?), ref: 001438E4
                                    • VariantClear.OLEAUT32(?), ref: 00143936
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                    • API String ID: 636576611-1287834457
                                    • Opcode ID: 2e7437a3d2fcc0e8b871e3c7107ad67787b4a1c4c021b8f4029a94717d489747
                                    • Instruction ID: a68b9cca5c21f14b03ff3c3909b64a83985707390734239b18386596a754176e
                                    • Opcode Fuzzy Hash: 2e7437a3d2fcc0e8b871e3c7107ad67787b4a1c4c021b8f4029a94717d489747
                                    • Instruction Fuzzy Hash: 1E619F70608302AFD311DF54C849F6ABBE4EF48715F10091DF9A59B2A1D770EE49CBA2
                                    APIs
                                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001333CF
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 001333F0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: LoadString$_wcslen
                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                    • API String ID: 4099089115-3080491070
                                    • Opcode ID: 1c5b279316d0e5db368161956c868eac965f8ab1674f30bae9daceacb6831f30
                                    • Instruction ID: 36e924fd50358d9118c302788eddd9b6c2222d9d206992a04a254c8bf0dac739
                                    • Opcode Fuzzy Hash: 1c5b279316d0e5db368161956c868eac965f8ab1674f30bae9daceacb6831f30
                                    • Instruction Fuzzy Hash: EA517C7290020ABADF15EBA0DD46EEEB778AF14340F204169F515720A2EB356F98DF61
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$BuffCharUpper
                                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                                    • API String ID: 1256254125-769500911
                                    • Opcode ID: b53632d311ad8e95ef8a9045ac252e67e1e1828d94205ee387cd560b13aaa189
                                    • Instruction ID: d3bcebea20d4e0d57a056aa1387da062dee46b0589d058004ca93f7bf07b3795
                                    • Opcode Fuzzy Hash: b53632d311ad8e95ef8a9045ac252e67e1e1828d94205ee387cd560b13aaa189
                                    • Instruction Fuzzy Hash: A241F632A081379BCB206F7DD9D05BE77A5BFA0B54B254229E422EB285F731CD91C790
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 001353A0
                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00135416
                                    • GetLastError.KERNEL32 ref: 00135420
                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 001354A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Error$Mode$DiskFreeLastSpace
                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                    • API String ID: 4194297153-14809454
                                    • Opcode ID: 4081636c80a8997c774608b7ae5de75718b1bb8d793b99d4416d7a23f8ebc72c
                                    • Instruction ID: 0315036e26ba01cc1ce12fe7910c2a295f220f09759db5f0bde4934cd67933d9
                                    • Opcode Fuzzy Hash: 4081636c80a8997c774608b7ae5de75718b1bb8d793b99d4416d7a23f8ebc72c
                                    • Instruction Fuzzy Hash: FF318D35A00604DFC718DF68C984FAABBB5EB45715F148069E805DB292EB71DE86CBA0
                                    APIs
                                    • CreateMenu.USER32 ref: 00153C79
                                    • SetMenu.USER32(?,00000000), ref: 00153C88
                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00153D10
                                    • IsMenu.USER32(?), ref: 00153D24
                                    • CreatePopupMenu.USER32 ref: 00153D2E
                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00153D5B
                                    • DrawMenuBar.USER32 ref: 00153D63
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                    • String ID: 0$F
                                    • API String ID: 161812096-3044882817
                                    • Opcode ID: 6772cbe6385cfe6006e3d71b71bc939022e5bd81208c55377085fe4f47a40b1a
                                    • Instruction ID: 9f46a3dc4b3be3834a698d122e9fd438318998bec5941e9d471f1785ca7643af
                                    • Opcode Fuzzy Hash: 6772cbe6385cfe6006e3d71b71bc939022e5bd81208c55377085fe4f47a40b1a
                                    • Instruction Fuzzy Hash: 64415675A01309EFDB14CFA4D844BAA7BB5FF49391F140029ED66AB360D770AA54CF90
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                    • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00121F64
                                    • GetDlgCtrlID.USER32 ref: 00121F6F
                                    • GetParent.USER32 ref: 00121F8B
                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00121F8E
                                    • GetDlgCtrlID.USER32(?), ref: 00121F97
                                    • GetParent.USER32(?), ref: 00121FAB
                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00121FAE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 711023334-1403004172
                                    • Opcode ID: 8a549c7cba42346ca967256d478b78fc2e4b9693f3f12fcf84d0e2de14000a0c
                                    • Instruction ID: 6b52fd3a0c6a7ee6e3caa7dad738c3022a4dc41338a2a09a1e30f5e4b449cef3
                                    • Opcode Fuzzy Hash: 8a549c7cba42346ca967256d478b78fc2e4b9693f3f12fcf84d0e2de14000a0c
                                    • Instruction Fuzzy Hash: 7B21C270900224BFCF04EFA0DC85EEEBBB9EF19350B000119F961672D1DB345A68DBA0
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                    • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00122043
                                    • GetDlgCtrlID.USER32 ref: 0012204E
                                    • GetParent.USER32 ref: 0012206A
                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 0012206D
                                    • GetDlgCtrlID.USER32(?), ref: 00122076
                                    • GetParent.USER32(?), ref: 0012208A
                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 0012208D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 711023334-1403004172
                                    • Opcode ID: b3118de80d393d87d86f586d97c1b9616b3daefa2ecf293c138c7c27de173ca4
                                    • Instruction ID: 4ce01c5a52e68795f26b9edb8fc0bddad3bde46f4d12dfa3402c7b0f7c397894
                                    • Opcode Fuzzy Hash: b3118de80d393d87d86f586d97c1b9616b3daefa2ecf293c138c7c27de173ca4
                                    • Instruction Fuzzy Hash: 5121C271A00214BFCF14AFA0DC85EEEBBB8EF15340F000415F951A72A1CB795A64DB64
                                    APIs
                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00153A9D
                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00153AA0
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00153AC7
                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00153AEA
                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00153B62
                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00153BAC
                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00153BC7
                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00153BE2
                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00153BF6
                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00153C13
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$LongWindow
                                    • String ID:
                                    • API String ID: 312131281-0
                                    • Opcode ID: 268f5ab9cf9e56b9a3c2797d187ac24cb93fddb279d7ca1405e4db3bb1196884
                                    • Instruction ID: 155fd9d9a430ba34d66c5c31a73d9773ebc8ebe6383cab2034a8a8e962f4848e
                                    • Opcode Fuzzy Hash: 268f5ab9cf9e56b9a3c2797d187ac24cb93fddb279d7ca1405e4db3bb1196884
                                    • Instruction Fuzzy Hash: 03617D75900248EFDB11DF68CC81EEE77B8EB09704F10019AFA25EB291C770AE85DB50
                                    APIs
                                    • _free.LIBCMT ref: 000F2C94
                                      • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                      • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                    • _free.LIBCMT ref: 000F2CA0
                                    • _free.LIBCMT ref: 000F2CAB
                                    • _free.LIBCMT ref: 000F2CB6
                                    • _free.LIBCMT ref: 000F2CC1
                                    • _free.LIBCMT ref: 000F2CCC
                                    • _free.LIBCMT ref: 000F2CD7
                                    • _free.LIBCMT ref: 000F2CE2
                                    • _free.LIBCMT ref: 000F2CED
                                    • _free.LIBCMT ref: 000F2CFB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: bd737444ddd361eafb8904c17dcadaf450d54171f6ce728c3f809bb29af24c87
                                    • Instruction ID: 10e61f7a2a8d8b55aa6a3d7b340f591bd50aa01bd28e6629b71deda7e320edcf
                                    • Opcode Fuzzy Hash: bd737444ddd361eafb8904c17dcadaf450d54171f6ce728c3f809bb29af24c87
                                    • Instruction Fuzzy Hash: 6711937614410DAFCB02EF94D982CED3BA5FF05350F4144A5FA489BA22DA71EA50AB90
                                    APIs
                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00137FAD
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00137FC1
                                    • GetFileAttributesW.KERNEL32(?), ref: 00137FEB
                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00138005
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00138017
                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00138060
                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001380B0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CurrentDirectory$AttributesFile
                                    • String ID: *.*
                                    • API String ID: 769691225-438819550
                                    • Opcode ID: b9132fcdd8c59bf379050ecccee6bd3df56e83d242589ac147ec79e296d236e5
                                    • Instruction ID: d3cfabf06bea43877c9611cab75aa950619295a45d52e43f727a5da45fda1ec4
                                    • Opcode Fuzzy Hash: b9132fcdd8c59bf379050ecccee6bd3df56e83d242589ac147ec79e296d236e5
                                    • Instruction Fuzzy Hash: A68180B15083459FCB34EF14C484AAEB3E8BB89310F544C6EF889D7291EB74DD498B52
                                    APIs
                                    • SetWindowLongW.USER32(?,000000EB), ref: 000C5C7A
                                      • Part of subcall function 000C5D0A: GetClientRect.USER32(?,?), ref: 000C5D30
                                      • Part of subcall function 000C5D0A: GetWindowRect.USER32(?,?), ref: 000C5D71
                                      • Part of subcall function 000C5D0A: ScreenToClient.USER32(?,?), ref: 000C5D99
                                    • GetDC.USER32 ref: 001046F5
                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00104708
                                    • SelectObject.GDI32(00000000,00000000), ref: 00104716
                                    • SelectObject.GDI32(00000000,00000000), ref: 0010472B
                                    • ReleaseDC.USER32(?,00000000), ref: 00104733
                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 001047C4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                    • String ID: U
                                    • API String ID: 4009187628-3372436214
                                    • Opcode ID: 4bd74b04e1735c21dde96b2305793324002a569f7d5696791369e657fce9907e
                                    • Instruction ID: ed9c3d65080ecc21a18956f814609104b622abf71877b90327dd0a5af63a33c7
                                    • Opcode Fuzzy Hash: 4bd74b04e1735c21dde96b2305793324002a569f7d5696791369e657fce9907e
                                    • Instruction Fuzzy Hash: A971DCB5400205EFCF258F64C9C4AAE3BB1FF4A361F14426AEE955A2A6D3719881DF60
                                    APIs
                                    • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001335E4
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • LoadStringW.USER32(00192390,?,00000FFF,?), ref: 0013360A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: LoadString$_wcslen
                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                    • API String ID: 4099089115-2391861430
                                    • Opcode ID: d3d3ae3c7a235e45bde5016fb6c2cbe61291a677e7fbac367cb4501370d8ed7f
                                    • Instruction ID: 97258a77b6899eb3afcdadafcdfaf3260ebad47467ced5a418a91b5238550aae
                                    • Opcode Fuzzy Hash: d3d3ae3c7a235e45bde5016fb6c2cbe61291a677e7fbac367cb4501370d8ed7f
                                    • Instruction Fuzzy Hash: 59518C7190020ABBDF14EBA0DC46EEEBB38EF14310F144129F515721A2EB311B99DFA5
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                      • Part of subcall function 000D912D: GetCursorPos.USER32(?), ref: 000D9141
                                      • Part of subcall function 000D912D: ScreenToClient.USER32(00000000,?), ref: 000D915E
                                      • Part of subcall function 000D912D: GetAsyncKeyState.USER32(00000001), ref: 000D9183
                                      • Part of subcall function 000D912D: GetAsyncKeyState.USER32(00000002), ref: 000D919D
                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00158B6B
                                    • ImageList_EndDrag.COMCTL32 ref: 00158B71
                                    • ReleaseCapture.USER32 ref: 00158B77
                                    • SetWindowTextW.USER32(?,00000000), ref: 00158C12
                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00158C25
                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00158CFF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                    • API String ID: 1924731296-2107944366
                                    • Opcode ID: 22b632538bc9772b062e06d7ec0741e5e9ebc40fb53a5a96b3a7381d57c66ffb
                                    • Instruction ID: d9b6920e007288b702b2d5205acd091bc07601d3a0e58810d680bf453720384c
                                    • Opcode Fuzzy Hash: 22b632538bc9772b062e06d7ec0741e5e9ebc40fb53a5a96b3a7381d57c66ffb
                                    • Instruction Fuzzy Hash: 61516B71104304AFD704DF14D856FAE77E4FB88755F400A2DF9666B2E2DB709988CB62
                                    APIs
                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0013C272
                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0013C29A
                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0013C2CA
                                    • GetLastError.KERNEL32 ref: 0013C322
                                    • SetEvent.KERNEL32(?), ref: 0013C336
                                    • InternetCloseHandle.WININET(00000000), ref: 0013C341
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                    • String ID:
                                    • API String ID: 3113390036-3916222277
                                    • Opcode ID: f79b2d60727768b4f87db2701d24218ccc4097968cbfe0bd547a4f1f18c1a9c9
                                    • Instruction ID: 846196c0a4b16945b09b7f847e2c5e67bb288682ba752bb066b08fb4231971ea
                                    • Opcode Fuzzy Hash: f79b2d60727768b4f87db2701d24218ccc4097968cbfe0bd547a4f1f18c1a9c9
                                    • Instruction Fuzzy Hash: 273167B1600708AFD7219FA4DC88AAB7BFCFB59744F14851EF486A6600DB30ED459BA1
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00103AAF,?,?,Bad directive syntax error,0015CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 001298BC
                                    • LoadStringW.USER32(00000000,?,00103AAF,?), ref: 001298C3
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00129987
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: HandleLoadMessageModuleString_wcslen
                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                    • API String ID: 858772685-4153970271
                                    • Opcode ID: 21e76eef861e974c9feb2187632dca958d21f90238a192507651f3f5b1ced7a4
                                    • Instruction ID: b52d75b8fb4f9e480e476e349ce8621b6a51e4b50ab61e978a96b90c76079f78
                                    • Opcode Fuzzy Hash: 21e76eef861e974c9feb2187632dca958d21f90238a192507651f3f5b1ced7a4
                                    • Instruction Fuzzy Hash: 95217A3290031AEBCF15AF90DC4AEEE7739BF18304F04446AF515660A2EB719A68CB60
                                    APIs
                                    • GetParent.USER32 ref: 001220AB
                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 001220C0
                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0012214D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameParentSend
                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                    • API String ID: 1290815626-3381328864
                                    • Opcode ID: c5d9cda3c2ff0f80a7b91dee083709a3e5694dcf5044125fc412c7498b283899
                                    • Instruction ID: 1b0a663158db1bec42ec69730e131653b2be9d2aff3c0a4a2ba5d1fc86c43f36
                                    • Opcode Fuzzy Hash: c5d9cda3c2ff0f80a7b91dee083709a3e5694dcf5044125fc412c7498b283899
                                    • Instruction Fuzzy Hash: FC11367A688316BEF7053620FC06CEA379DCF15324B200026FB04B80E2FFB169715A18
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0ec8ee899dee97235725bf44d8dcb8f850b44b6e7ac0465fc1b90593e07ca45a
                                    • Instruction ID: f4620254c9cda82750f10020c4ea78bdfd56a5575b2e9d3cc398cde1e1b3ec0a
                                    • Opcode Fuzzy Hash: 0ec8ee899dee97235725bf44d8dcb8f850b44b6e7ac0465fc1b90593e07ca45a
                                    • Instruction Fuzzy Hash: 84C1F175A0434DAFCB61DFA9D841BFDBBF0AF09310F044099EA14A7792CB359941EB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                    • String ID:
                                    • API String ID: 1282221369-0
                                    • Opcode ID: 49fb3fce1d8dd3d4cfccf0082bd8c12ac707508622923e42b5e2ed8f12e18c7f
                                    • Instruction ID: 096757201bcd504dbe08e805e8524526ce3ad8ea3be0b5c119f375e88a999b69
                                    • Opcode Fuzzy Hash: 49fb3fce1d8dd3d4cfccf0082bd8c12ac707508622923e42b5e2ed8f12e18c7f
                                    • Instruction Fuzzy Hash: ED61587190430DAFEB21AFB49942ABDBBE5EF05310F04017EFB4597A82DB319E05A790
                                    APIs
                                    • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00155186
                                    • ShowWindow.USER32(?,00000000), ref: 001551C7
                                    • ShowWindow.USER32(?,00000005,?,00000000), ref: 001551CD
                                    • SetFocus.USER32(?,?,00000005,?,00000000), ref: 001551D1
                                      • Part of subcall function 00156FBA: DeleteObject.GDI32(00000000), ref: 00156FE6
                                    • GetWindowLongW.USER32(?,000000F0), ref: 0015520D
                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0015521A
                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0015524D
                                    • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00155287
                                    • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00155296
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                    • String ID:
                                    • API String ID: 3210457359-0
                                    • Opcode ID: 1f6a4373d65ae7faadea8daf00e39b5ba6bc2a6ffb65e487bdd970dd852fba1f
                                    • Instruction ID: 2be3f9921045e0ee7d05fa634d7f8eeca7b28cfd13fe4134e44494d41bdaf0e8
                                    • Opcode Fuzzy Hash: 1f6a4373d65ae7faadea8daf00e39b5ba6bc2a6ffb65e487bdd970dd852fba1f
                                    • Instruction Fuzzy Hash: 7F519330A50A08FEEF249F24CC95BD83BA6EB05366F144012FD359E6E1C775A988DB51
                                    APIs
                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00116890
                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 001168A9
                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 001168B9
                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 001168D1
                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001168F2
                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,000D8874,00000000,00000000,00000000,000000FF,00000000), ref: 00116901
                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0011691E
                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,000D8874,00000000,00000000,00000000,000000FF,00000000), ref: 0011692D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                    • String ID:
                                    • API String ID: 1268354404-0
                                    • Opcode ID: df8e03b2a282dd3cbc9a2629144c1a87732eb658ef22cce2bd744cb5aab1db4c
                                    • Instruction ID: 05a86f7bd44232ac5bda3e038f24a77ce8073ae15134c40ea2819405fedb60e2
                                    • Opcode Fuzzy Hash: df8e03b2a282dd3cbc9a2629144c1a87732eb658ef22cce2bd744cb5aab1db4c
                                    • Instruction Fuzzy Hash: CD51AD70600309EFDB24CF24CC95FAA7BB5FB58365F10452AF9129B2A0DB71E990DB60
                                    APIs
                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0013C182
                                    • GetLastError.KERNEL32 ref: 0013C195
                                    • SetEvent.KERNEL32(?), ref: 0013C1A9
                                      • Part of subcall function 0013C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0013C272
                                      • Part of subcall function 0013C253: GetLastError.KERNEL32 ref: 0013C322
                                      • Part of subcall function 0013C253: SetEvent.KERNEL32(?), ref: 0013C336
                                      • Part of subcall function 0013C253: InternetCloseHandle.WININET(00000000), ref: 0013C341
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                    • String ID:
                                    • API String ID: 337547030-0
                                    • Opcode ID: e92734f7963f5c3ee264b2a13b4f0023b1ac7c63df8147b1bb7e6666b3d9fde0
                                    • Instruction ID: 91cd3892d9de3af1224d18c596258b5aa7596f2fe483bc1b95dca5771195e1d3
                                    • Opcode Fuzzy Hash: e92734f7963f5c3ee264b2a13b4f0023b1ac7c63df8147b1bb7e6666b3d9fde0
                                    • Instruction Fuzzy Hash: DD315571200705EFDB219FA5DC44A6BBBE9FF28301F04442DF956AAA10D730E854ABE0
                                    APIs
                                      • Part of subcall function 00123A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00123A57
                                      • Part of subcall function 00123A3D: GetCurrentThreadId.KERNEL32 ref: 00123A5E
                                      • Part of subcall function 00123A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001225B3), ref: 00123A65
                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001225BD
                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001225DB
                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 001225DF
                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001225E9
                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00122601
                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00122605
                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 0012260F
                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00122623
                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00122627
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                    • String ID:
                                    • API String ID: 2014098862-0
                                    • Opcode ID: c063b1bfe7626b3168496e279a520b2bb8aa5c3fcbd659550e495a7a0f875562
                                    • Instruction ID: 5238e2bbca56fa7482d1b51a506223c2399eed1995a5425b821074dc0de9b0de
                                    • Opcode Fuzzy Hash: c063b1bfe7626b3168496e279a520b2bb8aa5c3fcbd659550e495a7a0f875562
                                    • Instruction Fuzzy Hash: F301D831390720FBFB106B689CCAF993F99DB5EB12F100011F314AF1D1CAF114948AA9
                                    APIs
                                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00121449,?,?,00000000), ref: 0012180C
                                    • HeapAlloc.KERNEL32(00000000,?,00121449,?,?,00000000), ref: 00121813
                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00121449,?,?,00000000), ref: 00121828
                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00121449,?,?,00000000), ref: 00121830
                                    • DuplicateHandle.KERNEL32(00000000,?,00121449,?,?,00000000), ref: 00121833
                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00121449,?,?,00000000), ref: 00121843
                                    • GetCurrentProcess.KERNEL32(00121449,00000000,?,00121449,?,?,00000000), ref: 0012184B
                                    • DuplicateHandle.KERNEL32(00000000,?,00121449,?,?,00000000), ref: 0012184E
                                    • CreateThread.KERNEL32(00000000,00000000,00121874,00000000,00000000,00000000), ref: 00121868
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                    • String ID:
                                    • API String ID: 1957940570-0
                                    • Opcode ID: 25717365dbf7c1601a03762abf0a4181ec91d930a971a04beac4b5bf82f0651b
                                    • Instruction ID: f4f62a5016e28510474150d323d7d553f30869cbc9a08aca43b4ff09b47cb344
                                    • Opcode Fuzzy Hash: 25717365dbf7c1601a03762abf0a4181ec91d930a971a04beac4b5bf82f0651b
                                    • Instruction Fuzzy Hash: 6101A8B5640708FFE610AFA5DC89F6B3BACEB89B11F004411FA05DB5A1CA709850CB60
                                    APIs
                                      • Part of subcall function 0012D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0012D501
                                      • Part of subcall function 0012D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0012D50F
                                      • Part of subcall function 0012D4DC: CloseHandle.KERNEL32(00000000), ref: 0012D5DC
                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0014A16D
                                    • GetLastError.KERNEL32 ref: 0014A180
                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0014A1B3
                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 0014A268
                                    • GetLastError.KERNEL32(00000000), ref: 0014A273
                                    • CloseHandle.KERNEL32(00000000), ref: 0014A2C4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                    • String ID: SeDebugPrivilege
                                    • API String ID: 2533919879-2896544425
                                    • Opcode ID: cb38db089c160fd5f465efa91450190b289bbdeee04e239c8942e7f7648d5476
                                    • Instruction ID: 1991ec38b69463bdb303b94b8df2ed44868bb0e79c72d88fbd54574294b1d95a
                                    • Opcode Fuzzy Hash: cb38db089c160fd5f465efa91450190b289bbdeee04e239c8942e7f7648d5476
                                    • Instruction Fuzzy Hash: EF61A1302442429FD720DF14C494F5ABBE1AF54318F55849CE45A4FBA3C7B2ED46DB92
                                    APIs
                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00153925
                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0015393A
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00153954
                                    • _wcslen.LIBCMT ref: 00153999
                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 001539C6
                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 001539F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window_wcslen
                                    • String ID: SysListView32
                                    • API String ID: 2147712094-78025650
                                    • Opcode ID: 0d2d96f27d0f82b0ef350d357f893c2f1667ff1ac025cef0f65e3cac37043045
                                    • Instruction ID: 3a6734ca8262f1d2ed308ce464a18402a90e447581a6f4bbd291f97a8967ccf7
                                    • Opcode Fuzzy Hash: 0d2d96f27d0f82b0ef350d357f893c2f1667ff1ac025cef0f65e3cac37043045
                                    • Instruction Fuzzy Hash: 9E417571A00319EFEF259F64CC49BEA77A9EF08395F100526F964EB281D7719A84CB90
                                    APIs
                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0012BCFD
                                    • IsMenu.USER32(00000000), ref: 0012BD1D
                                    • CreatePopupMenu.USER32 ref: 0012BD53
                                    • GetMenuItemCount.USER32(00F050C0), ref: 0012BDA4
                                    • InsertMenuItemW.USER32(00F050C0,?,00000001,00000030), ref: 0012BDCC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                    • String ID: 0$2
                                    • API String ID: 93392585-3793063076
                                    • Opcode ID: 5d756c6dc87960146e066497a85d9ef1b239bf75c9ecfb182502c871ed741ec9
                                    • Instruction ID: 358162839800437becc528399c11af99555505faf420b107be65c636df597a3c
                                    • Opcode Fuzzy Hash: 5d756c6dc87960146e066497a85d9ef1b239bf75c9ecfb182502c871ed741ec9
                                    • Instruction Fuzzy Hash: 6751BE70A08329DBDB14CFE8E8C4BEEBBF4AF55318F148119E4519B291E7709961CB91
                                    APIs
                                    • LoadIconW.USER32(00000000,00007F03), ref: 0012C913
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: IconLoad
                                    • String ID: blank$info$question$stop$warning
                                    • API String ID: 2457776203-404129466
                                    • Opcode ID: 8538c6b751da78a53ab26b6986da8a43e8126dd480e837a77e403de60b234f5b
                                    • Instruction ID: 778f995ddd844a5860f66f27ba50125c1bda71767bbf062825a6b27a47645c7d
                                    • Opcode Fuzzy Hash: 8538c6b751da78a53ab26b6986da8a43e8126dd480e837a77e403de60b234f5b
                                    • Instruction Fuzzy Hash: C2112B31689316BEEB046B54EC83CEE379CDF15328B10003EF700A6182E7E05E5057E9
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                    • String ID: 0.0.0.0
                                    • API String ID: 642191829-3771769585
                                    • Opcode ID: 04ef33bd95a4e535741cebac54f4273fc1873b370075ce195fa28e2103bbf6dc
                                    • Instruction ID: 47812cca35bcafcb028ed85f54bf3c3a7e9909d4bf1d161a0f6da0069eb46505
                                    • Opcode Fuzzy Hash: 04ef33bd95a4e535741cebac54f4273fc1873b370075ce195fa28e2103bbf6dc
                                    • Instruction Fuzzy Hash: 33110A71504315AFDB24AF60FC0ADEE77ACDF15711F020169F445AA092EF718AC18AA0
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    • GetSystemMetrics.USER32(0000000F), ref: 00159FC7
                                    • GetSystemMetrics.USER32(0000000F), ref: 00159FE7
                                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0015A224
                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0015A242
                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0015A263
                                    • ShowWindow.USER32(00000003,00000000), ref: 0015A282
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0015A2A7
                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 0015A2CA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                    • String ID:
                                    • API String ID: 1211466189-0
                                    • Opcode ID: 8993da2a4a8f90d757042bf1ae5c32c575604b73d5b086cb06960c1ed53ad50b
                                    • Instruction ID: 637c69a3dfb25ca08ca48080eb6e50d06af7ce28b39e136525cd768b43203a01
                                    • Opcode Fuzzy Hash: 8993da2a4a8f90d757042bf1ae5c32c575604b73d5b086cb06960c1ed53ad50b
                                    • Instruction Fuzzy Hash: 15B1B931640219EFCF14CF68C9C57AA3BB2BF48702F488169ECA59F295D731A984CB51
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$LocalTime
                                    • String ID:
                                    • API String ID: 952045576-0
                                    • Opcode ID: 603063719d66416ba8c44ac90524bf28eea8685f6f07173cef914686b8cffd58
                                    • Instruction ID: 963cfaae5ed4a3639e7813f67bf5cb50e9ddf7933afac642a05a5ed9a44d2e86
                                    • Opcode Fuzzy Hash: 603063719d66416ba8c44ac90524bf28eea8685f6f07173cef914686b8cffd58
                                    • Instruction Fuzzy Hash: CC41A065C1026879CB11EBF5988A9CFB7A8AF45310F518466E618F3123FB34E255C3E6
                                    APIs
                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0011682C,00000004,00000000,00000000), ref: 000DF953
                                    • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0011682C,00000004,00000000,00000000), ref: 0011F3D1
                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0011682C,00000004,00000000,00000000), ref: 0011F454
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ShowWindow
                                    • String ID:
                                    • API String ID: 1268545403-0
                                    • Opcode ID: b799a95c609f48f6772fb42368679f9a777a42b9a793b1cff0db28c97ff0908f
                                    • Instruction ID: 93c2a7e17507d82b741b8280daab1e168e4b731a529cda5cafac9e8a7e8d58e1
                                    • Opcode Fuzzy Hash: b799a95c609f48f6772fb42368679f9a777a42b9a793b1cff0db28c97ff0908f
                                    • Instruction Fuzzy Hash: BB410830A18782BEC7799F2988A877ABAD2BB56314F14C03EE05796B61D73198C1C771
                                    APIs
                                    • DeleteObject.GDI32(00000000), ref: 00152D1B
                                    • GetDC.USER32(00000000), ref: 00152D23
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00152D2E
                                    • ReleaseDC.USER32(00000000,00000000), ref: 00152D3A
                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00152D76
                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00152D87
                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00155A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00152DC2
                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00152DE1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                    • String ID:
                                    • API String ID: 3864802216-0
                                    • Opcode ID: 5f648900b2d9542f8eb0846feadb6ffa097d7874e65c8ac19d021933f44189f2
                                    • Instruction ID: 13a4eb7a97b2d39ffd6d2766b3332759e6cca400fe7f9219a6cc118c5c7b05bc
                                    • Opcode Fuzzy Hash: 5f648900b2d9542f8eb0846feadb6ffa097d7874e65c8ac19d021933f44189f2
                                    • Instruction Fuzzy Hash: BA316B76201314BFEB118F50DC8AFEB3BA9EB0A716F044055FE089E291C6759C90CBA4
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _memcmp
                                    • String ID:
                                    • API String ID: 2931989736-0
                                    • Opcode ID: 252e04f149c8be5bfdd42ded95327a202b5cb28326f7fef45b61312b40e6e601
                                    • Instruction ID: 8e50aa856a7f87f65c8d821ebcbad64cd829a5eb0e8da2db773df015ada695c9
                                    • Opcode Fuzzy Hash: 252e04f149c8be5bfdd42ded95327a202b5cb28326f7fef45b61312b40e6e601
                                    • Instruction Fuzzy Hash: 8D21C571A41A69BFD3189521AEC2FFB335EAF60385F440034FD04AA582F770EE2581A5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: NULL Pointer assignment$Not an Object type
                                    • API String ID: 0-572801152
                                    • Opcode ID: a97a23f94d0f2c8a72c452d5bb10bfe448d57d39b27881611499482d1de4fd82
                                    • Instruction ID: 161d618f11385ace130256a57af93d08e949ca7e86c034dfb39ef538a4240264
                                    • Opcode Fuzzy Hash: a97a23f94d0f2c8a72c452d5bb10bfe448d57d39b27881611499482d1de4fd82
                                    • Instruction Fuzzy Hash: 7CD1B175A0060AAFDF14CFA8C881FAEB7B6BF48344F148169F915AB292D770DD45CB90
                                    APIs
                                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,001017FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 001015CE
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001017FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00101651
                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,001017FB,?,001017FB,00000000,00000000,?,00000000,?,?,?,?), ref: 001016E4
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001017FB,00000000,00000000,?,00000000,?,?,?,?), ref: 001016FB
                                      • Part of subcall function 000F3820: RtlAllocateHeap.NTDLL(00000000,?,00191444,?,000DFDF5,?,?,000CA976,00000010,00191440,000C13FC,?,000C13C6,?,000C1129), ref: 000F3852
                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,001017FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00101777
                                    • __freea.LIBCMT ref: 001017A2
                                    • __freea.LIBCMT ref: 001017AE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                    • String ID:
                                    • API String ID: 2829977744-0
                                    • Opcode ID: 90bfda338b1ba8e6eaa45d6083ba38386e030a2d4301080a893419cf339ac5a6
                                    • Instruction ID: f8be285625cee7443e95183db45a9465af8db08009a14df5df5d36f5144d9a75
                                    • Opcode Fuzzy Hash: 90bfda338b1ba8e6eaa45d6083ba38386e030a2d4301080a893419cf339ac5a6
                                    • Instruction Fuzzy Hash: 8391B872E00216BEDB248EB4CC81AFE7BB5AF49710F184659E941EB1C1DBB9DD40CB60
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit
                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                    • API String ID: 2610073882-625585964
                                    • Opcode ID: 84f851f65f9efa63b81d267aaac5d0a550f8b818b2d534e7133ff983db7eede3
                                    • Instruction ID: ec64ac9a27f8e10f4ca013c4686039c73c99d06a22362a9447157b3e7a5b21ed
                                    • Opcode Fuzzy Hash: 84f851f65f9efa63b81d267aaac5d0a550f8b818b2d534e7133ff983db7eede3
                                    • Instruction Fuzzy Hash: 9C91AC71A00219EFDF24CFA4C888FAEBBB8EF46715F108559F515AB291D7709942CFA0
                                    APIs
                                    • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0013125C
                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00131284
                                    • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 001312A8
                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001312D8
                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0013135F
                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001313C4
                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00131430
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                    • String ID:
                                    • API String ID: 2550207440-0
                                    • Opcode ID: 14a43b911742060f004119efc2b5f71a59fac6f946cf223c4cbfade05f84d617
                                    • Instruction ID: 6a86d7165b7cd48fc157f423cb8ae9082e80987363798c1e62f61fbfdbe9b6fc
                                    • Opcode Fuzzy Hash: 14a43b911742060f004119efc2b5f71a59fac6f946cf223c4cbfade05f84d617
                                    • Instruction Fuzzy Hash: 8991F472A00309AFEB00DFA4C894BFEB7B5FF44325F214029E911EB292D774A941CB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ObjectSelect$BeginCreatePath
                                    • String ID:
                                    • API String ID: 3225163088-0
                                    • Opcode ID: 58c9497992c06d74d0e1b9618d40dd3a3376b85374c1c8acdd62b8e597798724
                                    • Instruction ID: a0a61dfe4b63d4b5cff9ce9aed77343e10b9d2119dc72a63d0b34f243fd8ffac
                                    • Opcode Fuzzy Hash: 58c9497992c06d74d0e1b9618d40dd3a3376b85374c1c8acdd62b8e597798724
                                    • Instruction Fuzzy Hash: A9911571900219EFCB15CFA9C884AEEBBB8FF49320F144556E515B7295D374AA82CBA0
                                    APIs
                                    • VariantInit.OLEAUT32(?), ref: 0014396B
                                    • CharUpperBuffW.USER32(?,?), ref: 00143A7A
                                    • _wcslen.LIBCMT ref: 00143A8A
                                    • VariantClear.OLEAUT32(?), ref: 00143C1F
                                      • Part of subcall function 00130CDF: VariantInit.OLEAUT32(00000000), ref: 00130D1F
                                      • Part of subcall function 00130CDF: VariantCopy.OLEAUT32(?,?), ref: 00130D28
                                      • Part of subcall function 00130CDF: VariantClear.OLEAUT32(?), ref: 00130D34
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                    • API String ID: 4137639002-1221869570
                                    • Opcode ID: f456af0aee705fa2ae2d3a8dc1c60f39ab01473b57605f02f0a913f6329570ea
                                    • Instruction ID: a5eeabbf296c99287b7b7f102e4a67b3c506a2c4bbbdad69c5b7c0342d22ff80
                                    • Opcode Fuzzy Hash: f456af0aee705fa2ae2d3a8dc1c60f39ab01473b57605f02f0a913f6329570ea
                                    • Instruction Fuzzy Hash: C59149756083059FC704EF24C48596AB7E5FF89314F14892EF89A9B362DB30EE45CB92
                                    APIs
                                      • Part of subcall function 0012000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?,?,0012035E), ref: 0012002B
                                      • Part of subcall function 0012000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?), ref: 00120046
                                      • Part of subcall function 0012000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?), ref: 00120054
                                      • Part of subcall function 0012000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?), ref: 00120064
                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00144C51
                                    • _wcslen.LIBCMT ref: 00144D59
                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00144DCF
                                    • CoTaskMemFree.OLE32(?), ref: 00144DDA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                    • String ID: NULL Pointer assignment
                                    • API String ID: 614568839-2785691316
                                    • Opcode ID: 124258f990786b5006f0789320414b35a9d1bd627235b333dd6d02f767384380
                                    • Instruction ID: baa187ed3fcc7da20255eaa633f5c4631003cac80c956213d8170fe21f57eca3
                                    • Opcode Fuzzy Hash: 124258f990786b5006f0789320414b35a9d1bd627235b333dd6d02f767384380
                                    • Instruction Fuzzy Hash: 1D910471D0021DAFDF14DFA4D891EEEB7B9BF08314F108169E915BB291EB349A458FA0
                                    APIs
                                    • GetMenu.USER32(?), ref: 00152183
                                    • GetMenuItemCount.USER32(00000000), ref: 001521B5
                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 001521DD
                                    • _wcslen.LIBCMT ref: 00152213
                                    • GetMenuItemID.USER32(?,?), ref: 0015224D
                                    • GetSubMenu.USER32(?,?), ref: 0015225B
                                      • Part of subcall function 00123A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00123A57
                                      • Part of subcall function 00123A3D: GetCurrentThreadId.KERNEL32 ref: 00123A5E
                                      • Part of subcall function 00123A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001225B3), ref: 00123A65
                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001522E3
                                      • Part of subcall function 0012E97B: Sleep.KERNEL32 ref: 0012E9F3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                    • String ID:
                                    • API String ID: 4196846111-0
                                    • Opcode ID: ccd281196c01ec22c320213e0c0dd70b5bc77652af653b1fb1d5e80fa4fd37c4
                                    • Instruction ID: 936fcd5311247ee3161152232bd2fca4a8e1c0ca32aefea7a3efc42b8a3b7d82
                                    • Opcode Fuzzy Hash: ccd281196c01ec22c320213e0c0dd70b5bc77652af653b1fb1d5e80fa4fd37c4
                                    • Instruction Fuzzy Hash: E8718176A00205EFCB14DF64C885AAEB7F1EF49311F158469E826EF341D774EE458B90
                                    APIs
                                    • IsWindow.USER32(00F052C8), ref: 00157F37
                                    • IsWindowEnabled.USER32(00F052C8), ref: 00157F43
                                    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0015801E
                                    • SendMessageW.USER32(00F052C8,000000B0,?,?), ref: 00158051
                                    • IsDlgButtonChecked.USER32(?,?), ref: 00158089
                                    • GetWindowLongW.USER32(00F052C8,000000EC), ref: 001580AB
                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 001580C3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                    • String ID:
                                    • API String ID: 4072528602-0
                                    • Opcode ID: e53bc1c8cb7f769d0be4e42132c1565f2a2bfcbca801c2d996879b04ccea881e
                                    • Instruction ID: b8aee364c35e89f2ae94ea237e0ef80fcf8f08cd9c715499b7eeec704f03b503
                                    • Opcode Fuzzy Hash: e53bc1c8cb7f769d0be4e42132c1565f2a2bfcbca801c2d996879b04ccea881e
                                    • Instruction Fuzzy Hash: C7718D34608204EFEB21DF54D886FEA7BB5EF09302F14045AFD759B2A1CB31A988CB50
                                    APIs
                                    • GetParent.USER32(?), ref: 0012AEF9
                                    • GetKeyboardState.USER32(?), ref: 0012AF0E
                                    • SetKeyboardState.USER32(?), ref: 0012AF6F
                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 0012AF9D
                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 0012AFBC
                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 0012AFFD
                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0012B020
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessagePost$KeyboardState$Parent
                                    • String ID:
                                    • API String ID: 87235514-0
                                    • Opcode ID: 044b760c130b1c9da1712c7539e926b8e23d7212e9389633e10eba8a27f3057f
                                    • Instruction ID: 668bd037bc214fadaef956dffbe724aedf795881648c6070fc9e3d064966e660
                                    • Opcode Fuzzy Hash: 044b760c130b1c9da1712c7539e926b8e23d7212e9389633e10eba8a27f3057f
                                    • Instruction Fuzzy Hash: B851D3A06087E53EFB3742349D45BBABFE95F06304F088589F2E9958C2D398ACE4D751
                                    APIs
                                    • GetParent.USER32(00000000), ref: 0012AD19
                                    • GetKeyboardState.USER32(?), ref: 0012AD2E
                                    • SetKeyboardState.USER32(?), ref: 0012AD8F
                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0012ADBB
                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0012ADD8
                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0012AE17
                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0012AE38
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessagePost$KeyboardState$Parent
                                    • String ID:
                                    • API String ID: 87235514-0
                                    • Opcode ID: 46ebf31b50f712d5d1d69f6fd54b83ef699b6b92f14308f65cb557dcfc7f527c
                                    • Instruction ID: 2690a2b1d71472dd989c9426b568d13c8089910add7ab7ee1289065eb8ffeb28
                                    • Opcode Fuzzy Hash: 46ebf31b50f712d5d1d69f6fd54b83ef699b6b92f14308f65cb557dcfc7f527c
                                    • Instruction Fuzzy Hash: 865116A05087E53EFB3683749C95B7ABEA85F05300F488488E1D5468C3D394ECA4D352
                                    APIs
                                    • GetConsoleCP.KERNEL32(00103CD6,?,?,?,?,?,?,?,?,000F5BA3,?,?,00103CD6,?,?), ref: 000F5470
                                    • __fassign.LIBCMT ref: 000F54EB
                                    • __fassign.LIBCMT ref: 000F5506
                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00103CD6,00000005,00000000,00000000), ref: 000F552C
                                    • WriteFile.KERNEL32(?,00103CD6,00000000,000F5BA3,00000000,?,?,?,?,?,?,?,?,?,000F5BA3,?), ref: 000F554B
                                    • WriteFile.KERNEL32(?,?,00000001,000F5BA3,00000000,?,?,?,?,?,?,?,?,?,000F5BA3,?), ref: 000F5584
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                    • String ID:
                                    • API String ID: 1324828854-0
                                    • Opcode ID: 78e7a72796f5a7db176ed3f702ec89f072a77de78797331b14a0c5eafc5c19a8
                                    • Instruction ID: 3048e01e5ca1c9f96a3417db456f294170786604d621d840916531a00690361f
                                    • Opcode Fuzzy Hash: 78e7a72796f5a7db176ed3f702ec89f072a77de78797331b14a0c5eafc5c19a8
                                    • Instruction Fuzzy Hash: DE51D171A00B099FDB11CFA8DC95AEEBBF9EF08701F14411AF655E7691D730AA41CBA0
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 000E2D4B
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 000E2D53
                                    • _ValidateLocalCookies.LIBCMT ref: 000E2DE1
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 000E2E0C
                                    • _ValidateLocalCookies.LIBCMT ref: 000E2E61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: 1b96fd6f2f419f7aa969869e582ae4f19208ffd7e4cd15e9d371f172b1570e76
                                    • Instruction ID: af7009df11dc28df686a8fba2a795a7f3e8c3dd7d002afd457df0cd797841db5
                                    • Opcode Fuzzy Hash: 1b96fd6f2f419f7aa969869e582ae4f19208ffd7e4cd15e9d371f172b1570e76
                                    • Instruction Fuzzy Hash: 6341A035A04289AFCF10DF6ACC45ADEBBB9BF44324F148155E914BB392D771AA41CBD0
                                    APIs
                                      • Part of subcall function 0014304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0014307A
                                      • Part of subcall function 0014304E: _wcslen.LIBCMT ref: 0014309B
                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00141112
                                    • WSAGetLastError.WSOCK32 ref: 00141121
                                    • WSAGetLastError.WSOCK32 ref: 001411C9
                                    • closesocket.WSOCK32(00000000), ref: 001411F9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                    • String ID:
                                    • API String ID: 2675159561-0
                                    • Opcode ID: 5eb964c868e7ef4b44d24d99f227c9f7ccecbd4d4730c02141b6f6391b0d1d44
                                    • Instruction ID: 6c596987b9b1539883a633ba33ec0d8346ffacdf1924ff8921597c5026ee1ae4
                                    • Opcode Fuzzy Hash: 5eb964c868e7ef4b44d24d99f227c9f7ccecbd4d4730c02141b6f6391b0d1d44
                                    • Instruction Fuzzy Hash: E741D431600604AFDB109F24C885BA9BBE9EF45765F148069FD199F2A2D770AD81CBE1
                                    APIs
                                      • Part of subcall function 0012DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0012CF22,?), ref: 0012DDFD
                                      • Part of subcall function 0012DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0012CF22,?), ref: 0012DE16
                                    • lstrcmpiW.KERNEL32(?,?), ref: 0012CF45
                                    • MoveFileW.KERNEL32(?,?), ref: 0012CF7F
                                    • _wcslen.LIBCMT ref: 0012D005
                                    • _wcslen.LIBCMT ref: 0012D01B
                                    • SHFileOperationW.SHELL32(?), ref: 0012D061
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                    • String ID: \*.*
                                    • API String ID: 3164238972-1173974218
                                    • Opcode ID: fc42ce4e6b313355086d0f5a2bf6e6831864c47a47f3ee4e582be2f2f37712d6
                                    • Instruction ID: a9dc0f05ac89c7189675b353ac249182715ddd9c877ba556f4baff35c5a5ac70
                                    • Opcode Fuzzy Hash: fc42ce4e6b313355086d0f5a2bf6e6831864c47a47f3ee4e582be2f2f37712d6
                                    • Instruction Fuzzy Hash: 154139719452299FDF12EFA4EA81EDD77F9AF18340F1000E6E645EB142EB34A794CB50
                                    APIs
                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00152E1C
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00152E4F
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00152E84
                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00152EB6
                                    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00152EE0
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00152EF1
                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00152F0B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: LongWindow$MessageSend
                                    • String ID:
                                    • API String ID: 2178440468-0
                                    • Opcode ID: 6f7c54423381fd2a4aa3785af95d3c23092b04b54e0cfdb9fcddc9cb364c9ad1
                                    • Instruction ID: cb3d0e8f9bf0489908b66315e480422ab10c483ba5b40510b4002791d308e958
                                    • Opcode Fuzzy Hash: 6f7c54423381fd2a4aa3785af95d3c23092b04b54e0cfdb9fcddc9cb364c9ad1
                                    • Instruction Fuzzy Hash: F3310332604251EFDB21CF58EC86FA537E1EB9A716F150165F9208F6B1CB71A884DB41
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00127769
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0012778F
                                    • SysAllocString.OLEAUT32(00000000), ref: 00127792
                                    • SysAllocString.OLEAUT32(?), ref: 001277B0
                                    • SysFreeString.OLEAUT32(?), ref: 001277B9
                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 001277DE
                                    • SysAllocString.OLEAUT32(?), ref: 001277EC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                    • String ID:
                                    • API String ID: 3761583154-0
                                    • Opcode ID: a9ceb52acd6be228b9612b8bba18939dc3f41acb078202d126b6cb2024af2239
                                    • Instruction ID: 4ddc2cfd5814d5ee38cedaf068ddf658eb88066009213ccb1234a5616badc4ba
                                    • Opcode Fuzzy Hash: a9ceb52acd6be228b9612b8bba18939dc3f41acb078202d126b6cb2024af2239
                                    • Instruction Fuzzy Hash: 37219076604329AFDB10EFA8DC88CBB77ACEB097647048425FA15DB291D770DC8187A0
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00127842
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00127868
                                    • SysAllocString.OLEAUT32(00000000), ref: 0012786B
                                    • SysAllocString.OLEAUT32 ref: 0012788C
                                    • SysFreeString.OLEAUT32 ref: 00127895
                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 001278AF
                                    • SysAllocString.OLEAUT32(?), ref: 001278BD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                    • String ID:
                                    • API String ID: 3761583154-0
                                    • Opcode ID: 96da6cadb5024f34d3d727449196fd08f7ea172396cc67941a56940c2737b9f3
                                    • Instruction ID: f2ac9fa84040c262c73329a76ec2b18a8b094b4640c963bbdcdd0ddd77bc8c56
                                    • Opcode Fuzzy Hash: 96da6cadb5024f34d3d727449196fd08f7ea172396cc67941a56940c2737b9f3
                                    • Instruction Fuzzy Hash: 17215E35608324EF9B149FA9EC88DBB77ECEB097607108125B915CB2A1EB70DC91CB64
                                    APIs
                                    • GetStdHandle.KERNEL32(0000000C), ref: 001304F2
                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0013052E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CreateHandlePipe
                                    • String ID: nul
                                    • API String ID: 1424370930-2873401336
                                    • Opcode ID: 26faac6b26199f791f29c9d8a9e43665b73130be0b16de393a48e719232af554
                                    • Instruction ID: a29fdd237d1c634576f10ba25353e571f5e09643214323a0854b3d1db24c47bf
                                    • Opcode Fuzzy Hash: 26faac6b26199f791f29c9d8a9e43665b73130be0b16de393a48e719232af554
                                    • Instruction Fuzzy Hash: A3216975600305EFDB219F29DC54A9A7BE4BF49724F204A19F8A1E72E0E7709980CF60
                                    APIs
                                    • GetStdHandle.KERNEL32(000000F6), ref: 001305C6
                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00130601
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CreateHandlePipe
                                    • String ID: nul
                                    • API String ID: 1424370930-2873401336
                                    • Opcode ID: 229484b413e76c7b237600f3efc7b1344ec7a4393b7a41b3b59423d1f7bb0d51
                                    • Instruction ID: 155ae74feca98e453800ce45ff7101bff5b3f2ddf1ec756d9bc72578fef147db
                                    • Opcode Fuzzy Hash: 229484b413e76c7b237600f3efc7b1344ec7a4393b7a41b3b59423d1f7bb0d51
                                    • Instruction Fuzzy Hash: 8E21B6B5500305DFDB219F69CC55A9A77E8BF99B30F200B19F8A1E72E4E77099A0CB50
                                    APIs
                                      • Part of subcall function 000C600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000C604C
                                      • Part of subcall function 000C600E: GetStockObject.GDI32(00000011), ref: 000C6060
                                      • Part of subcall function 000C600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 000C606A
                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00154112
                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0015411F
                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0015412A
                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00154139
                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00154145
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$CreateObjectStockWindow
                                    • String ID: Msctls_Progress32
                                    • API String ID: 1025951953-3636473452
                                    • Opcode ID: 44b9338130ac7a3dad3041d40d04b5be3ff0d407451e54c7182dbd6684c95f1d
                                    • Instruction ID: 7fa1a342841da37fea852ef565ae46693d5c9ecf4c18ad3c6412427958ec7553
                                    • Opcode Fuzzy Hash: 44b9338130ac7a3dad3041d40d04b5be3ff0d407451e54c7182dbd6684c95f1d
                                    • Instruction Fuzzy Hash: 8711B2B2140219BFEF119F64CC85EE77F9DEF18798F114111BA28A6190C772DC61DBA4
                                    APIs
                                      • Part of subcall function 000FD7A3: _free.LIBCMT ref: 000FD7CC
                                    • _free.LIBCMT ref: 000FD82D
                                      • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                      • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                    • _free.LIBCMT ref: 000FD838
                                    • _free.LIBCMT ref: 000FD843
                                    • _free.LIBCMT ref: 000FD897
                                    • _free.LIBCMT ref: 000FD8A2
                                    • _free.LIBCMT ref: 000FD8AD
                                    • _free.LIBCMT ref: 000FD8B8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                    • Instruction ID: cd737ba26dfaf364654ed884dac576c2ddce0bbd380adf366fd1631b6ff96c75
                                    • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                    • Instruction Fuzzy Hash: 0B11247158470CAAD521BFB0CC47FEF7BDD6F04700F404816B399AA8A3EA69B5056650
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0012DA74
                                    • LoadStringW.USER32(00000000), ref: 0012DA7B
                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0012DA91
                                    • LoadStringW.USER32(00000000), ref: 0012DA98
                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0012DADC
                                    Strings
                                    • %s (%d) : ==> %s: %s %s, xrefs: 0012DAB9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: HandleLoadModuleString$Message
                                    • String ID: %s (%d) : ==> %s: %s %s
                                    • API String ID: 4072794657-3128320259
                                    • Opcode ID: acc24c99aee3ace133152996904fa33267099c1f2d02d06dce9d6a52beb15937
                                    • Instruction ID: 78eb0b45c965ffbe37c210bee044b665fd8401d8b5230c93d391a7c72cebb541
                                    • Opcode Fuzzy Hash: acc24c99aee3ace133152996904fa33267099c1f2d02d06dce9d6a52beb15937
                                    • Instruction Fuzzy Hash: 170162F6500318BFE710ABA4ED89EEB326CE708306F404491B706E6041EA749E848FB4
                                    APIs
                                    • InterlockedExchange.KERNEL32(00F0EFD8,00F0EFD8), ref: 0013097B
                                    • EnterCriticalSection.KERNEL32(00F0EFB8,00000000), ref: 0013098D
                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0013099B
                                    • WaitForSingleObject.KERNEL32(?,000003E8), ref: 001309A9
                                    • CloseHandle.KERNEL32(?), ref: 001309B8
                                    • InterlockedExchange.KERNEL32(00F0EFD8,000001F6), ref: 001309C8
                                    • LeaveCriticalSection.KERNEL32(00F0EFB8), ref: 001309CF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                    • String ID:
                                    • API String ID: 3495660284-0
                                    • Opcode ID: 3983d6e2fac9bc02f441799608a172fcc5c024d38e4ee20712033a7c805944e4
                                    • Instruction ID: 43c5c5f7abc80535bf27e359d93da0cd1bce38b4868b5938310de4cf3721ecae
                                    • Opcode Fuzzy Hash: 3983d6e2fac9bc02f441799608a172fcc5c024d38e4ee20712033a7c805944e4
                                    • Instruction Fuzzy Hash: 2AF0CD31442B12EFD7525F94EE89BDA7A65FF05706F401015F10258CA1CB7594A5CFD0
                                    APIs
                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00141DC0
                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00141DE1
                                    • WSAGetLastError.WSOCK32 ref: 00141DF2
                                    • htons.WSOCK32(?,?,?,?,?), ref: 00141EDB
                                    • inet_ntoa.WSOCK32(?), ref: 00141E8C
                                      • Part of subcall function 001239E8: _strlen.LIBCMT ref: 001239F2
                                      • Part of subcall function 00143224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0013EC0C), ref: 00143240
                                    • _strlen.LIBCMT ref: 00141F35
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                    • String ID:
                                    • API String ID: 3203458085-0
                                    • Opcode ID: 1ec7b7faf219be1ea753aae37fc24fa046dd222e13a755f78ff2c2b61b1a8120
                                    • Instruction ID: cbd6dc7f555b5a915e67b9d0b6c82afc9ab13416b652a2b1cd94d2045a0abd26
                                    • Opcode Fuzzy Hash: 1ec7b7faf219be1ea753aae37fc24fa046dd222e13a755f78ff2c2b61b1a8120
                                    • Instruction Fuzzy Hash: CFB1DD71604340AFC324DF24C895F6A7BA5AF84318F94895CF45A5B2E3DB31ED8ACB91
                                    APIs
                                    • GetClientRect.USER32(?,?), ref: 000C5D30
                                    • GetWindowRect.USER32(?,?), ref: 000C5D71
                                    • ScreenToClient.USER32(?,?), ref: 000C5D99
                                    • GetClientRect.USER32(?,?), ref: 000C5ED7
                                    • GetWindowRect.USER32(?,?), ref: 000C5EF8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Rect$Client$Window$Screen
                                    • String ID:
                                    • API String ID: 1296646539-0
                                    • Opcode ID: bf33e4a210cfdc4ee52079a21212455f98a967e19b1b1d5bd6d4ee396daa081c
                                    • Instruction ID: e54b078a6e1da10e557f958f70b922ac0471bb1e978b059a782feb0031d4abfa
                                    • Opcode Fuzzy Hash: bf33e4a210cfdc4ee52079a21212455f98a967e19b1b1d5bd6d4ee396daa081c
                                    • Instruction Fuzzy Hash: 7BB14C78A0074ADBDB14CFA9C880BEEB7F1BF58311F14841EE999D7250D730AA91DB54
                                    APIs
                                    • __allrem.LIBCMT ref: 000F00BA
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F00D6
                                    • __allrem.LIBCMT ref: 000F00ED
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F010B
                                    • __allrem.LIBCMT ref: 000F0122
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F0140
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                    • String ID:
                                    • API String ID: 1992179935-0
                                    • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                    • Instruction ID: 867f9c68ce14ac78fe5e4b8ed0ad9f3a007cfcac25d1ab3ecb33374e853bd332
                                    • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                    • Instruction Fuzzy Hash: 1C811972600B0AAFE7209F69CC41BBB73E9AF41724F24453EF651D7A82EB75D9009B50
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,000E82D9,000E82D9,?,?,?,000F644F,00000001,00000001,8BE85006), ref: 000F6258
                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,000F644F,00000001,00000001,8BE85006,?,?,?), ref: 000F62DE
                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 000F63D8
                                    • __freea.LIBCMT ref: 000F63E5
                                      • Part of subcall function 000F3820: RtlAllocateHeap.NTDLL(00000000,?,00191444,?,000DFDF5,?,?,000CA976,00000010,00191440,000C13FC,?,000C13C6,?,000C1129), ref: 000F3852
                                    • __freea.LIBCMT ref: 000F63EE
                                    • __freea.LIBCMT ref: 000F6413
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                    • String ID:
                                    • API String ID: 1414292761-0
                                    • Opcode ID: f28c1c16d1ff3ba0e72b006e36294361971dc75b40992cb30a268b959ef837d3
                                    • Instruction ID: 468905e7c5e34dc74cddaeb9976564366b4f5e20deeaf729453268d612ed4288
                                    • Opcode Fuzzy Hash: f28c1c16d1ff3ba0e72b006e36294361971dc75b40992cb30a268b959ef837d3
                                    • Instruction Fuzzy Hash: 76512172A0021AAFEB258F64CC81EBF77AAEF50750F144228FE05D7941DB36DD44E6A0
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 0014C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0014B6AE,?,?), ref: 0014C9B5
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014C9F1
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA68
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA9E
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014BCCA
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0014BD25
                                    • RegCloseKey.ADVAPI32(00000000), ref: 0014BD6A
                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0014BD99
                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0014BDF3
                                    • RegCloseKey.ADVAPI32(?), ref: 0014BDFF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                    • String ID:
                                    • API String ID: 1120388591-0
                                    • Opcode ID: c3a0e11e302a4a2cd07607bf71ea4befbf0cbfb6727f88e7a9aa68861d8b5503
                                    • Instruction ID: 93b73353a5ad5b78578e5b75113ca385663f30635170631e707224cc9d04f98f
                                    • Opcode Fuzzy Hash: c3a0e11e302a4a2cd07607bf71ea4befbf0cbfb6727f88e7a9aa68861d8b5503
                                    • Instruction Fuzzy Hash: 6E815870608241AFD714DF64C8D5E6ABBE5FF84308F14899CF4598B2A2DB32ED45CB92
                                    APIs
                                    • VariantInit.OLEAUT32(00000035), ref: 0011F7B9
                                    • SysAllocString.OLEAUT32(00000001), ref: 0011F860
                                    • VariantCopy.OLEAUT32(0011FA64,00000000), ref: 0011F889
                                    • VariantClear.OLEAUT32(0011FA64), ref: 0011F8AD
                                    • VariantCopy.OLEAUT32(0011FA64,00000000), ref: 0011F8B1
                                    • VariantClear.OLEAUT32(?), ref: 0011F8BB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Variant$ClearCopy$AllocInitString
                                    • String ID:
                                    • API String ID: 3859894641-0
                                    • Opcode ID: 50302d5a4031289d639f990a10ad0c8f2548da661ab531e5428f998f31ebea0b
                                    • Instruction ID: 2992341bb49fbbb7f6dca69eea46391a9ace7a0f05503d457158162ceb60f2be
                                    • Opcode Fuzzy Hash: 50302d5a4031289d639f990a10ad0c8f2548da661ab531e5428f998f31ebea0b
                                    • Instruction Fuzzy Hash: 7251D531500314BACF18AF65D895BA9B3A5EF55314F24847FF806DF292DB708C85CBA6
                                    APIs
                                      • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                      • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 001394E5
                                    • _wcslen.LIBCMT ref: 00139506
                                    • _wcslen.LIBCMT ref: 0013952D
                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00139585
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$FileName$OpenSave
                                    • String ID: X
                                    • API String ID: 83654149-3081909835
                                    • Opcode ID: cb8cbbf4afebd566d84e5c118da46beb16cc7e7f53ce13865f75d8cc91d81e46
                                    • Instruction ID: 0547a395e86a7e0e2b814b578077bf1b9d020eb49b106e16dfb5cd973466fecb
                                    • Opcode Fuzzy Hash: cb8cbbf4afebd566d84e5c118da46beb16cc7e7f53ce13865f75d8cc91d81e46
                                    • Instruction Fuzzy Hash: E3E16B716083409FD724EF24C885BAEB7E4BF85314F04896DF8899B2A2DB71DD45CB92
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    • BeginPaint.USER32(?,?,?), ref: 000D9241
                                    • GetWindowRect.USER32(?,?), ref: 000D92A5
                                    • ScreenToClient.USER32(?,?), ref: 000D92C2
                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 000D92D3
                                    • EndPaint.USER32(?,?,?,?,?), ref: 000D9321
                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 001171EA
                                      • Part of subcall function 000D9339: BeginPath.GDI32(00000000), ref: 000D9357
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                    • String ID:
                                    • API String ID: 3050599898-0
                                    • Opcode ID: c0dde96bb26a5ab6da80b49bb6d34a42260cc9956b43bde0c08b2060d6a9af77
                                    • Instruction ID: fe58bf18ef468a28c720816b4975a0ba12778f7b0172ea05f48cfa81f726611f
                                    • Opcode Fuzzy Hash: c0dde96bb26a5ab6da80b49bb6d34a42260cc9956b43bde0c08b2060d6a9af77
                                    • Instruction Fuzzy Hash: 75419A70108301EFD721DF24CC84FBA7BB8EB59725F14062AF9A59B2E2C7319985DB61
                                    APIs
                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0013080C
                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00130847
                                    • EnterCriticalSection.KERNEL32(?), ref: 00130863
                                    • LeaveCriticalSection.KERNEL32(?), ref: 001308DC
                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 001308F3
                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00130921
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                    • String ID:
                                    • API String ID: 3368777196-0
                                    • Opcode ID: 92342c9a6e31d67700d15ffc74a30de251cb6ad7cd31346c04e99fbcc518d592
                                    • Instruction ID: 9b8bf10acc6a2c636bea4ccf6c89fe996cad8873df4d5f84b07060516f36b075
                                    • Opcode Fuzzy Hash: 92342c9a6e31d67700d15ffc74a30de251cb6ad7cd31346c04e99fbcc518d592
                                    • Instruction Fuzzy Hash: 59415871900305EFDF159F54DC85AAA77B8FF08300F1480A5E905AA29BDB70DEA0DBA0
                                    APIs
                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0011F3AB,00000000,?,?,00000000,?,0011682C,00000004,00000000,00000000), ref: 0015824C
                                    • EnableWindow.USER32(?,00000000), ref: 00158272
                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 001582D1
                                    • ShowWindow.USER32(?,00000004), ref: 001582E5
                                    • EnableWindow.USER32(?,00000001), ref: 0015830B
                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0015832F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Show$Enable$MessageSend
                                    • String ID:
                                    • API String ID: 642888154-0
                                    • Opcode ID: 6f9441cb30a9e3c2db0e3ba51e875167f790f32ca589b125dd6ea5847cdf9bc6
                                    • Instruction ID: 978aa05f20b3c989f60731ed994b4721ac9b9a1b68464a62cccaf19999193766
                                    • Opcode Fuzzy Hash: 6f9441cb30a9e3c2db0e3ba51e875167f790f32ca589b125dd6ea5847cdf9bc6
                                    • Instruction Fuzzy Hash: 2A41B430601745EFDF12DF15C899BE47BF1FB0A716F184169E9289F662CB31A889CB50
                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 00124C95
                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00124CB2
                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00124CEA
                                    • _wcslen.LIBCMT ref: 00124D08
                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00124D10
                                    • _wcsstr.LIBVCRUNTIME ref: 00124D1A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                    • String ID:
                                    • API String ID: 72514467-0
                                    • Opcode ID: d814d005ecc4b3ea65ec736bfc73c060f665b0b504fd07b4eaecc3f610fc5d7f
                                    • Instruction ID: 8dbd6ce5c9765f034e19d983246c83c806fb076ffc363d4126ffb37a6d0fba78
                                    • Opcode Fuzzy Hash: d814d005ecc4b3ea65ec736bfc73c060f665b0b504fd07b4eaecc3f610fc5d7f
                                    • Instruction Fuzzy Hash: 4C210472204325BFEB155B79AC09EBB7B9CDF55750F10802AF809DA292EB61CD5086A0
                                    APIs
                                      • Part of subcall function 000C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000C3A97,?,?,000C2E7F,?,?,?,00000000), ref: 000C3AC2
                                    • _wcslen.LIBCMT ref: 0013587B
                                    • CoInitialize.OLE32(00000000), ref: 00135995
                                    • CoCreateInstance.OLE32(0015FCF8,00000000,00000001,0015FB68,?), ref: 001359AE
                                    • CoUninitialize.OLE32 ref: 001359CC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                    • String ID: .lnk
                                    • API String ID: 3172280962-24824748
                                    • Opcode ID: 26d1db6123927592a605cc65fe1933aff63117c8091be1591dc04d2545d294fd
                                    • Instruction ID: d046deeca5c90afedf59c3c2adf6e577c98fc09c0d523a38f3b7b8c8d7ec895b
                                    • Opcode Fuzzy Hash: 26d1db6123927592a605cc65fe1933aff63117c8091be1591dc04d2545d294fd
                                    • Instruction Fuzzy Hash: 42D13071608601DFC714DF24C484A6EBBE6EF89B14F14885DF88A9B362DB31ED45CB92
                                    APIs
                                      • Part of subcall function 00120FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00120FCA
                                      • Part of subcall function 00120FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00120FD6
                                      • Part of subcall function 00120FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00120FE5
                                      • Part of subcall function 00120FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00120FEC
                                      • Part of subcall function 00120FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00121002
                                    • GetLengthSid.ADVAPI32(?,00000000,00121335), ref: 001217AE
                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001217BA
                                    • HeapAlloc.KERNEL32(00000000), ref: 001217C1
                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 001217DA
                                    • GetProcessHeap.KERNEL32(00000000,00000000,00121335), ref: 001217EE
                                    • HeapFree.KERNEL32(00000000), ref: 001217F5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                    • String ID:
                                    • API String ID: 3008561057-0
                                    • Opcode ID: c04f5c9b13312f08b4d3a402fbbac83fe7326c350e97db0d274652ca4fabc9cc
                                    • Instruction ID: 0c5800aaaefb06f968b2cb46d916b8a7412ab1525de1c3831444a0ea47b257d5
                                    • Opcode Fuzzy Hash: c04f5c9b13312f08b4d3a402fbbac83fe7326c350e97db0d274652ca4fabc9cc
                                    • Instruction Fuzzy Hash: 8611BE32500715FFDB10DFA4EC89BAF7BA9EB95356F104018F4419B211D735A990CBA0
                                    APIs
                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 001214FF
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00121506
                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00121515
                                    • CloseHandle.KERNEL32(00000004), ref: 00121520
                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0012154F
                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00121563
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                    • String ID:
                                    • API String ID: 1413079979-0
                                    • Opcode ID: 5f6227ca41c7a357fd9a5bced16900bdc6ac5e9e21e80d740f867c981fedea63
                                    • Instruction ID: cb742495d1963dfb0d85c21db20141a912d1e92036ecb8521de50a4011a17f11
                                    • Opcode Fuzzy Hash: 5f6227ca41c7a357fd9a5bced16900bdc6ac5e9e21e80d740f867c981fedea63
                                    • Instruction Fuzzy Hash: EA11447250024DFFDB11CFA8ED49BDA7BA9EB48705F044064FA05A60A0C3718EA0DBA0
                                    APIs
                                    • GetLastError.KERNEL32(?,?,000E3379,000E2FE5), ref: 000E3390
                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 000E339E
                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 000E33B7
                                    • SetLastError.KERNEL32(00000000,?,000E3379,000E2FE5), ref: 000E3409
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorLastValue___vcrt_
                                    • String ID:
                                    • API String ID: 3852720340-0
                                    • Opcode ID: fdab1365e0b18dee21fd13d08b7fff91739df75afe57718166061e9bbac1749b
                                    • Instruction ID: 0bc8454ad8873f3bae8e458ed4395308fd4058566c977cf5ac6c9872a72d0b1f
                                    • Opcode Fuzzy Hash: fdab1365e0b18dee21fd13d08b7fff91739df75afe57718166061e9bbac1749b
                                    • Instruction Fuzzy Hash: 8E016832208351BFA76627777C8D9AA2FD4EB003B9330422AF110B31F2EF210F4156A0
                                    APIs
                                    • GetLastError.KERNEL32(?,?,000F5686,00103CD6,?,00000000,?,000F5B6A,?,?,?,?,?,000EE6D1,?,00188A48), ref: 000F2D78
                                    • _free.LIBCMT ref: 000F2DAB
                                    • _free.LIBCMT ref: 000F2DD3
                                    • SetLastError.KERNEL32(00000000,?,?,?,?,000EE6D1,?,00188A48,00000010,000C4F4A,?,?,00000000,00103CD6), ref: 000F2DE0
                                    • SetLastError.KERNEL32(00000000,?,?,?,?,000EE6D1,?,00188A48,00000010,000C4F4A,?,?,00000000,00103CD6), ref: 000F2DEC
                                    • _abort.LIBCMT ref: 000F2DF2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorLast$_free$_abort
                                    • String ID:
                                    • API String ID: 3160817290-0
                                    • Opcode ID: 77286cd9d1b577f944186a51604a91296439f455624b0e21736702f61285148c
                                    • Instruction ID: 150b754d0c2b868b899910d3c637a7b2aa0368bdd56779b048cdda8f8ad00414
                                    • Opcode Fuzzy Hash: 77286cd9d1b577f944186a51604a91296439f455624b0e21736702f61285148c
                                    • Instruction Fuzzy Hash: ECF02831545B0C6BC2A22734BC0AEBF2599BFC17B1F210019FB2496DE3EF34894171A0
                                    APIs
                                      • Part of subcall function 000D9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000D9693
                                      • Part of subcall function 000D9639: SelectObject.GDI32(?,00000000), ref: 000D96A2
                                      • Part of subcall function 000D9639: BeginPath.GDI32(?), ref: 000D96B9
                                      • Part of subcall function 000D9639: SelectObject.GDI32(?,00000000), ref: 000D96E2
                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00158A4E
                                    • LineTo.GDI32(?,00000003,00000000), ref: 00158A62
                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00158A70
                                    • LineTo.GDI32(?,00000000,00000003), ref: 00158A80
                                    • EndPath.GDI32(?), ref: 00158A90
                                    • StrokePath.GDI32(?), ref: 00158AA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                    • String ID:
                                    • API String ID: 43455801-0
                                    • Opcode ID: 0a436127f96b2605cd492b6ea63efb7475c20d536123c269ef515d3d8348eb01
                                    • Instruction ID: 00fc4ea27f3dd2740896ec9ff000e6c8f6033f9ecdf4bc16844f7ba07392d7fb
                                    • Opcode Fuzzy Hash: 0a436127f96b2605cd492b6ea63efb7475c20d536123c269ef515d3d8348eb01
                                    • Instruction Fuzzy Hash: 4B11DB7600024DFFDF129F94DC88EAA7F6DEB08395F048012BA199A5A1C7729D95DFA0
                                    APIs
                                    • GetDC.USER32(00000000), ref: 00125218
                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00125229
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00125230
                                    • ReleaseDC.USER32(00000000,00000000), ref: 00125238
                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0012524F
                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00125261
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CapsDevice$Release
                                    • String ID:
                                    • API String ID: 1035833867-0
                                    • Opcode ID: 0e3d60ab88a7e83b1d90d89dae25d6986ba8201ffe02f3d95925257107060d25
                                    • Instruction ID: 50f7f041a162a1b02f2db3579a4a5a281bcd9e85fdfde33cb3c28032558eb89b
                                    • Opcode Fuzzy Hash: 0e3d60ab88a7e83b1d90d89dae25d6986ba8201ffe02f3d95925257107060d25
                                    • Instruction Fuzzy Hash: 7C018F75A00718FFEB109FA59C49A4EBFB8EB48752F044065FA04AB281D6709900CBA0
                                    APIs
                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 000C1BF4
                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 000C1BFC
                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 000C1C07
                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 000C1C12
                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 000C1C1A
                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 000C1C22
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Virtual
                                    • String ID:
                                    • API String ID: 4278518827-0
                                    • Opcode ID: 8899023dfc6eaa812f40f6bc09d7b9cbb1a888a27505193debebbfaaf8cbc333
                                    • Instruction ID: 24a0b788c56c8f607e7fe5927ad736ab38ce076df7499988714f3e419d6a958d
                                    • Opcode Fuzzy Hash: 8899023dfc6eaa812f40f6bc09d7b9cbb1a888a27505193debebbfaaf8cbc333
                                    • Instruction Fuzzy Hash: C1016CB0902759BDE3008F5A8C85B52FFA8FF19354F00411B915C4BA41C7F5A864CBE5
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0012EB30
                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0012EB46
                                    • GetWindowThreadProcessId.USER32(?,?), ref: 0012EB55
                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0012EB64
                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0012EB6E
                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0012EB75
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                    • String ID:
                                    • API String ID: 839392675-0
                                    • Opcode ID: 939b7ab0e6cbf075eba6949563a99f8706e189720721c2195e6bf9c0ca4d04fb
                                    • Instruction ID: a4de9333d34ae4e3cf74faf7a81af609adaad912c65964c5bf23abb522290253
                                    • Opcode Fuzzy Hash: 939b7ab0e6cbf075eba6949563a99f8706e189720721c2195e6bf9c0ca4d04fb
                                    • Instruction Fuzzy Hash: 0BF01772240758FFE6215B629C0EEEB3A7CEBCAB12F000158F601D9591A7A05A818AF5
                                    APIs
                                    • GetClientRect.USER32(?), ref: 00117452
                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 00117469
                                    • GetWindowDC.USER32(?), ref: 00117475
                                    • GetPixel.GDI32(00000000,?,?), ref: 00117484
                                    • ReleaseDC.USER32(?,00000000), ref: 00117496
                                    • GetSysColor.USER32(00000005), ref: 001174B0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                    • String ID:
                                    • API String ID: 272304278-0
                                    • Opcode ID: 5d39f3a99d55e5a3c6ec3837a32640e4e9e2f99a41f5c0d112b079de120a3476
                                    • Instruction ID: 2e66e3ffda473d64fcd95e5628be9af3fe26f58d6b972957a901cd93f3a7c0c2
                                    • Opcode Fuzzy Hash: 5d39f3a99d55e5a3c6ec3837a32640e4e9e2f99a41f5c0d112b079de120a3476
                                    • Instruction Fuzzy Hash: 4C014B31500315FFEB515FA4DC48BEABBB6FB04322F510164F916A7AA1CB311E91EB90
                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0012187F
                                    • UnloadUserProfile.USERENV(?,?), ref: 0012188B
                                    • CloseHandle.KERNEL32(?), ref: 00121894
                                    • CloseHandle.KERNEL32(?), ref: 0012189C
                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 001218A5
                                    • HeapFree.KERNEL32(00000000), ref: 001218AC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                    • String ID:
                                    • API String ID: 146765662-0
                                    • Opcode ID: 5d9e38e811384c4ddc0bc9332aaac19e9c45f74fcf74aa6c2fe3ab5aa437985d
                                    • Instruction ID: bc5fb2245f94799f2bddfb0cb5e538be1959224f7a1db5e28e55a6d2d2e6ffe0
                                    • Opcode Fuzzy Hash: 5d9e38e811384c4ddc0bc9332aaac19e9c45f74fcf74aa6c2fe3ab5aa437985d
                                    • Instruction Fuzzy Hash: 90E05276104705FFDA015FA5ED0C94ABB69FB49B22B508625F22689871CB32A4A1DB90
                                    APIs
                                      • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0012C6EE
                                    • _wcslen.LIBCMT ref: 0012C735
                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0012C79C
                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0012C7CA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Info_wcslen$Default
                                    • String ID: 0
                                    • API String ID: 1227352736-4108050209
                                    • Opcode ID: 169d4354c8de19e88134d40c0374432440ae5634abcf2ae067a4f2e0fb024104
                                    • Instruction ID: 10c18c4ea0c7169c71e02e6a9d18c5b5c5b16817a4b3233b83832011ba50ed38
                                    • Opcode Fuzzy Hash: 169d4354c8de19e88134d40c0374432440ae5634abcf2ae067a4f2e0fb024104
                                    • Instruction Fuzzy Hash: AB51F1716043219BD7149F28E884BAF77E8AF49314F040A2DFA95E3291DB70DD64CBD2
                                    APIs
                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00127206
                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0012723C
                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0012724D
                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 001272CF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                    • String ID: DllGetClassObject
                                    • API String ID: 753597075-1075368562
                                    • Opcode ID: 4c7d089a5a43afb730991e3d03fca9889e427647f05770959e7ed69fa644129e
                                    • Instruction ID: ea06b45cceb865e3fcc751193150c9aa5a36d6fcaaf98972d9639ec9bf0ad0c6
                                    • Opcode Fuzzy Hash: 4c7d089a5a43afb730991e3d03fca9889e427647f05770959e7ed69fa644129e
                                    • Instruction Fuzzy Hash: 2F418D71A04314EFDB15DF94D884A9B7BA9EF44310F1580ADFD059F28AD7B0DA54CBA0
                                    APIs
                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00153E35
                                    • IsMenu.USER32(?), ref: 00153E4A
                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00153E92
                                    • DrawMenuBar.USER32 ref: 00153EA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Menu$Item$DrawInfoInsert
                                    • String ID: 0
                                    • API String ID: 3076010158-4108050209
                                    • Opcode ID: 02c9707213547990d139bce0d474604eb65136777bb78c4fa628e9b78e1877b9
                                    • Instruction ID: 355f451538e805bcef36b6b3d8ed9b624f86abd859623a73a440746569fc543d
                                    • Opcode Fuzzy Hash: 02c9707213547990d139bce0d474604eb65136777bb78c4fa628e9b78e1877b9
                                    • Instruction Fuzzy Hash: 4E414B75A00209EFDB10DF90D885ADAB7F5FF45395F044119ED259B250D770AE49CF60
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00121E66
                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00121E79
                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00121EA9
                                      • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$_wcslen$ClassName
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 2081771294-1403004172
                                    • Opcode ID: aa9cc0f7d2e1381267e77689df2e805e22818a8a2fe7e9f841535a54889ad584
                                    • Instruction ID: 0dfe07e80e0a6f97bc40a34681ee27f0abeb09d656032219bad99f8529e5816e
                                    • Opcode Fuzzy Hash: aa9cc0f7d2e1381267e77689df2e805e22818a8a2fe7e9f841535a54889ad584
                                    • Instruction Fuzzy Hash: 97213771A00204BEDB15EF64EC46DFFB7B9DF51350B104129F825A72E1DB344E198660
                                    APIs
                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00152F8D
                                    • LoadLibraryW.KERNEL32(?), ref: 00152F94
                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00152FA9
                                    • DestroyWindow.USER32(?), ref: 00152FB1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                    • String ID: SysAnimate32
                                    • API String ID: 3529120543-1011021900
                                    • Opcode ID: 122bd3a2a809ea87c891ee54c3af20e8a154fd758d893b3536095fde197c2b4d
                                    • Instruction ID: 389de86050da0f9a3bca4032f24ae50f2ec102d12e73f85930583d50dc92c913
                                    • Opcode Fuzzy Hash: 122bd3a2a809ea87c891ee54c3af20e8a154fd758d893b3536095fde197c2b4d
                                    • Instruction Fuzzy Hash: BD218C72204205EFEB104F64EC80FBB77B9EB5A366F10461AFD60EA190D771DC959BA0
                                    APIs
                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,000E4D1E,000F28E9,?,000E4CBE,000F28E9,001888B8,0000000C,000E4E15,000F28E9,00000002), ref: 000E4D8D
                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000E4DA0
                                    • FreeLibrary.KERNEL32(00000000,?,?,?,000E4D1E,000F28E9,?,000E4CBE,000F28E9,001888B8,0000000C,000E4E15,000F28E9,00000002,00000000), ref: 000E4DC3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AddressFreeHandleLibraryModuleProc
                                    • String ID: CorExitProcess$mscoree.dll
                                    • API String ID: 4061214504-1276376045
                                    • Opcode ID: 815151d89a7262a063c734d64d7b94252e95c97a0a8e65b41e7edd5e962f6314
                                    • Instruction ID: ee8fab756560f035d0085d820fefc488cd6f3517e21776bdb18887f96e6e5a0c
                                    • Opcode Fuzzy Hash: 815151d89a7262a063c734d64d7b94252e95c97a0a8e65b41e7edd5e962f6314
                                    • Instruction Fuzzy Hash: F5F03C35A40308EFDB519F95DC49BEEBBE5EB44752F0400A8B805A6660CB705A90CBD1
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,000C4EDD,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E9C
                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 000C4EAE
                                    • FreeLibrary.KERNEL32(00000000,?,?,000C4EDD,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4EC0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                    • API String ID: 145871493-3689287502
                                    • Opcode ID: a0f85571bacb0a5e79c359c664a37c3faca91c8b3935156194439a4a1bf8f02f
                                    • Instruction ID: e3f24cfd7a567f062b6165b5c94018558f3d86b975c2117652ee9631353ce635
                                    • Opcode Fuzzy Hash: a0f85571bacb0a5e79c359c664a37c3faca91c8b3935156194439a4a1bf8f02f
                                    • Instruction Fuzzy Hash: F8E08635A01B22DFD2611F256C68F5F6694BF81F637060119FC00E6500DB60CD4185E0
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00103CDE,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E62
                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 000C4E74
                                    • FreeLibrary.KERNEL32(00000000,?,?,00103CDE,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E87
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                    • API String ID: 145871493-1355242751
                                    • Opcode ID: e1054590682e83da9de697bd410757d6d10383af70c5c25bfc9033345f443d6c
                                    • Instruction ID: 10aa7ec4febd8ac90c766e34783451489792b0b410ce4231648e2aa4bf08586d
                                    • Opcode Fuzzy Hash: e1054590682e83da9de697bd410757d6d10383af70c5c25bfc9033345f443d6c
                                    • Instruction Fuzzy Hash: 2FD01235502B21DF96621F297C28ECF6A58BF85F523060519BD05AA555CF60CE41C5D0
                                    APIs
                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00132C05
                                    • DeleteFileW.KERNEL32(?), ref: 00132C87
                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00132C9D
                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00132CAE
                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00132CC0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: File$Delete$Copy
                                    • String ID:
                                    • API String ID: 3226157194-0
                                    • Opcode ID: 4d378106bc9cf67ae951d10e43f1d922a231b50f8fa94d20c9cb4aa2f1a9b304
                                    • Instruction ID: 5db6f64145b6b56708e248a67074fe9f27521201156035cde84fd611e3f5d900
                                    • Opcode Fuzzy Hash: 4d378106bc9cf67ae951d10e43f1d922a231b50f8fa94d20c9cb4aa2f1a9b304
                                    • Instruction Fuzzy Hash: 38B12E71900219AFDF25EBA4CC85EDEB77DEF49350F1040A6F509E6156EB30AA448F61
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 0014A427
                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0014A435
                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0014A468
                                    • CloseHandle.KERNEL32(?), ref: 0014A63D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                    • String ID:
                                    • API String ID: 3488606520-0
                                    • Opcode ID: 6d31f0a24dc67730b306b86238a2f03766c6d4902254dd9bad00e32ce68b122a
                                    • Instruction ID: f99fbc2fe9efdee113bdb5f00376c049d9cc25e82fa84a770bcb8736d2113944
                                    • Opcode Fuzzy Hash: 6d31f0a24dc67730b306b86238a2f03766c6d4902254dd9bad00e32ce68b122a
                                    • Instruction Fuzzy Hash: A6A1B0716043019FE720DF24C886F6AB7E5AF84714F55881DF59A9B3D2D7B0EC418B92
                                    APIs
                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00163700), ref: 000FBB91
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0019121C,000000FF,00000000,0000003F,00000000,?,?), ref: 000FBC09
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00191270,000000FF,?,0000003F,00000000,?), ref: 000FBC36
                                    • _free.LIBCMT ref: 000FBB7F
                                      • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                      • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                    • _free.LIBCMT ref: 000FBD4B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                    • String ID:
                                    • API String ID: 1286116820-0
                                    • Opcode ID: cbbed69aea890b8147326b1f09d49ce2c974694ca141ab2532704bfaddf8af37
                                    • Instruction ID: fe57fa3eedbba77b6e72555cf8aba250189adb920a0c9ca965a1b4e3d1a18eeb
                                    • Opcode Fuzzy Hash: cbbed69aea890b8147326b1f09d49ce2c974694ca141ab2532704bfaddf8af37
                                    • Instruction Fuzzy Hash: E951DB7190420DEFCB20EF65DC819BEB7F8EF44350B24426AE654D7991EB709E81AF90
                                    APIs
                                      • Part of subcall function 0012DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0012CF22,?), ref: 0012DDFD
                                      • Part of subcall function 0012DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0012CF22,?), ref: 0012DE16
                                      • Part of subcall function 0012E199: GetFileAttributesW.KERNEL32(?,0012CF95), ref: 0012E19A
                                    • lstrcmpiW.KERNEL32(?,?), ref: 0012E473
                                    • MoveFileW.KERNEL32(?,?), ref: 0012E4AC
                                    • _wcslen.LIBCMT ref: 0012E5EB
                                    • _wcslen.LIBCMT ref: 0012E603
                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0012E650
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                    • String ID:
                                    • API String ID: 3183298772-0
                                    • Opcode ID: f8f9bb4084eb8f83658b10b9f4072bb646c817f07dbe10cf449610b056197248
                                    • Instruction ID: 670af0b42a38d6db6e55823b4b6b851082972b6aaa35de19fcf1f3204b2912ba
                                    • Opcode Fuzzy Hash: f8f9bb4084eb8f83658b10b9f4072bb646c817f07dbe10cf449610b056197248
                                    • Instruction Fuzzy Hash: F95153B24083959FC724EB90EC819DF73DCAF95340F40492EF689D3192EF74A6988766
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 0014C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0014B6AE,?,?), ref: 0014C9B5
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014C9F1
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA68
                                      • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA9E
                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014BAA5
                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0014BB00
                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0014BB63
                                    • RegCloseKey.ADVAPI32(?,?), ref: 0014BBA6
                                    • RegCloseKey.ADVAPI32(00000000), ref: 0014BBB3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                    • String ID:
                                    • API String ID: 826366716-0
                                    • Opcode ID: 22f613b9237f3e730f5d1d7b77977e03f5fb6eda1e71a3f9ad0db4e0209775b2
                                    • Instruction ID: d28b93e3856744dc8ddb514ac532dc78a94645030a000818810e23ca1668c88b
                                    • Opcode Fuzzy Hash: 22f613b9237f3e730f5d1d7b77977e03f5fb6eda1e71a3f9ad0db4e0209775b2
                                    • Instruction Fuzzy Hash: 4B616C31208241AFD714DF24C8D5E6ABBE5FF84318F54899CF4998B2A2DB31ED45CB92
                                    APIs
                                    • VariantInit.OLEAUT32(?), ref: 00128BCD
                                    • VariantClear.OLEAUT32 ref: 00128C3E
                                    • VariantClear.OLEAUT32 ref: 00128C9D
                                    • VariantClear.OLEAUT32(?), ref: 00128D10
                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00128D3B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Variant$Clear$ChangeInitType
                                    • String ID:
                                    • API String ID: 4136290138-0
                                    • Opcode ID: 2b7a0d1c284677a059128f1ec9754c952fc3cc41060e95628d60e34986fc2dfa
                                    • Instruction ID: a05c221047df2524d7e3b8a689dbfde00f8671fcdfdbebaa09b2d03f9f842889
                                    • Opcode Fuzzy Hash: 2b7a0d1c284677a059128f1ec9754c952fc3cc41060e95628d60e34986fc2dfa
                                    • Instruction Fuzzy Hash: 855159B5A01219EFDB14CF68D894EAAB7F8FF89310B158559E905DB350E730E921CFA0
                                    APIs
                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00138BAE
                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00138BDA
                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00138C32
                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00138C57
                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00138C5F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: PrivateProfile$SectionWrite$String
                                    • String ID:
                                    • API String ID: 2832842796-0
                                    • Opcode ID: ce5e3f8f9f965ee47283861d7eec46c9dbcf88c44bf2421e591061f87e5f62bd
                                    • Instruction ID: a1c345138d0aa051060291fe18ed7df0b694408a280f62cd068ea280c806e836
                                    • Opcode Fuzzy Hash: ce5e3f8f9f965ee47283861d7eec46c9dbcf88c44bf2421e591061f87e5f62bd
                                    • Instruction Fuzzy Hash: DC511835A006159FCB05DF64C881EADBBF5FF48314F088459E849AB362DB35ED51DBA0
                                    APIs
                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00148F40
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00148FD0
                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00148FEC
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00149032
                                    • FreeLibrary.KERNEL32(00000000), ref: 00149052
                                      • Part of subcall function 000DF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00131043,?,7644E610), ref: 000DF6E6
                                      • Part of subcall function 000DF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0011FA64,00000000,00000000,?,?,00131043,?,7644E610,?,0011FA64), ref: 000DF70D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                    • String ID:
                                    • API String ID: 666041331-0
                                    • Opcode ID: 6c5f4a52a3fa5066373da70bdc960e6b5b4f4b9e8ee3849f0594fd399df550ed
                                    • Instruction ID: c40585d05bbe82e99b2ebfff2a120ce69578a4861bfc7eee649297b62c074f15
                                    • Opcode Fuzzy Hash: 6c5f4a52a3fa5066373da70bdc960e6b5b4f4b9e8ee3849f0594fd399df550ed
                                    • Instruction Fuzzy Hash: 3B513635600605DFCB15DF68C494DADBBF1FF49324B4580A9E80A9B762DB31ED89CB90
                                    APIs
                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00156C33
                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 00156C4A
                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00156C73
                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0013AB79,00000000,00000000), ref: 00156C98
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00156CC7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Long$MessageSendShow
                                    • String ID:
                                    • API String ID: 3688381893-0
                                    • Opcode ID: 9c2bae1bad8bc8f710dc28544e4ca507d0099e89715370da3a8783a06a176be9
                                    • Instruction ID: b946714aeeb8eb5d3fc5feb23ee2e71c4033abe0697561862a49708655c759aa
                                    • Opcode Fuzzy Hash: 9c2bae1bad8bc8f710dc28544e4ca507d0099e89715370da3a8783a06a176be9
                                    • Instruction Fuzzy Hash: AC41D635604204EFD724CF28CC55FA97BA5EB09361F950228FCA9AF2E1C371AD85DAC0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: 8a38d205a4ba14fcc708b70e68c6899bef41228852cec66a3358327d66d37c5a
                                    • Instruction ID: 58d14d93d475f18a91d2218ef85c13c0c2854fdf3489ffec56b43c1737b91eaa
                                    • Opcode Fuzzy Hash: 8a38d205a4ba14fcc708b70e68c6899bef41228852cec66a3358327d66d37c5a
                                    • Instruction Fuzzy Hash: 1741D332A003089FCB24DF78C881AADB7F5EF89314F154569E615EB792DB31AD01DB90
                                    APIs
                                    • GetCursorPos.USER32(?), ref: 000D9141
                                    • ScreenToClient.USER32(00000000,?), ref: 000D915E
                                    • GetAsyncKeyState.USER32(00000001), ref: 000D9183
                                    • GetAsyncKeyState.USER32(00000002), ref: 000D919D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AsyncState$ClientCursorScreen
                                    • String ID:
                                    • API String ID: 4210589936-0
                                    • Opcode ID: d60dfc8047f65869632cac979d2193073a116ab4b933ac3433ff6811a9153a6a
                                    • Instruction ID: 53df3745ed2c6a9a411ca68c8ca088ac6858aebfe65eaf59ca1e272333caf9b9
                                    • Opcode Fuzzy Hash: d60dfc8047f65869632cac979d2193073a116ab4b933ac3433ff6811a9153a6a
                                    • Instruction Fuzzy Hash: 3D416075A0860AFBDF199F64C844BEEB774FF05320F208226E825A73D0C7346994CBA1
                                    APIs
                                    • GetInputState.USER32 ref: 001338CB
                                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00133922
                                    • TranslateMessage.USER32(?), ref: 0013394B
                                    • DispatchMessageW.USER32(?), ref: 00133955
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00133966
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                    • String ID:
                                    • API String ID: 2256411358-0
                                    • Opcode ID: 5e6049affda6fdfce261c52e28f3429419d34348fdf011dd35d90bb8a4253c67
                                    • Instruction ID: 04172ca386666c26980e0d17df44222cfbceabf9c95cc5de7649ca78abe69b96
                                    • Opcode Fuzzy Hash: 5e6049affda6fdfce261c52e28f3429419d34348fdf011dd35d90bb8a4253c67
                                    • Instruction Fuzzy Hash: 7931D570904342EEEF35CB34D849BB637A8EB05308F04056EE472C65A0E3B49AC5CB55
                                    APIs
                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0013CF38
                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 0013CF6F
                                    • GetLastError.KERNEL32(?,00000000,?,?,?,0013C21E,00000000), ref: 0013CFB4
                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,0013C21E,00000000), ref: 0013CFC8
                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,0013C21E,00000000), ref: 0013CFF2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                    • String ID:
                                    • API String ID: 3191363074-0
                                    • Opcode ID: ff34d7e037a0c230b7579ca28de5c39a4ff82d0a86a53e8759fc29fa287cbce7
                                    • Instruction ID: 09c3423ced454979a1c7cebd99538ac42e6bfac94cf85d9ac496ba870c6b7951
                                    • Opcode Fuzzy Hash: ff34d7e037a0c230b7579ca28de5c39a4ff82d0a86a53e8759fc29fa287cbce7
                                    • Instruction Fuzzy Hash: 0B316B71500306EFDB24DFA5C8849ABBBFEEB14311F10842EF506E6601DB30AE41DBA0
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00121915
                                    • PostMessageW.USER32(00000001,00000201,00000001), ref: 001219C1
                                    • Sleep.KERNEL32(00000000,?,?,?), ref: 001219C9
                                    • PostMessageW.USER32(00000001,00000202,00000000), ref: 001219DA
                                    • Sleep.KERNEL32(00000000,?,?,?,?), ref: 001219E2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessagePostSleep$RectWindow
                                    • String ID:
                                    • API String ID: 3382505437-0
                                    • Opcode ID: 55efd2e95ace8a38d1163678509c86f997f0a1a21089592b9756659a9b7dafb9
                                    • Instruction ID: c4eb4a62ed7d3f2ca8df01691fa29870492f848b3abe73891cb462da83a180d6
                                    • Opcode Fuzzy Hash: 55efd2e95ace8a38d1163678509c86f997f0a1a21089592b9756659a9b7dafb9
                                    • Instruction Fuzzy Hash: D8319171900229EFCF14CFA8DD99ADE7BB5EB54319F104225F921AB2D1C7709A94CB90
                                    APIs
                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00155745
                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 0015579D
                                    • _wcslen.LIBCMT ref: 001557AF
                                    • _wcslen.LIBCMT ref: 001557BA
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00155816
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$_wcslen
                                    • String ID:
                                    • API String ID: 763830540-0
                                    • Opcode ID: 287d5e540b0b55b35a3de3da4ef5baaa42a432434abb5470be66161fd6903639
                                    • Instruction ID: 69c276bc6b3ffa90c51adbb7d1870a5ccd85534d926c82de883d01fbe27c08d6
                                    • Opcode Fuzzy Hash: 287d5e540b0b55b35a3de3da4ef5baaa42a432434abb5470be66161fd6903639
                                    • Instruction Fuzzy Hash: FB218571904618DADB209FA1CC85AED7BB9FF04726F108256ED39EE181E7708AC9CF50
                                    APIs
                                    • IsWindow.USER32(00000000), ref: 00140951
                                    • GetForegroundWindow.USER32 ref: 00140968
                                    • GetDC.USER32(00000000), ref: 001409A4
                                    • GetPixel.GDI32(00000000,?,00000003), ref: 001409B0
                                    • ReleaseDC.USER32(00000000,00000003), ref: 001409E8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$ForegroundPixelRelease
                                    • String ID:
                                    • API String ID: 4156661090-0
                                    • Opcode ID: 3239293efdda94dc5345fe0dd1d30e7dbc6b0ce2d740e28e6eee181006251116
                                    • Instruction ID: 3ae7095384eaa390a5e445eaf1e722d5e75475223cbd48a82212d09b6bbb2410
                                    • Opcode Fuzzy Hash: 3239293efdda94dc5345fe0dd1d30e7dbc6b0ce2d740e28e6eee181006251116
                                    • Instruction Fuzzy Hash: 1F216D35600214EFD704EF65C885AAEBBE9EF58701F04846CF84A9B762CB30AD44CB90
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 000FCDC6
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 000FCDE9
                                      • Part of subcall function 000F3820: RtlAllocateHeap.NTDLL(00000000,?,00191444,?,000DFDF5,?,?,000CA976,00000010,00191440,000C13FC,?,000C13C6,?,000C1129), ref: 000F3852
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 000FCE0F
                                    • _free.LIBCMT ref: 000FCE22
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 000FCE31
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                    • String ID:
                                    • API String ID: 336800556-0
                                    • Opcode ID: 129ce3d3142454bae41996a5b0f83150edbe35a1f94bdf442cc4c534a3d591ae
                                    • Instruction ID: 88b53ea378201cdbf88c493156b1c0ab93c8abd9dec09650e4ce2ad4cb158033
                                    • Opcode Fuzzy Hash: 129ce3d3142454bae41996a5b0f83150edbe35a1f94bdf442cc4c534a3d591ae
                                    • Instruction Fuzzy Hash: 22018872A0171DBF33611A7A6D89DBF79ADEFC6BA13150129FA05C7901DA618D01A1F0
                                    APIs
                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000D9693
                                    • SelectObject.GDI32(?,00000000), ref: 000D96A2
                                    • BeginPath.GDI32(?), ref: 000D96B9
                                    • SelectObject.GDI32(?,00000000), ref: 000D96E2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ObjectSelect$BeginCreatePath
                                    • String ID:
                                    • API String ID: 3225163088-0
                                    • Opcode ID: 2af06f765c6ea15dd036ba1eaef09794f3ec9068fc894614f94e30ddfa0e1066
                                    • Instruction ID: 71d228909d3141b82fdb6e57ed2ced9a99ff6276c34a96134a3b468ac6123681
                                    • Opcode Fuzzy Hash: 2af06f765c6ea15dd036ba1eaef09794f3ec9068fc894614f94e30ddfa0e1066
                                    • Instruction Fuzzy Hash: 46214970802306EFDB119F65EC58BAD7BB9BB5036AF104217F821A66E0D37098D1CBA4
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _memcmp
                                    • String ID:
                                    • API String ID: 2931989736-0
                                    • Opcode ID: bc4aa5fc11381d476c3281bc8537a37f5b29bd164323ab1d10a3f333eea4e0d3
                                    • Instruction ID: a93867109d4f359e6f402fc2f314eecba62263871b11e45c30515c2d86bfa2ce
                                    • Opcode Fuzzy Hash: bc4aa5fc11381d476c3281bc8537a37f5b29bd164323ab1d10a3f333eea4e0d3
                                    • Instruction Fuzzy Hash: 4201B971681655FFD3089621ADC2FFB735E9B613A5F804034FD14AE242F770EE2582A0
                                    APIs
                                    • GetLastError.KERNEL32(?,?,?,000EF2DE,000F3863,00191444,?,000DFDF5,?,?,000CA976,00000010,00191440,000C13FC,?,000C13C6), ref: 000F2DFD
                                    • _free.LIBCMT ref: 000F2E32
                                    • _free.LIBCMT ref: 000F2E59
                                    • SetLastError.KERNEL32(00000000,000C1129), ref: 000F2E66
                                    • SetLastError.KERNEL32(00000000,000C1129), ref: 000F2E6F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorLast$_free
                                    • String ID:
                                    • API String ID: 3170660625-0
                                    • Opcode ID: 76009ad12e89e4252af71b969b958de477a7a52d20eab6f4a033c9fd09c87eb6
                                    • Instruction ID: 6e327fe2f3dcbefe30cbb0c482653443496252a69aaf12251ab7ad601b16c44a
                                    • Opcode Fuzzy Hash: 76009ad12e89e4252af71b969b958de477a7a52d20eab6f4a033c9fd09c87eb6
                                    • Instruction Fuzzy Hash: 6701F932245B0CABC65267746C45D7F2999BBD17717310025FB2193E93EB708D417160
                                    APIs
                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?,?,0012035E), ref: 0012002B
                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?), ref: 00120046
                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?), ref: 00120054
                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?), ref: 00120064
                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?), ref: 00120070
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                    • String ID:
                                    • API String ID: 3897988419-0
                                    • Opcode ID: 638b3fe3b8cd6a7fdc8ced83bce8677b32c5fa4bdb983c2c7406482715991aa1
                                    • Instruction ID: a1ecdaa1c54751f66b64a71ac297b3c2fa697e974267ba801a29feb8036a8b77
                                    • Opcode Fuzzy Hash: 638b3fe3b8cd6a7fdc8ced83bce8677b32c5fa4bdb983c2c7406482715991aa1
                                    • Instruction Fuzzy Hash: 5201A772600314FFEB114F64EC44BAA7AEDEF48792F144214F905D6221D771DD5087A4
                                    APIs
                                    • QueryPerformanceCounter.KERNEL32(?), ref: 0012E997
                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 0012E9A5
                                    • Sleep.KERNEL32(00000000), ref: 0012E9AD
                                    • QueryPerformanceCounter.KERNEL32(?), ref: 0012E9B7
                                    • Sleep.KERNEL32 ref: 0012E9F3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                    • String ID:
                                    • API String ID: 2833360925-0
                                    • Opcode ID: 5722cfd8e1770e25627ec113d6ff09b00caf4f03cb4d30986c5d789fae415ad1
                                    • Instruction ID: 7e696ec471462dfb12bf3799b62137f7ab2d2f4082337ff6a3991765756c4a7d
                                    • Opcode Fuzzy Hash: 5722cfd8e1770e25627ec113d6ff09b00caf4f03cb4d30986c5d789fae415ad1
                                    • Instruction Fuzzy Hash: 41011731C01A39DBCF00AFE5E899AEDBBB8BB09705F010556E502B2241CB3495A4CBA1
                                    APIs
                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00121114
                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121120
                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 0012112F
                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121136
                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0012114D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                    • String ID:
                                    • API String ID: 842720411-0
                                    • Opcode ID: 1e87e32831bbcc18d5c7d10a1cc3a9ef4ec96ec3fdd70a9ad90af60ffcb91f25
                                    • Instruction ID: 6dc3499f66fdeb4a483e2d32bb9ed5e1c05717da8b5a265f3a481bbd5214dee2
                                    • Opcode Fuzzy Hash: 1e87e32831bbcc18d5c7d10a1cc3a9ef4ec96ec3fdd70a9ad90af60ffcb91f25
                                    • Instruction Fuzzy Hash: 21016D79100315FFDB114F64EC49A6A3F6EEF89361B140414FA41D7350DB31DC50CAA0
                                    APIs
                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00120FCA
                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00120FD6
                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00120FE5
                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00120FEC
                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00121002
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                    • String ID:
                                    • API String ID: 44706859-0
                                    • Opcode ID: 7a5c5489eca32673e393974af274d1c48aed29d375b5ecd38dc37a7b758cabb2
                                    • Instruction ID: ae8e797b54ed9d018ad681d0893b3e53d6a99649b88dd89e95091f0c9049a9ad
                                    • Opcode Fuzzy Hash: 7a5c5489eca32673e393974af274d1c48aed29d375b5ecd38dc37a7b758cabb2
                                    • Instruction Fuzzy Hash: E7F04F39100315FFDB214FA5AC89F5A3BADEF89762F104414F945CA291CA70DC908AA0
                                    APIs
                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0012102A
                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00121036
                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00121045
                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0012104C
                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00121062
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                    • String ID:
                                    • API String ID: 44706859-0
                                    • Opcode ID: 8da0688ff3aa13191febc7d76d0e7a451bd031ed38778d45327fc9a525967a93
                                    • Instruction ID: c1653278e230066f064cd2500560ca5a34502c43c411f12f79a10f8166c6cbda
                                    • Opcode Fuzzy Hash: 8da0688ff3aa13191febc7d76d0e7a451bd031ed38778d45327fc9a525967a93
                                    • Instruction Fuzzy Hash: 1DF04F39100355FFDB215FA5EC49F5A3BADEF89762F200414F945CA290CA70D8908AA0
                                    APIs
                                    • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 00130324
                                    • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 00130331
                                    • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 0013033E
                                    • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 0013034B
                                    • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 00130358
                                    • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 00130365
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: b4de72970c704654712b5ffaae75d8b8ca4363b9257d67d64cff18660d0b4a00
                                    • Instruction ID: 36a4b1e9267a30400de3479db76df40592e8db6ac58a41bc8f677a82a173a13d
                                    • Opcode Fuzzy Hash: b4de72970c704654712b5ffaae75d8b8ca4363b9257d67d64cff18660d0b4a00
                                    • Instruction Fuzzy Hash: 31019872800B15DFCB32AF66D8A0812FBF9BF642153158A3ED19652931C3B1A998CE80
                                    APIs
                                    • _free.LIBCMT ref: 000FD752
                                      • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                      • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                    • _free.LIBCMT ref: 000FD764
                                    • _free.LIBCMT ref: 000FD776
                                    • _free.LIBCMT ref: 000FD788
                                    • _free.LIBCMT ref: 000FD79A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 5f03b00cfb4c868c3fd05208f92faf1b8d152eefeb90203ecf35f2141a2de9a3
                                    • Instruction ID: 29d0ad801934bce89f955e85ee25156e8d546cc6de177cf0cbbc502a1666be2c
                                    • Opcode Fuzzy Hash: 5f03b00cfb4c868c3fd05208f92faf1b8d152eefeb90203ecf35f2141a2de9a3
                                    • Instruction Fuzzy Hash: 7FF0FF3258830EAB8661FB64F9C5C6A77DEBB447107A40806F258EBD12D774FC80A7B4
                                    APIs
                                    • GetDlgItem.USER32(?,000003E9), ref: 00125C58
                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00125C6F
                                    • MessageBeep.USER32(00000000), ref: 00125C87
                                    • KillTimer.USER32(?,0000040A), ref: 00125CA3
                                    • EndDialog.USER32(?,00000001), ref: 00125CBD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                    • String ID:
                                    • API String ID: 3741023627-0
                                    • Opcode ID: af7bffcce8f5a4dedd386e093c86a0018839ff9a539eeb7e050be94ff956a3f0
                                    • Instruction ID: 0b890fe14db93620f30d0b2c49164e126f61e0ddbf03dc2cfa188ebf058889ab
                                    • Opcode Fuzzy Hash: af7bffcce8f5a4dedd386e093c86a0018839ff9a539eeb7e050be94ff956a3f0
                                    • Instruction Fuzzy Hash: 4D018630500B14EFEB255F10ED8EFA677BDBB04B06F000559A583A55E1EBF0AAE48B90
                                    APIs
                                    • _free.LIBCMT ref: 000F22BE
                                      • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                      • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                    • _free.LIBCMT ref: 000F22D0
                                    • _free.LIBCMT ref: 000F22E3
                                    • _free.LIBCMT ref: 000F22F4
                                    • _free.LIBCMT ref: 000F2305
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: dc920c5aa96564e4ec0faf0866ab35c775ef5bcb82463a1625611c681172c07c
                                    • Instruction ID: 5f342b14bb8839532de3aefccd9305d2b0104601d672d8c9e0fbd46469ae0059
                                    • Opcode Fuzzy Hash: dc920c5aa96564e4ec0faf0866ab35c775ef5bcb82463a1625611c681172c07c
                                    • Instruction Fuzzy Hash: AFF03A71884126AB8613BF54BC018AC3BA4BB19B60710050BF514D7FB2C7702AD1BFE4
                                    APIs
                                    • EndPath.GDI32(?), ref: 000D95D4
                                    • StrokeAndFillPath.GDI32(?,?,001171F7,00000000,?,?,?), ref: 000D95F0
                                    • SelectObject.GDI32(?,00000000), ref: 000D9603
                                    • DeleteObject.GDI32 ref: 000D9616
                                    • StrokePath.GDI32(?), ref: 000D9631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                    • String ID:
                                    • API String ID: 2625713937-0
                                    • Opcode ID: 7a82e0304ac4b490f9c3c951ec0800a4157eb697475086fa59e983aec0f3d429
                                    • Instruction ID: dbeab94d337b0dc8d52bf98d906ebf92e563f548e991b312f249c0a3c6cd05f8
                                    • Opcode Fuzzy Hash: 7a82e0304ac4b490f9c3c951ec0800a4157eb697475086fa59e983aec0f3d429
                                    • Instruction Fuzzy Hash: 6EF0373400670AFFDB625F69ED5CB683BA1EB003AAF048226F425599F0C73189D1DF64
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: __freea$_free
                                    • String ID: a/p$am/pm
                                    • API String ID: 3432400110-3206640213
                                    • Opcode ID: 043d16d4f16c46e711c3da1ee47e154d5f24f58a6ab5c6f830f73b0eabe8a73c
                                    • Instruction ID: 9ff2737b3f115868abc35045696de635fece3b78efbb9eb3296ba5fd037f80c1
                                    • Opcode Fuzzy Hash: 043d16d4f16c46e711c3da1ee47e154d5f24f58a6ab5c6f830f73b0eabe8a73c
                                    • Instruction Fuzzy Hash: C3D1DE7190020EDADB688F68C855AFEB7F1FF05310F280119EB01ABE91D7759E80EB91
                                    APIs
                                      • Part of subcall function 000E0242: EnterCriticalSection.KERNEL32(0019070C,00191884,?,?,000D198B,00192518,?,?,?,000C12F9,00000000), ref: 000E024D
                                      • Part of subcall function 000E0242: LeaveCriticalSection.KERNEL32(0019070C,?,000D198B,00192518,?,?,?,000C12F9,00000000), ref: 000E028A
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 000E00A3: __onexit.LIBCMT ref: 000E00A9
                                    • __Init_thread_footer.LIBCMT ref: 00147BFB
                                      • Part of subcall function 000E01F8: EnterCriticalSection.KERNEL32(0019070C,?,?,000D8747,00192514), ref: 000E0202
                                      • Part of subcall function 000E01F8: LeaveCriticalSection.KERNEL32(0019070C,?,000D8747,00192514), ref: 000E0235
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                    • String ID: 5$G$Variable must be of type 'Object'.
                                    • API String ID: 535116098-3733170431
                                    • Opcode ID: cda64cf33bc3c253ccc452cf92828bb62cfc21b84609e2b3464ca9a513eaab62
                                    • Instruction ID: 50b11673c6e000f57f422b4bfd6d3b2de72804ca89b7037a0f5be6d29aeefad8
                                    • Opcode Fuzzy Hash: cda64cf33bc3c253ccc452cf92828bb62cfc21b84609e2b3464ca9a513eaab62
                                    • Instruction Fuzzy Hash: 61917870A04209EFCB14EF94D991DBDB7B2FF49304F148059F816AB2A2DB71AE85CB51
                                    APIs
                                      • Part of subcall function 0012B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001221D0,?,?,00000034,00000800,?,00000034), ref: 0012B42D
                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00122760
                                      • Part of subcall function 0012B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001221FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0012B3F8
                                      • Part of subcall function 0012B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0012B355
                                      • Part of subcall function 0012B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00122194,00000034,?,?,00001004,00000000,00000000), ref: 0012B365
                                      • Part of subcall function 0012B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00122194,00000034,?,?,00001004,00000000,00000000), ref: 0012B37B
                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001227CD
                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0012281A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                    • String ID: @
                                    • API String ID: 4150878124-2766056989
                                    • Opcode ID: b0543f6659b844c0bdff4520ecda633bfcd878c939e7a1a61d27224bea4ea4ab
                                    • Instruction ID: 70930119dd3e87963004a217d3f5ebc86fc4ec36f4c91b555ef1675440e5438a
                                    • Opcode Fuzzy Hash: b0543f6659b844c0bdff4520ecda633bfcd878c939e7a1a61d27224bea4ea4ab
                                    • Instruction Fuzzy Hash: 27412D72900228BFDB10DFA4DD81ADEBBB8EF15300F004059FA55B7181DB706E55CBA0
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 000F1769
                                    • _free.LIBCMT ref: 000F1834
                                    • _free.LIBCMT ref: 000F183E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free$FileModuleName
                                    • String ID: C:\Users\user\Desktop\file.exe
                                    • API String ID: 2506810119-3695852857
                                    • Opcode ID: fd16331fffe92521b29b14be3ce279180464d5f3c51c284caa414dd160e7b248
                                    • Instruction ID: 7f61819c330f8462a6a59cbfc0f545b0390fb2cb257e425d46d215a8891373c1
                                    • Opcode Fuzzy Hash: fd16331fffe92521b29b14be3ce279180464d5f3c51c284caa414dd160e7b248
                                    • Instruction Fuzzy Hash: 3D31B171A0430DFFCB21EB999981DEEBBFCEB84350F244166E60497611DB704A81EB90
                                    APIs
                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0012C306
                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 0012C34C
                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00191990,00F050C0), ref: 0012C395
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Menu$Delete$InfoItem
                                    • String ID: 0
                                    • API String ID: 135850232-4108050209
                                    • Opcode ID: dc44fa1bf618d321511555fac3bb8570c6593337219b7d804a0c28d7e7b4c4f5
                                    • Instruction ID: 523b40525d9952b4af78ab7dcca7c7262adc0419d9965458090293cb29807037
                                    • Opcode Fuzzy Hash: dc44fa1bf618d321511555fac3bb8570c6593337219b7d804a0c28d7e7b4c4f5
                                    • Instruction Fuzzy Hash: 3041BE312043519FD724DF25E884B6EBBE8BF95320F008A1DFAA5972D1D730E914CBA2
                                    APIs
                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0015CC08,00000000,?,?,?,?), ref: 001544AA
                                    • GetWindowLongW.USER32 ref: 001544C7
                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001544D7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Long
                                    • String ID: SysTreeView32
                                    • API String ID: 847901565-1698111956
                                    • Opcode ID: 747af6f29087c012aa78ee1dbd2d111aff8b9a976bd71cbff5207acd95741866
                                    • Instruction ID: 008eebb42409e0576dcacfa4fa424bdf95839a0324d4a0a2903df519f44eae17
                                    • Opcode Fuzzy Hash: 747af6f29087c012aa78ee1dbd2d111aff8b9a976bd71cbff5207acd95741866
                                    • Instruction Fuzzy Hash: 74319A31250205AFDF208E78DC45BEA7BA9EB08329F204315FD79A62E1D770EC949B50
                                    APIs
                                      • Part of subcall function 0014335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00143077,?,?), ref: 00143378
                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0014307A
                                    • _wcslen.LIBCMT ref: 0014309B
                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 00143106
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                    • String ID: 255.255.255.255
                                    • API String ID: 946324512-2422070025
                                    • Opcode ID: 501d7f57d64639b8abfb233bef6e7deb496c7e982dab56119ad0fea881e2e220
                                    • Instruction ID: a4e3dd74fed773adbd3ca7eebdfeab234d7cae1586d240215074856e37dda9e0
                                    • Opcode Fuzzy Hash: 501d7f57d64639b8abfb233bef6e7deb496c7e982dab56119ad0fea881e2e220
                                    • Instruction Fuzzy Hash: 5B31D335200301DFDB14CF68C585EAA77E0EF54318F258199E9259B7A2DB72EE45C760
                                    APIs
                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00153F40
                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00153F54
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00153F78
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window
                                    • String ID: SysMonthCal32
                                    • API String ID: 2326795674-1439706946
                                    • Opcode ID: 31810c87d906c49b5d74eb1ef302a2e36bbd8866d1ad25982859382db440b486
                                    • Instruction ID: 0a8715f2fe0a9095e3f7880640380035eb1b5915da1eb165fb220645fb99a3cb
                                    • Opcode Fuzzy Hash: 31810c87d906c49b5d74eb1ef302a2e36bbd8866d1ad25982859382db440b486
                                    • Instruction Fuzzy Hash: B121BC32600219BFDF218F90CC46FEA3BB9EB48754F110215FE256B1D0D7B1A9A4CBA0
                                    APIs
                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00154705
                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00154713
                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0015471A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$DestroyWindow
                                    • String ID: msctls_updown32
                                    • API String ID: 4014797782-2298589950
                                    • Opcode ID: 4c31d95b911a3ce46d5df0eeb5b4ea630a0cbd6238381749c004429b2ececc5c
                                    • Instruction ID: aa443d9501adfe21d493926a497dd7507c36f0f4683adc80a7ffe76e66c93316
                                    • Opcode Fuzzy Hash: 4c31d95b911a3ce46d5df0eeb5b4ea630a0cbd6238381749c004429b2ececc5c
                                    • Instruction Fuzzy Hash: 0F219DB5600209EFEB11DF64DCC1DAB37ADEB5A3A9B000059FA109B391CB31EC95CB60
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen
                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                    • API String ID: 176396367-2734436370
                                    • Opcode ID: 321daef6009fd5525ae0d1c94d56fd08a077c7477802bbe385041d88c51d0e55
                                    • Instruction ID: ad928abcc11afc8ffc2156ec46df360a1d8a20d7717e3842be08f86c2112a0b5
                                    • Opcode Fuzzy Hash: 321daef6009fd5525ae0d1c94d56fd08a077c7477802bbe385041d88c51d0e55
                                    • Instruction Fuzzy Hash: 4E215B32204271AAD331AB2DFC02FFB73D89F51300F10402AF949AB142EB919D66C3E5
                                    APIs
                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00153840
                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00153850
                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00153876
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend$MoveWindow
                                    • String ID: Listbox
                                    • API String ID: 3315199576-2633736733
                                    • Opcode ID: d1671245cb824bf490c8afab56ad8b7710bcdec5de20ac3349efe6b1bede9d79
                                    • Instruction ID: 574e02928c6f4db7d5f51248f384777508bc7868c7f975050815be77ba51897d
                                    • Opcode Fuzzy Hash: d1671245cb824bf490c8afab56ad8b7710bcdec5de20ac3349efe6b1bede9d79
                                    • Instruction Fuzzy Hash: FB21B072600218BFEB218F64CC81FAB376AEF89791F108114F9209B190C771DC568BA0
                                    APIs
                                    • SetErrorMode.KERNEL32(00000001), ref: 00134A08
                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00134A5C
                                    • SetErrorMode.KERNEL32(00000000,?,?,0015CC08), ref: 00134AD0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorMode$InformationVolume
                                    • String ID: %lu
                                    • API String ID: 2507767853-685833217
                                    • Opcode ID: b09b3d08d788e1d9d50b8ab80ab044b1be05803fe5b3f1472d7a3839fa313a05
                                    • Instruction ID: 0e5db63174e46a988f02dcb8bfa8abe603817a94f7101d25dcce764a3d2a8685
                                    • Opcode Fuzzy Hash: b09b3d08d788e1d9d50b8ab80ab044b1be05803fe5b3f1472d7a3839fa313a05
                                    • Instruction Fuzzy Hash: D4310F75A00209AFDB10DF54C985EAE7BF8EF05308F148099F909DB252D775ED45CBA1
                                    APIs
                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0015424F
                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00154264
                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00154271
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: msctls_trackbar32
                                    • API String ID: 3850602802-1010561917
                                    • Opcode ID: fb6870eb4be131d63185a13d7aaef574b1b18b731b0d4fee5848c548c3c34228
                                    • Instruction ID: 5b6f855c76627bf5a90325cf00ac2cd44854ade436af67b35a9d4144a8241623
                                    • Opcode Fuzzy Hash: fb6870eb4be131d63185a13d7aaef574b1b18b731b0d4fee5848c548c3c34228
                                    • Instruction Fuzzy Hash: CB11E331240208BFEF205F29DC46FAB3BACEF95B59F110114FA65EA090D371D8919B20
                                    APIs
                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001558C1
                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001558EE
                                    • DrawMenuBar.USER32(?), ref: 001558FD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Menu$InfoItem$Draw
                                    • String ID: 0
                                    • API String ID: 3227129158-4108050209
                                    • Opcode ID: 161721fc67041ab600dfbe0c98b04c92fcf7a5a0c7908e28445a5673003c6e44
                                    • Instruction ID: 7d0618f89a3d9d2315dbd96690bdd18838041d9f533b5ef3c993916515b91bcb
                                    • Opcode Fuzzy Hash: 161721fc67041ab600dfbe0c98b04c92fcf7a5a0c7908e28445a5673003c6e44
                                    • Instruction Fuzzy Hash: 6B016131500318EFDB119F51DC44BAEBBB5FB45366F108099E859DA261EB348A84DF71
                                    APIs
                                    • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0011D3BF
                                    • FreeLibrary.KERNEL32 ref: 0011D3E5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: AddressFreeLibraryProc
                                    • String ID: GetSystemWow64DirectoryW$X64
                                    • API String ID: 3013587201-2590602151
                                    • Opcode ID: 67a9246ead4631ef90ec1755aafb41c8aa3cf42b837e57bbe9d318bdab56b602
                                    • Instruction ID: 843111912f1cd98d8e6a3c2ae258016f35b64ec2cf95ae0fd5d02685cc91741b
                                    • Opcode Fuzzy Hash: 67a9246ead4631ef90ec1755aafb41c8aa3cf42b837e57bbe9d318bdab56b602
                                    • Instruction Fuzzy Hash: D0F0ECB5415B11DAD77C56109CC89E93314BF11711F658177E033F5095EB70C9C1C692
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fa20f8bdc32a29c9d9bf954c5b369f69decf51bbd6bfbc091d69c41e32cf6e24
                                    • Instruction ID: 140dc9c4427a502f4f04f1e133e49f68c32d01f4728729ef2b451d28bd17b72d
                                    • Opcode Fuzzy Hash: fa20f8bdc32a29c9d9bf954c5b369f69decf51bbd6bfbc091d69c41e32cf6e24
                                    • Instruction Fuzzy Hash: A4C18D75A0022AEFDB05CFA4D894EAEB7B5FF48304F118698E405EB252C731ED91CB90
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: __alldvrm$_strrchr
                                    • String ID:
                                    • API String ID: 1036877536-0
                                    • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                    • Instruction ID: 91efaf13b1dabf8f281840a8f8d3a745adcc458b549fbf52d2bee7f068c476b8
                                    • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                    • Instruction Fuzzy Hash: 07A13772E0038A9FDB25CF18C8917BFBBE4EF61350F18416DEA859B682C6788985D750
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInitInitializeUninitialize
                                    • String ID:
                                    • API String ID: 1998397398-0
                                    • Opcode ID: 78ee8f390357db302fcbb92903cc392618d6c991ab253639aae04b7d9006d7ba
                                    • Instruction ID: d4f2990d62423e16dbac07b43c11ac4cb43829ad6fffd25b553ebb2a4d181417
                                    • Opcode Fuzzy Hash: 78ee8f390357db302fcbb92903cc392618d6c991ab253639aae04b7d9006d7ba
                                    • Instruction Fuzzy Hash: D9A112756047019FCB00DF28C585A6EB7E5EF88724F05885DF99A9B362DB70EE01CB92
                                    APIs
                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0015FC08,?), ref: 001205F0
                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0015FC08,?), ref: 00120608
                                    • CLSIDFromProgID.OLE32(?,?,00000000,0015CC40,000000FF,?,00000000,00000800,00000000,?,0015FC08,?), ref: 0012062D
                                    • _memcmp.LIBVCRUNTIME ref: 0012064E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FromProg$FreeTask_memcmp
                                    • String ID:
                                    • API String ID: 314563124-0
                                    • Opcode ID: 4efbdc96fa84dbe968c22054903380441c8ea997e738c1ed81b4b10982580dd1
                                    • Instruction ID: 74666082e43c0e102d0f7c99f6ecfe4c9a757a4207b8a6abcef4088b6c1984f7
                                    • Opcode Fuzzy Hash: 4efbdc96fa84dbe968c22054903380441c8ea997e738c1ed81b4b10982580dd1
                                    • Instruction Fuzzy Hash: A9813C71A00219EFCB05DF94C988EEEB7B9FF89315F204558E506AB251DB71AE06CF60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: 2c994f5990f25dbd92465ee50ebd3d544c26aa452e2e895c7ba7aa4909eaaeaa
                                    • Instruction ID: 4652eee0b3faf86ad37614c447c0efcde027551edf4762597d85d63f4cea990a
                                    • Opcode Fuzzy Hash: 2c994f5990f25dbd92465ee50ebd3d544c26aa452e2e895c7ba7aa4909eaaeaa
                                    • Instruction Fuzzy Hash: B8413931A00505BFDB256FB98C45AFE3AA4FF52330F144229F958D71E3EBB888419262
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 001562E2
                                    • ScreenToClient.USER32(?,?), ref: 00156315
                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00156382
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$ClientMoveRectScreen
                                    • String ID:
                                    • API String ID: 3880355969-0
                                    • Opcode ID: cf7aa37cb3f36a3621df46b684cd979d749c9ad3f7c6f0e9666e4e1bdbb2282b
                                    • Instruction ID: e32eddbc66bb03d23f336c6588e703a1f37e9a81fea50f6ac3c6e529ce3953c8
                                    • Opcode Fuzzy Hash: cf7aa37cb3f36a3621df46b684cd979d749c9ad3f7c6f0e9666e4e1bdbb2282b
                                    • Instruction Fuzzy Hash: 2E513D74A00209EFCF10DF68D881AAE7BB5FF55365F508169F8699B2A0D730ED85CB90
                                    APIs
                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00141AFD
                                    • WSAGetLastError.WSOCK32 ref: 00141B0B
                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00141B8A
                                    • WSAGetLastError.WSOCK32 ref: 00141B94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ErrorLast$socket
                                    • String ID:
                                    • API String ID: 1881357543-0
                                    • Opcode ID: 7350b13cb3838a38fa756adafc7d80cc4e35aafcf22c63578a73d96a285850cc
                                    • Instruction ID: de808eca79781f852cb17f6ae37c76e9c7391132097e6627b5667ae5bd318dd0
                                    • Opcode Fuzzy Hash: 7350b13cb3838a38fa756adafc7d80cc4e35aafcf22c63578a73d96a285850cc
                                    • Instruction Fuzzy Hash: EF417B74600300AFE720AF24C886F6A77A5EB44718F54849CF91A9F7D3D772ED828B90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aa26b9a0038ebd457965aadf402db539ef03af945ade92458bcb4317f3f4152d
                                    • Instruction ID: 8ef4029f8a1e02ad19b60985b5ab059d78e893697a79cbee99464319d5e06b3a
                                    • Opcode Fuzzy Hash: aa26b9a0038ebd457965aadf402db539ef03af945ade92458bcb4317f3f4152d
                                    • Instruction Fuzzy Hash: B441E976900708BFD724AF38CD41BBE7BE9EB84710F10452AF651DBA82D775A9019B80
                                    APIs
                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00135783
                                    • GetLastError.KERNEL32(?,00000000), ref: 001357A9
                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 001357CE
                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 001357FA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                    • String ID:
                                    • API String ID: 3321077145-0
                                    • Opcode ID: 37ca6e10bf80499cccb6ec8d1b68318515751ad0cf7393dc171c95a95453a5bf
                                    • Instruction ID: cb0e92969092b4d44ad96ee3edcce2164422ffc7cbc21b11be961ed8967da12c
                                    • Opcode Fuzzy Hash: 37ca6e10bf80499cccb6ec8d1b68318515751ad0cf7393dc171c95a95453a5bf
                                    • Instruction Fuzzy Hash: BF411739600A10DFCB11EF15C445A5EBBE2EF89720F598498E84AAB362CB70FD41DF91
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,000E6D71,00000000,00000000,000E82D9,?,000E82D9,?,00000001,000E6D71,8BE85006,00000001,000E82D9,000E82D9), ref: 000FD910
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 000FD999
                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 000FD9AB
                                    • __freea.LIBCMT ref: 000FD9B4
                                      • Part of subcall function 000F3820: RtlAllocateHeap.NTDLL(00000000,?,00191444,?,000DFDF5,?,?,000CA976,00000010,00191440,000C13FC,?,000C13C6,?,000C1129), ref: 000F3852
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                    • String ID:
                                    • API String ID: 2652629310-0
                                    • Opcode ID: 0f0833421b00e9986f9bc391eb160dbcc1fa2b18ca91cb720d65ff05d23a97e1
                                    • Instruction ID: 800333e01272c33c5e6cf6d94e5971878e2b06d3dc1a670259845a8cab23f6a6
                                    • Opcode Fuzzy Hash: 0f0833421b00e9986f9bc391eb160dbcc1fa2b18ca91cb720d65ff05d23a97e1
                                    • Instruction Fuzzy Hash: EE31CE72A0020AAFDB259FA5DC45EFE7BA6EB40310B05416AFD04DA151EB75CE50DBA0
                                    APIs
                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00155352
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00155375
                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00155382
                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001553A8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: LongWindow$InvalidateMessageRectSend
                                    • String ID:
                                    • API String ID: 3340791633-0
                                    • Opcode ID: 54f38615145cc719df36c6efe18e0f95a45c8edd91cb99ee773a10ef868928b9
                                    • Instruction ID: e78f15492936e14a999a339069147b8eb0fa61a4856b8523ca8560d0f9d27364
                                    • Opcode Fuzzy Hash: 54f38615145cc719df36c6efe18e0f95a45c8edd91cb99ee773a10ef868928b9
                                    • Instruction Fuzzy Hash: 6631B434A55A08EFEB749F14CC25BE83767BB043D2F584112FE299E2E1C7B09988D741
                                    APIs
                                    • ClientToScreen.USER32(?,?), ref: 0015769A
                                    • GetWindowRect.USER32(?,?), ref: 00157710
                                    • PtInRect.USER32(?,?,00158B89), ref: 00157720
                                    • MessageBeep.USER32(00000000), ref: 0015778C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Rect$BeepClientMessageScreenWindow
                                    • String ID:
                                    • API String ID: 1352109105-0
                                    • Opcode ID: 7f46257fa5d0b57ed5d4011eb64d81bcc205696a05a9053bbf202423a061e4d2
                                    • Instruction ID: 7735b5eb68cd4792f07715b995a37310c8838926209ed6c65e6301c6f1348354
                                    • Opcode Fuzzy Hash: 7f46257fa5d0b57ed5d4011eb64d81bcc205696a05a9053bbf202423a061e4d2
                                    • Instruction Fuzzy Hash: 5841AF34605255EFCB02CF58E89AEA977F4FB49306F1540A9E8249F2A1C330A989CF90
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 001516EB
                                      • Part of subcall function 00123A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00123A57
                                      • Part of subcall function 00123A3D: GetCurrentThreadId.KERNEL32 ref: 00123A5E
                                      • Part of subcall function 00123A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001225B3), ref: 00123A65
                                    • GetCaretPos.USER32(?), ref: 001516FF
                                    • ClientToScreen.USER32(00000000,?), ref: 0015174C
                                    • GetForegroundWindow.USER32 ref: 00151752
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                    • String ID:
                                    • API String ID: 2759813231-0
                                    • Opcode ID: 8f743b7c2b4f9e8a555c16edeccf8038bce29b0599a80964236b2615df1a6f5f
                                    • Instruction ID: e39e0f7ba58f6ddae5272824f5c4e81efb0b9350a501799bd9d0c371b9ad6cf0
                                    • Opcode Fuzzy Hash: 8f743b7c2b4f9e8a555c16edeccf8038bce29b0599a80964236b2615df1a6f5f
                                    • Instruction Fuzzy Hash: 53314371D00249AFD700DFA9C881DEEB7F9EF48304B50806DE425E7212D7359E45CBA0
                                    APIs
                                      • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                    • _wcslen.LIBCMT ref: 0012DFCB
                                    • _wcslen.LIBCMT ref: 0012DFE2
                                    • _wcslen.LIBCMT ref: 0012E00D
                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0012E018
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$ExtentPoint32Text
                                    • String ID:
                                    • API String ID: 3763101759-0
                                    • Opcode ID: 8a4c6d8726f62a6075fd196c5af8f2f95d031bf6d5c0f98f9c5a32b7171b3989
                                    • Instruction ID: abfae5d2f51516cd0d025808dab52d14fddd927e8383037a1af5feda1999aa0e
                                    • Opcode Fuzzy Hash: 8a4c6d8726f62a6075fd196c5af8f2f95d031bf6d5c0f98f9c5a32b7171b3989
                                    • Instruction Fuzzy Hash: EB21A175900224EFCB209FA8E981BAEB7F8EF45750F144069F805BB286D7709E41CBE5
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 0012D501
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0012D50F
                                    • Process32NextW.KERNEL32(00000000,?), ref: 0012D52F
                                    • CloseHandle.KERNEL32(00000000), ref: 0012D5DC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                    • String ID:
                                    • API String ID: 420147892-0
                                    • Opcode ID: 346badc900eceb494ecb3fd5ca2648fe3203def128888bdec1f4f2cc94fdb172
                                    • Instruction ID: 89d8c9e9ba4e58502fd5f0b023bf39af2253e79737c76553f1c4cda71f1892f0
                                    • Opcode Fuzzy Hash: 346badc900eceb494ecb3fd5ca2648fe3203def128888bdec1f4f2cc94fdb172
                                    • Instruction Fuzzy Hash: 3D317E711083019FD300EF54E885EAFBBF8EF99354F54092DF581861A2EB719999CBA2
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    • GetCursorPos.USER32(?), ref: 00159001
                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00117711,?,?,?,?,?), ref: 00159016
                                    • GetCursorPos.USER32(?), ref: 0015905E
                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00117711,?,?,?), ref: 00159094
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                    • String ID:
                                    • API String ID: 2864067406-0
                                    • Opcode ID: 154f570a801746f7022aeb44770450b0f631019da8c63c48abe7b944f6167111
                                    • Instruction ID: cf22a47d30bdf5b855917b3c525a431db38ae4eff93a76b6030cb80bf5059dec
                                    • Opcode Fuzzy Hash: 154f570a801746f7022aeb44770450b0f631019da8c63c48abe7b944f6167111
                                    • Instruction Fuzzy Hash: 86219F35600118FFCB258F94CC58EEB7BB9EB49352F044555F9154F2A1D3319990EBA1
                                    APIs
                                    • GetFileAttributesW.KERNEL32(?,0015CB68), ref: 0012D2FB
                                    • GetLastError.KERNEL32 ref: 0012D30A
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0012D319
                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0015CB68), ref: 0012D376
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                    • String ID:
                                    • API String ID: 2267087916-0
                                    • Opcode ID: d5ee4f367fc8018aa335a6c7d8160afedbb6ac53f1de3e25a82a43e1c01cae98
                                    • Instruction ID: 7de5004ab907fa81fbd86cfe9ee96c98003c06da25edb7d2fe8a1c59cbf8080e
                                    • Opcode Fuzzy Hash: d5ee4f367fc8018aa335a6c7d8160afedbb6ac53f1de3e25a82a43e1c01cae98
                                    • Instruction Fuzzy Hash: 0F218DB0508311DF8310DF28E8859AE77E4FF56364F504A1DF499C72A2DB309959CB93
                                    APIs
                                      • Part of subcall function 00121014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0012102A
                                      • Part of subcall function 00121014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00121036
                                      • Part of subcall function 00121014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00121045
                                      • Part of subcall function 00121014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0012104C
                                      • Part of subcall function 00121014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00121062
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 001215BE
                                    • _memcmp.LIBVCRUNTIME ref: 001215E1
                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00121617
                                    • HeapFree.KERNEL32(00000000), ref: 0012161E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                    • String ID:
                                    • API String ID: 1592001646-0
                                    • Opcode ID: 27cb08893f6e0cb4468aeb374ebddc55911b81b841cfda1198cceb776dba9141
                                    • Instruction ID: d126fd11002577295b32230b9097f9d08f6cdeba1b885667c998cf28184cb005
                                    • Opcode Fuzzy Hash: 27cb08893f6e0cb4468aeb374ebddc55911b81b841cfda1198cceb776dba9141
                                    • Instruction Fuzzy Hash: 2B219A31E00218FFDF00DFA4D945BEEB7B8EFA4355F188499E441AB241E770AA55CBA0
                                    APIs
                                    • GetWindowLongW.USER32(?,000000EC), ref: 0015280A
                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00152824
                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00152832
                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00152840
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Long$AttributesLayered
                                    • String ID:
                                    • API String ID: 2169480361-0
                                    • Opcode ID: 9415a5873937f2226e2371dad5a6535fbad02127c0345ab4c1027e626915b021
                                    • Instruction ID: 31bba675f517956098f32396970f04f6ead17580ba6388db52125dfec78a8eab
                                    • Opcode Fuzzy Hash: 9415a5873937f2226e2371dad5a6535fbad02127c0345ab4c1027e626915b021
                                    • Instruction Fuzzy Hash: 89219032204611EFD714DB24C845FAA7B95AF56325F14815CF8268F6A2C771EC86C7D0
                                    APIs
                                      • Part of subcall function 00128D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0012790A,?,000000FF,?,00128754,00000000,?,0000001C,?,?), ref: 00128D8C
                                      • Part of subcall function 00128D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00128DB2
                                      • Part of subcall function 00128D7D: lstrcmpiW.KERNEL32(00000000,?,0012790A,?,000000FF,?,00128754,00000000,?,0000001C,?,?), ref: 00128DE3
                                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00128754,00000000,?,0000001C,?,?,00000000), ref: 00127923
                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00127949
                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,00128754,00000000,?,0000001C,?,?,00000000), ref: 00127984
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: lstrcmpilstrcpylstrlen
                                    • String ID: cdecl
                                    • API String ID: 4031866154-3896280584
                                    • Opcode ID: 2eb297450a8132633099045b80eeb3ef1bc45ce69e760704fb871f6a474ce953
                                    • Instruction ID: d70b34c5b0f10afbbbd4f46f774ee419498087b9d379920309a3baf5129099bb
                                    • Opcode Fuzzy Hash: 2eb297450a8132633099045b80eeb3ef1bc45ce69e760704fb871f6a474ce953
                                    • Instruction Fuzzy Hash: DA11063A200352AFCF156F34E844D7B77A5FF45364B00402AF906CB3A4EB319861C7A1
                                    APIs
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00157D0B
                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00157D2A
                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00157D42
                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0013B7AD,00000000), ref: 00157D6B
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$Long
                                    • String ID:
                                    • API String ID: 847901565-0
                                    • Opcode ID: b07def83a732ce2c5b7493330ad9c766716cb3200f902db2e6d88344ddbb0e62
                                    • Instruction ID: 5a7aff582a56e7f79f0d2a86fb57e34c2a14909572f3aea7f97950f7522ef3d5
                                    • Opcode Fuzzy Hash: b07def83a732ce2c5b7493330ad9c766716cb3200f902db2e6d88344ddbb0e62
                                    • Instruction Fuzzy Hash: CB11CD31214755EFCB108FA8EC04AAA3BA5BF45362B114729FC39DB2F0E7319994CB90
                                    APIs
                                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 001556BB
                                    • _wcslen.LIBCMT ref: 001556CD
                                    • _wcslen.LIBCMT ref: 001556D8
                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00155816
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend_wcslen
                                    • String ID:
                                    • API String ID: 455545452-0
                                    • Opcode ID: af647d079aa09a203a97e73b22a0d42befb2ff658070f527994e19e6ed4c3751
                                    • Instruction ID: faedacecb7b079ceddde45aa54d454b7b6c40150e6d5d40cfb788fd7c018558e
                                    • Opcode Fuzzy Hash: af647d079aa09a203a97e73b22a0d42befb2ff658070f527994e19e6ed4c3751
                                    • Instruction Fuzzy Hash: 2B11D671A00604EADF209F61CC95AEE777CEF10766B104026FD25EE081E770CA88CB60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c940e285fab9e21298db3c579d14493e46ef47825982cde5a35e9c9e076f7c4d
                                    • Instruction ID: 17f1165609386c9880958cafff686437077eeedb8aefa3da2af135f126e44036
                                    • Opcode Fuzzy Hash: c940e285fab9e21298db3c579d14493e46ef47825982cde5a35e9c9e076f7c4d
                                    • Instruction Fuzzy Hash: 860162B2209A1EBEF7611A786CC1FB766ADDF413B8B341325F721A59D2DB608C4061A0
                                    APIs
                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00121A47
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00121A59
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00121A6F
                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00121A8A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 811310a1a073faea1d2f31a124a8ff5fb0b913483f95f63b88b2af4e1bb4b92e
                                    • Instruction ID: 2a1c6cc10cb1535b7567c54c1578c6e0190e2377408007e2864dc69f3e32ea59
                                    • Opcode Fuzzy Hash: 811310a1a073faea1d2f31a124a8ff5fb0b913483f95f63b88b2af4e1bb4b92e
                                    • Instruction Fuzzy Hash: 7411273A901229FFEB10DBA4C985FADBB79EB18750F2000A1EA00B7290D7716E50DB94
                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 0012E1FD
                                    • MessageBoxW.USER32(?,?,?,?), ref: 0012E230
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0012E246
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0012E24D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                    • String ID:
                                    • API String ID: 2880819207-0
                                    • Opcode ID: 3d734a48f17922cf81408f9437a9ed0347efa1c29a1790564d02ed5847dd1a2a
                                    • Instruction ID: 4b048ef6537beb9f3771a9c4f19a2ca6e3e785e662c5c371fd38efd24893f06f
                                    • Opcode Fuzzy Hash: 3d734a48f17922cf81408f9437a9ed0347efa1c29a1790564d02ed5847dd1a2a
                                    • Instruction Fuzzy Hash: 36110876904365FFC7019FA8AC05A9E7FADEB45321F10421AF925E7691D3708A808BA0
                                    APIs
                                    • CreateThread.KERNEL32(00000000,?,000ECFF9,00000000,00000004,00000000), ref: 000ED218
                                    • GetLastError.KERNEL32 ref: 000ED224
                                    • __dosmaperr.LIBCMT ref: 000ED22B
                                    • ResumeThread.KERNEL32(00000000), ref: 000ED249
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                    • String ID:
                                    • API String ID: 173952441-0
                                    • Opcode ID: b434d752c6325948d743f7add12bbbcfb04c669eaeaabc487adf65799818043c
                                    • Instruction ID: 3b61852498900c805f8ae008adc19dc925eaf45c920757402f8faf70ffc9c5de
                                    • Opcode Fuzzy Hash: b434d752c6325948d743f7add12bbbcfb04c669eaeaabc487adf65799818043c
                                    • Instruction Fuzzy Hash: B8012636805248BFC7205FA7DC05BAE3B69EF81331F10025EFA24A61D1CB718841D6A0
                                    APIs
                                      • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                    • GetClientRect.USER32(?,?), ref: 00159F31
                                    • GetCursorPos.USER32(?), ref: 00159F3B
                                    • ScreenToClient.USER32(?,?), ref: 00159F46
                                    • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00159F7A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Client$CursorLongProcRectScreenWindow
                                    • String ID:
                                    • API String ID: 4127811313-0
                                    • Opcode ID: 7d27850be2ca19ba5cd471b81016308e304606d0160971b6c243623f448f5e5e
                                    • Instruction ID: 3af81749f620605511d4e4df0fb64f1527545c141a53049cebc88f816d47ae4e
                                    • Opcode Fuzzy Hash: 7d27850be2ca19ba5cd471b81016308e304606d0160971b6c243623f448f5e5e
                                    • Instruction Fuzzy Hash: F911183290021AEFDB10DFA9D8859EE7BB9FB45312F400456F921EB551D730BA85CBE2
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000C604C
                                    • GetStockObject.GDI32(00000011), ref: 000C6060
                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 000C606A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CreateMessageObjectSendStockWindow
                                    • String ID:
                                    • API String ID: 3970641297-0
                                    • Opcode ID: 43ad090990e3f323d80fdff850e9843c3206a44b05aad776b21f13872f2660f9
                                    • Instruction ID: 1287eeaf26e87f2f87df580236384bf742f0935efe4cb483226055f0253edbeb
                                    • Opcode Fuzzy Hash: 43ad090990e3f323d80fdff850e9843c3206a44b05aad776b21f13872f2660f9
                                    • Instruction Fuzzy Hash: DA115E72501609FFEF224F949C54FEF7BA9EF1C355F150115FA1466150D732ACA09B90
                                    APIs
                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 000E3B56
                                      • Part of subcall function 000E3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 000E3AD2
                                      • Part of subcall function 000E3AA3: ___AdjustPointer.LIBCMT ref: 000E3AED
                                    • _UnwindNestedFrames.LIBCMT ref: 000E3B6B
                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 000E3B7C
                                    • CallCatchBlock.LIBVCRUNTIME ref: 000E3BA4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                    • String ID:
                                    • API String ID: 737400349-0
                                    • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                    • Instruction ID: c29a8c94b6cfaf17b75cc823f3b5dc4f8d5095e70e9e3b454a061cd1d8282620
                                    • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                    • Instruction Fuzzy Hash: D7010072100189BFDF125E96CC46DEB7F6DEF98754F044054FE4866122C736D961DBA0
                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,000C13C6,00000000,00000000,?,000F301A,000C13C6,00000000,00000000,00000000,?,000F328B,00000006,FlsSetValue), ref: 000F30A5
                                    • GetLastError.KERNEL32(?,000F301A,000C13C6,00000000,00000000,00000000,?,000F328B,00000006,FlsSetValue,00162290,FlsSetValue,00000000,00000364,?,000F2E46), ref: 000F30B1
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,000F301A,000C13C6,00000000,00000000,00000000,?,000F328B,00000006,FlsSetValue,00162290,FlsSetValue,00000000), ref: 000F30BF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: LibraryLoad$ErrorLast
                                    • String ID:
                                    • API String ID: 3177248105-0
                                    • Opcode ID: ff07ab37262f860fc2557e2879dcb3638503e50973fbb78ceb9241d9035d9ae2
                                    • Instruction ID: 53ac30f2727a46e474d74fc2f41a2414431a5e6f4fad5538246ab4a681c15bc7
                                    • Opcode Fuzzy Hash: ff07ab37262f860fc2557e2879dcb3638503e50973fbb78ceb9241d9035d9ae2
                                    • Instruction Fuzzy Hash: 0801D43230132AEFCB714AB99C54A7B7BD8AF05BB1B100621FA05E7A40CF21D981D6E0
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0012747F
                                    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00127497
                                    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 001274AC
                                    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 001274CA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Type$Register$FileLoadModuleNameUser
                                    • String ID:
                                    • API String ID: 1352324309-0
                                    • Opcode ID: e0d782357d96183525a9970bf71ad673c62f5da785eb7c7dd8b19098ab955b4d
                                    • Instruction ID: 9d8086fe413ae227ab718cfb27d500ed43ed01ce1fa985791dede7bef7940d57
                                    • Opcode Fuzzy Hash: e0d782357d96183525a9970bf71ad673c62f5da785eb7c7dd8b19098ab955b4d
                                    • Instruction Fuzzy Hash: 1011C0B1209360EFE720AF14EC08FA37FFCEB00B00F108569A616DA591D7B0E954DBA1
                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00157E33
                                    • ScreenToClient.USER32(?,?), ref: 00157E4B
                                    • ScreenToClient.USER32(?,?), ref: 00157E6F
                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00157E8A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClientRectScreen$InvalidateWindow
                                    • String ID:
                                    • API String ID: 357397906-0
                                    • Opcode ID: 47c7042000d0ff6a0e89fa9e5e34e3cefcc10b5a25749bbaf7112c66411c214f
                                    • Instruction ID: 20b76d947c6cba400b91e069236fd0eb6c71874a52d5f973648dc3b81018dc83
                                    • Opcode Fuzzy Hash: 47c7042000d0ff6a0e89fa9e5e34e3cefcc10b5a25749bbaf7112c66411c214f
                                    • Instruction Fuzzy Hash: 151163B9D0024AEFDB41CF98C8859EEBBF5FB08311F104056E911E6610D734AA94CF90
                                    APIs
                                      • Part of subcall function 000D9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000D9693
                                      • Part of subcall function 000D9639: SelectObject.GDI32(?,00000000), ref: 000D96A2
                                      • Part of subcall function 000D9639: BeginPath.GDI32(?), ref: 000D96B9
                                      • Part of subcall function 000D9639: SelectObject.GDI32(?,00000000), ref: 000D96E2
                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00158887
                                    • LineTo.GDI32(?,?,?), ref: 00158894
                                    • EndPath.GDI32(?), ref: 001588A4
                                    • StrokePath.GDI32(?), ref: 001588B2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                    • String ID:
                                    • API String ID: 1539411459-0
                                    • Opcode ID: b162f5da58bd7644744c4d41e9fe985549d364f8696e15ff2416bd6e9d59aca3
                                    • Instruction ID: 6545be7ec4a0f443d010cb5797108fecc51821cead222d374c7e470d1698f754
                                    • Opcode Fuzzy Hash: b162f5da58bd7644744c4d41e9fe985549d364f8696e15ff2416bd6e9d59aca3
                                    • Instruction Fuzzy Hash: 7DF05E3A041359FEDB126F94AC09FCE3F59AF06312F048001FA21694E2C7755591CFE5
                                    APIs
                                    • GetSysColor.USER32(00000008), ref: 000D98CC
                                    • SetTextColor.GDI32(?,?), ref: 000D98D6
                                    • SetBkMode.GDI32(?,00000001), ref: 000D98E9
                                    • GetStockObject.GDI32(00000005), ref: 000D98F1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Color$ModeObjectStockText
                                    • String ID:
                                    • API String ID: 4037423528-0
                                    • Opcode ID: 39645783c03668560f5a75dd4a5b5b7dfed226c259317220db9cef907625adf1
                                    • Instruction ID: baa82235b9ca9b3b9af8662e25601c4e15d631cbe32a8aa3b1eb3dad159c1b06
                                    • Opcode Fuzzy Hash: 39645783c03668560f5a75dd4a5b5b7dfed226c259317220db9cef907625adf1
                                    • Instruction Fuzzy Hash: 6CE06D31244780EEDB215F78AC09BE83F61AB52336F04822AF6FA585E1C77146809B21
                                    APIs
                                    • GetCurrentThread.KERNEL32 ref: 00121634
                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,001211D9), ref: 0012163B
                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,001211D9), ref: 00121648
                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,001211D9), ref: 0012164F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CurrentOpenProcessThreadToken
                                    • String ID:
                                    • API String ID: 3974789173-0
                                    • Opcode ID: fe09611abc96e9289b93defb5327a4392ac0b843650aa8afca744ecf548353d7
                                    • Instruction ID: 17a9d7aa1a0c289c449be4845a2e8ace485ab1f83db82fc57ea32d14d129dadf
                                    • Opcode Fuzzy Hash: fe09611abc96e9289b93defb5327a4392ac0b843650aa8afca744ecf548353d7
                                    • Instruction Fuzzy Hash: EFE04F75602321EFD7601FA0AD0DB4B3B68AF54B92F144808F245CD080D7644480C790
                                    APIs
                                    • GetDesktopWindow.USER32 ref: 0011D858
                                    • GetDC.USER32(00000000), ref: 0011D862
                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0011D882
                                    • ReleaseDC.USER32(?), ref: 0011D8A3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CapsDesktopDeviceReleaseWindow
                                    • String ID:
                                    • API String ID: 2889604237-0
                                    • Opcode ID: 39e853c2837c7551c4b2944be67eb4dec6ca6df04b817a8b29fc40e3a0af8d8d
                                    • Instruction ID: 9a3924759927e36a0dca458ba588ee91214ebe4874df88ef21ea076839b43e28
                                    • Opcode Fuzzy Hash: 39e853c2837c7551c4b2944be67eb4dec6ca6df04b817a8b29fc40e3a0af8d8d
                                    • Instruction Fuzzy Hash: 62E01AB4800304DFCF419FA0D808A6DBBB1FB08312F108019F80AEB750C7384A82EF90
                                    APIs
                                    • GetDesktopWindow.USER32 ref: 0011D86C
                                    • GetDC.USER32(00000000), ref: 0011D876
                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0011D882
                                    • ReleaseDC.USER32(?), ref: 0011D8A3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CapsDesktopDeviceReleaseWindow
                                    • String ID:
                                    • API String ID: 2889604237-0
                                    • Opcode ID: 3a953013b4ff34061b98cfb0fe1c8679e0148057d477d9d6b51dfc50a572b53c
                                    • Instruction ID: 08a75bbb2edbfb1cc04651fac4bcf8c057427ab7c7a0fbd6f2482ec3e94e6f0e
                                    • Opcode Fuzzy Hash: 3a953013b4ff34061b98cfb0fe1c8679e0148057d477d9d6b51dfc50a572b53c
                                    • Instruction Fuzzy Hash: BBE09A75800304DFCF519FA0D808A6DBBB5FB48712B148459F94AEB750C7385A42EF90
                                    APIs
                                      • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00134ED4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Connection_wcslen
                                    • String ID: *$LPT
                                    • API String ID: 1725874428-3443410124
                                    • Opcode ID: d6c0f9fe891775aea4e22296718521b58039556b1771cca70e0429c4f1cdda55
                                    • Instruction ID: 24ebeaa50edb660d248db61a0ccb75f3532bc65f69eb284c82933b61b7ac9c2f
                                    • Opcode Fuzzy Hash: d6c0f9fe891775aea4e22296718521b58039556b1771cca70e0429c4f1cdda55
                                    • Instruction Fuzzy Hash: CD916C75A002049FCB14DF58C484EAEBBF5BF49304F198099E84A9F3A2C775EE85CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: #
                                    • API String ID: 0-1885708031
                                    • Opcode ID: 8187b00142ad664cfc25e8b2d44445ed6cfc520d7e5d66ade6b121dfa12f4fbb
                                    • Instruction ID: 5ef1341e69ab29ea2f6c44a2419b71fb2108e780664abfd71c634dfaa6df2d66
                                    • Opcode Fuzzy Hash: 8187b00142ad664cfc25e8b2d44445ed6cfc520d7e5d66ade6b121dfa12f4fbb
                                    • Instruction Fuzzy Hash: D351E1359043869EEB19EFA8C481AFE7BE4EF55310F64406AEC519B2D1D7309D82CBA0
                                    APIs
                                    • Sleep.KERNEL32(00000000), ref: 000DF2A2
                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 000DF2BB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: GlobalMemorySleepStatus
                                    • String ID: @
                                    • API String ID: 2783356886-2766056989
                                    • Opcode ID: 808a3428b67e5f424018dd9b21b56acb24ea369a41d4380c15a7adf652f861f4
                                    • Instruction ID: 8ff3cce9c03feabd3c2b0badf5a327817842ebd4fe15aff87daa0fc1813827ce
                                    • Opcode Fuzzy Hash: 808a3428b67e5f424018dd9b21b56acb24ea369a41d4380c15a7adf652f861f4
                                    • Instruction Fuzzy Hash: 75513771408744ABE320AF14DC86BAFBBF8FB84300F81885DF1D941196EB718569CB67
                                    APIs
                                    • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 001457E0
                                    • _wcslen.LIBCMT ref: 001457EC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: BuffCharUpper_wcslen
                                    • String ID: CALLARGARRAY
                                    • API String ID: 157775604-1150593374
                                    • Opcode ID: 0e96be1c1113de5800cd6accb11d254f94c5b0e5d7c79554c36ec685323dc7dd
                                    • Instruction ID: b651d68b735c9721f051c698207b020c3398757f9d6c050ae90a3679b60d86d6
                                    • Opcode Fuzzy Hash: 0e96be1c1113de5800cd6accb11d254f94c5b0e5d7c79554c36ec685323dc7dd
                                    • Instruction Fuzzy Hash: 9F419471E0020ADFCB14DFA9C8859FEBBB6FF59314F104069E515A72A2DB309D81CBA0
                                    APIs
                                    • _wcslen.LIBCMT ref: 0013D130
                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0013D13A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CrackInternet_wcslen
                                    • String ID: |
                                    • API String ID: 596671847-2343686810
                                    • Opcode ID: 84cdd07f045366bd764225303bdfef2828610c7a2ff19fb1908aaf9e95f1117c
                                    • Instruction ID: 2b4866ce4bfa2f9f6c2f199037c7bfe1a6eb1ff9f4f5245806c27b87c86f2203
                                    • Opcode Fuzzy Hash: 84cdd07f045366bd764225303bdfef2828610c7a2ff19fb1908aaf9e95f1117c
                                    • Instruction Fuzzy Hash: 45313D71D00209ABCF15EFA5DC85EEE7FB9FF04300F000059F815A6162DB32AA56CB60
                                    APIs
                                    • DestroyWindow.USER32(?,?,?,?), ref: 00153621
                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0015365C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$DestroyMove
                                    • String ID: static
                                    • API String ID: 2139405536-2160076837
                                    • Opcode ID: 61eb2e8f40b461d59de9f0ce001fcbd2a9dc15ba4997a9938c80d2b60b543017
                                    • Instruction ID: c6f39ef7acc13139873eebce04692700a3a61c6ceb52cc5bc3c067ccae055ba4
                                    • Opcode Fuzzy Hash: 61eb2e8f40b461d59de9f0ce001fcbd2a9dc15ba4997a9938c80d2b60b543017
                                    • Instruction Fuzzy Hash: EF317A71110604AEDB109F28D880EFB73A9FF88761F10961DF8B59B290DB31A9869760
                                    APIs
                                    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0015461F
                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00154634
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: '
                                    • API String ID: 3850602802-1997036262
                                    • Opcode ID: 7fcfe72eb8cce06ef911cc510c994c06f78d5721caecdbc8de31160c7b98bb0a
                                    • Instruction ID: 2e43ca9b1203facc0503bcc1d06375fa905289b2da9dc896bb1377f2a36fa5f0
                                    • Opcode Fuzzy Hash: 7fcfe72eb8cce06ef911cc510c994c06f78d5721caecdbc8de31160c7b98bb0a
                                    • Instruction Fuzzy Hash: 6D311674A0130AEFDB14CFA9C990BDA7BB5FB09305F10406AED14AB341E770A985CF90
                                    APIs
                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0015327C
                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00153287
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID: Combobox
                                    • API String ID: 3850602802-2096851135
                                    • Opcode ID: 9a247d441a60a5547de56ed437399b734c5015ca05fe7a2111df6b186ab3fda9
                                    • Instruction ID: 45f4be2c4ef013517de6c0e189b89fecc169478a8b5c004bcb99ea0d336640dd
                                    • Opcode Fuzzy Hash: 9a247d441a60a5547de56ed437399b734c5015ca05fe7a2111df6b186ab3fda9
                                    • Instruction Fuzzy Hash: 7A11B271300608BFEF259F54DC80EFB376AEB943A5F104129F938AB290D7319D959760
                                    APIs
                                      • Part of subcall function 000C600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000C604C
                                      • Part of subcall function 000C600E: GetStockObject.GDI32(00000011), ref: 000C6060
                                      • Part of subcall function 000C600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 000C606A
                                    • GetWindowRect.USER32(00000000,?), ref: 0015377A
                                    • GetSysColor.USER32(00000012), ref: 00153794
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                    • String ID: static
                                    • API String ID: 1983116058-2160076837
                                    • Opcode ID: 521ad57226d8a94aad1ecf84798a4b8b519991dd7ebefc47e2353176ba285585
                                    • Instruction ID: bb44183cfedf7894bee1570878b5663cfd9ad8706f2a466a09a1775c61e473ab
                                    • Opcode Fuzzy Hash: 521ad57226d8a94aad1ecf84798a4b8b519991dd7ebefc47e2353176ba285585
                                    • Instruction Fuzzy Hash: B11159B2A1020AEFDB00DFA8CC45EEA7BB8FB08345F004514FD65E7250E735E8559B50
                                    APIs
                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0013CD7D
                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0013CDA6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Internet$OpenOption
                                    • String ID: <local>
                                    • API String ID: 942729171-4266983199
                                    • Opcode ID: e6b5e2c621bd1fd984527b197a919a8a5bd24e59ea644c76b3f57ccdf2ef7cd8
                                    • Instruction ID: ee290d228ee05edcdbb6aa1e288183b14e8bf88a2a9ae16061f54ade5f1a08a4
                                    • Opcode Fuzzy Hash: e6b5e2c621bd1fd984527b197a919a8a5bd24e59ea644c76b3f57ccdf2ef7cd8
                                    • Instruction Fuzzy Hash: 7D11C275205631BAD7384FA68C49EE7BEACEF127A4F00422AB109A7080D7709940D7F0
                                    APIs
                                    • GetWindowTextLengthW.USER32(00000000), ref: 001534AB
                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 001534BA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: LengthMessageSendTextWindow
                                    • String ID: edit
                                    • API String ID: 2978978980-2167791130
                                    • Opcode ID: 30f2651b59b558c6f953a82a7177b2363e70cd088670b06efc3bbe9e526064d3
                                    • Instruction ID: 5beccc9d688042092cdec4c695868b6844016ac3140560ec16448efe1616add5
                                    • Opcode Fuzzy Hash: 30f2651b59b558c6f953a82a7177b2363e70cd088670b06efc3bbe9e526064d3
                                    • Instruction Fuzzy Hash: D7116D71100208EFEB124E64DC44AEB376AEB153B5F504724FD719B1D0C771DD999750
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                    • CharUpperBuffW.USER32(?,?,?), ref: 00126CB6
                                    • _wcslen.LIBCMT ref: 00126CC2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen$BuffCharUpper
                                    • String ID: STOP
                                    • API String ID: 1256254125-2411985666
                                    • Opcode ID: cce72514c5db74fcf2a815fa82282abfd176e61969dc3e827fc76a90fc4c6fc3
                                    • Instruction ID: 98af179847d0cc5088e532365c7a6b6a0e183187fad9ba0b5cab2e343669eb3d
                                    • Opcode Fuzzy Hash: cce72514c5db74fcf2a815fa82282abfd176e61969dc3e827fc76a90fc4c6fc3
                                    • Instruction Fuzzy Hash: CA01D232A0053A8BCB20AFFDEC819BF77B5EB617547510529E8A2A71D1EB31D960C690
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00121D4C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameSend_wcslen
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 624084870-1403004172
                                    • Opcode ID: f50a98ca77fca22c4708c7c8532c08c1097ed247abd3c2802af48def745ae37a
                                    • Instruction ID: aa5358293a4df2c7745149b34660b30f2803a207fc7e4139105acb24b16f1885
                                    • Opcode Fuzzy Hash: f50a98ca77fca22c4708c7c8532c08c1097ed247abd3c2802af48def745ae37a
                                    • Instruction Fuzzy Hash: 8C01D875601228FBCB08EFE4EC59DFE7769EB66350B44091AF832573C2EB3059288760
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00121C46
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameSend_wcslen
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 624084870-1403004172
                                    • Opcode ID: 6be63647757e88725c9050e285c6a9f06ad31fa3c9226b6b7717e90d9239b16a
                                    • Instruction ID: 3865505470f60baca1d3fd0afd6397d4ee4423f644069c3e7eff138c64121e2d
                                    • Opcode Fuzzy Hash: 6be63647757e88725c9050e285c6a9f06ad31fa3c9226b6b7717e90d9239b16a
                                    • Instruction Fuzzy Hash: 1F0167756811187BCB18FB90E956EFF77A99B25340F140019A416772C2EB249F3C87B5
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00121CC8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameSend_wcslen
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 624084870-1403004172
                                    • Opcode ID: 7611828c28627b814cd1fb33fb2049442225e652ee03b4cd72f985586c7e78f6
                                    • Instruction ID: 7f4740ebbab7bd4f1c9f65ac77f444f3086315226b7e81e964e64167b707a798
                                    • Opcode Fuzzy Hash: 7611828c28627b814cd1fb33fb2049442225e652ee03b4cd72f985586c7e78f6
                                    • Instruction Fuzzy Hash: AA01D67568022877CB04FBA0DA56EFE77A99B31340F540029B81273282EB209F38C7B1
                                    APIs
                                      • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                      • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                    • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00121DD3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ClassMessageNameSend_wcslen
                                    • String ID: ComboBox$ListBox
                                    • API String ID: 624084870-1403004172
                                    • Opcode ID: b9bd9f49608589f488cb43ed4c556333077557797ffb5ee50fe7c57e00a8e311
                                    • Instruction ID: 3a26d6819d5d38b8a0739aa145ffdbb171f5be3535e7b42b8a82c896d23fdeb9
                                    • Opcode Fuzzy Hash: b9bd9f49608589f488cb43ed4c556333077557797ffb5ee50fe7c57e00a8e311
                                    • Instruction Fuzzy Hash: 58F0A971A41228B7D714FBE4DC5AFFE7768AB21350F440919B432672C2DB605A288660
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: _wcslen
                                    • String ID: 3, 3, 16, 1
                                    • API String ID: 176396367-3042988571
                                    • Opcode ID: d6b4e08805b5855b4ef86875176dfffff6bf421ff332bf280ae3fea6705678c4
                                    • Instruction ID: 72aba16aeedd1d01038284d9b7c35ba7109720ec8f98a045a7d31c865c76579d
                                    • Opcode Fuzzy Hash: d6b4e08805b5855b4ef86875176dfffff6bf421ff332bf280ae3fea6705678c4
                                    • Instruction Fuzzy Hash: D8E02B02204260149231227AACC19BF5789DFC9750718182BF981E22F7EB94CD9193F1
                                    APIs
                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00120B23
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Message
                                    • String ID: AutoIt$Error allocating memory.
                                    • API String ID: 2030045667-4017498283
                                    • Opcode ID: 3526b8c2c36930cd50a3d488a4d441967606d3b4a95cc1623170e6c6a6b4d44d
                                    • Instruction ID: b497d935ceefffc428ef07f9e164a95eecf8f1c96e060d0721c1ec1b944a6195
                                    • Opcode Fuzzy Hash: 3526b8c2c36930cd50a3d488a4d441967606d3b4a95cc1623170e6c6a6b4d44d
                                    • Instruction Fuzzy Hash: 65E0D8312443186ED2203B957C03FC97B85CF09F55F10446BFB58695C38BE2259046E9
                                    APIs
                                      • Part of subcall function 000DF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,000E0D71,?,?,?,000C100A), ref: 000DF7CE
                                    • IsDebuggerPresent.KERNEL32(?,?,?,000C100A), ref: 000E0D75
                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,000C100A), ref: 000E0D84
                                    Strings
                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 000E0D7F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                    • API String ID: 55579361-631824599
                                    • Opcode ID: 156779dc952e715e7b1003198834865cce243b7c3e435bab9b8b8eee3315e589
                                    • Instruction ID: 08ab6df9a05a67394b15aa1910d59a637a69fed563120ebcd7b97bef85a15c3b
                                    • Opcode Fuzzy Hash: 156779dc952e715e7b1003198834865cce243b7c3e435bab9b8b8eee3315e589
                                    • Instruction Fuzzy Hash: 5EE06D74204341CFD3609FB9D8087967BE0EB00745F01892DE892DAA52DBF5E4C8CBA1
                                    APIs
                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0013302F
                                    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00133044
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: Temp$FileNamePath
                                    • String ID: aut
                                    • API String ID: 3285503233-3010740371
                                    • Opcode ID: bb0a4b263bd1f94c1ab6597c5797734549a94ebdea0d5f6888f685b8c736f158
                                    • Instruction ID: cc353d65736244ba903f87a252715e13502367cb71728f32843b77112e07f335
                                    • Opcode Fuzzy Hash: bb0a4b263bd1f94c1ab6597c5797734549a94ebdea0d5f6888f685b8c736f158
                                    • Instruction Fuzzy Hash: 13D05E72500328ABDA20ABA4AC4EFCB7A7CDB04751F0002A1B655E6491EAB09A84CBD0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: LocalTime
                                    • String ID: %.3d$X64
                                    • API String ID: 481472006-1077770165
                                    • Opcode ID: 0d8d623c6b9dd0b18be798a3fc7de17b52d25feff83a3d294fed470b0952ee59
                                    • Instruction ID: eb8bce1e9d741ea56f71f1d972f71fec7e4d409eb0fa8694b2249e15763d7e85
                                    • Opcode Fuzzy Hash: 0d8d623c6b9dd0b18be798a3fc7de17b52d25feff83a3d294fed470b0952ee59
                                    • Instruction Fuzzy Hash: 8AD01261808219E9CB5C96D0EC459F9B37CFB19341F618473F81791040E734D5886B62
                                    APIs
                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0015232C
                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0015233F
                                      • Part of subcall function 0012E97B: Sleep.KERNEL32 ref: 0012E9F3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FindMessagePostSleepWindow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 529655941-2988720461
                                    • Opcode ID: 1935afc4de01c3fdccfe32bc1e980a891f704fc0e011dea36defebf1d46fa746
                                    • Instruction ID: 424b2878ce6d68d5f28f374a3464f64698d356b7b3d6766036641e7a4be95276
                                    • Opcode Fuzzy Hash: 1935afc4de01c3fdccfe32bc1e980a891f704fc0e011dea36defebf1d46fa746
                                    • Instruction Fuzzy Hash: 07D0C976394310BAE668BB70AC1FFC67A549B10B15F0049167645AA1D0DAA0A8818A94
                                    APIs
                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0015236C
                                    • PostMessageW.USER32(00000000), ref: 00152373
                                      • Part of subcall function 0012E97B: Sleep.KERNEL32 ref: 0012E9F3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: FindMessagePostSleepWindow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 529655941-2988720461
                                    • Opcode ID: a9f7162eb8017c5aecdb6bd7b56444f46da331ef866de92bcd4859ca1594ba94
                                    • Instruction ID: 3665c2c9e7e03b31a58c0e280893813c81cebe220cc8f8a6cc2793fe9b8246c7
                                    • Opcode Fuzzy Hash: a9f7162eb8017c5aecdb6bd7b56444f46da331ef866de92bcd4859ca1594ba94
                                    • Instruction Fuzzy Hash: 88D0C9723D1310BEE668BB70AC1FFC676549B14B15F4049167645AA1D0DAA0A8818A94
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 000FBE93
                                    • GetLastError.KERNEL32 ref: 000FBEA1
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 000FBEFC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2340498466.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                    • Associated: 00000000.00000002.2340467871.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.000000000015C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340548910.0000000000182000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340588959.000000000018C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2340605890.0000000000194000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c0000_file.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$ErrorLast
                                    • String ID:
                                    • API String ID: 1717984340-0
                                    • Opcode ID: 7ea89eafef56f0bd70ae3cc4e3c041059ac361ccd8ce3e2a506c416288021723
                                    • Instruction ID: 0404d657a9bc5467b117c5579d690e834103ce724a262660a2ed0071fd0dcaa7
                                    • Opcode Fuzzy Hash: 7ea89eafef56f0bd70ae3cc4e3c041059ac361ccd8ce3e2a506c416288021723
                                    • Instruction Fuzzy Hash: 4641C13460420AEFCB718F65CC44ABA7BE5EF41320F294169FA599B5A2DB318D04EF60