Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1523788
MD5:0083d14c374eacc7490d77cf1c0ec24d
SHA1:3712e1ccd617a7a16bb987e48bdbd832378d9a69
SHA256:ed2cd00fc7953f7fe548e562e2efba931572e187b681ffa6c4e550a337974efa
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6780 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 0083D14C374EACC7490D77CF1C0EC24D)
    • chrome.exe (PID: 6832 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 3244 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7816 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3200 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7824 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.1661968085.00000000015FF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    Process Memory Space: file.exe PID: 6780JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: file.exeVirustotal: Detection: 16%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: file.exeJoe Sandbox ML: detected
      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.4:49773 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.4:49784 version: TLS 1.2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00C4DBBE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C568EE FindFirstFileW,FindClose,0_2_00C568EE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00C5698F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C4D076
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C4D3A9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C59642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C59642
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C5979D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C59B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00C59B2B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C55C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00C55C97
      Source: global trafficTCP traffic: 192.168.2.4:55426 -> 1.1.1.1:53
      Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
      Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
      Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00C5CE44
      Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
      Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1679895145&timestamp=1727830868372 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=CmVcBD3Mm4Qpz1WhzJPeqwWLE_77PserRuXi98mmGVMvS2ZMeWmEL-4I5LRV_RZZM4c7KmVoVu-QCWVDOPL8iwm4jfk0UZoSvP0RltnYVYPjxj1NH7cnOEAi1v1SQzFvlJzw7aeyuHjDwZVsXV8b9vy8TaKzmiykG0kQhtxzJuX_evwJVA
      Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=HY3ClahCK1Y4vtm&MD=9tgDKVzV HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
      Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=HY3ClahCK1Y4vtm&MD=9tgDKVzV HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
      Source: chromecache_141.3.drString found in binary or memory: _.fq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.fq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.fq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.fq(_.oq(c))+"&hl="+_.fq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.fq(m)+"/chromebook/termsofservice.html?languageCode="+_.fq(d)+"&regionCode="+_.fq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
      Source: global trafficDNS traffic detected: DNS query: youtube.com
      Source: global trafficDNS traffic detected: DNS query: www.youtube.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
      Source: global trafficDNS traffic detected: DNS query: play.google.com
      Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: chromecache_141.3.drString found in binary or memory: https://accounts.google.com
      Source: chromecache_141.3.drString found in binary or memory: https://accounts.google.com/TOS?loc=
      Source: chromecache_147.3.drString found in binary or memory: https://apis.google.com/js/api.js
      Source: chromecache_141.3.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
      Source: chromecache_141.3.drString found in binary or memory: https://families.google.com/intl/
      Source: chromecache_147.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
      Source: chromecache_147.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
      Source: chromecache_147.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
      Source: chromecache_141.3.drString found in binary or memory: https://g.co/recover
      Source: chromecache_141.3.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
      Source: chromecache_141.3.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
      Source: chromecache_141.3.drString found in binary or memory: https://play.google/intl/
      Source: chromecache_141.3.drString found in binary or memory: https://policies.google.com/privacy
      Source: chromecache_141.3.drString found in binary or memory: https://policies.google.com/privacy/additional
      Source: chromecache_141.3.drString found in binary or memory: https://policies.google.com/privacy/google-partners
      Source: chromecache_141.3.drString found in binary or memory: https://policies.google.com/technologies/cookies
      Source: chromecache_141.3.drString found in binary or memory: https://policies.google.com/technologies/location-data
      Source: chromecache_141.3.drString found in binary or memory: https://policies.google.com/terms
      Source: chromecache_141.3.drString found in binary or memory: https://policies.google.com/terms/location
      Source: chromecache_141.3.drString found in binary or memory: https://policies.google.com/terms/service-specific
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
      Source: chromecache_147.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
      Source: chromecache_141.3.drString found in binary or memory: https://support.google.com/accounts?hl=
      Source: chromecache_141.3.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
      Source: chromecache_141.3.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
      Source: chromecache_147.3.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
      Source: chromecache_141.3.drString found in binary or memory: https://www.google.com
      Source: chromecache_141.3.drString found in binary or memory: https://www.google.com/intl/
      Source: chromecache_147.3.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
      Source: chromecache_147.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
      Source: chromecache_147.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
      Source: chromecache_147.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
      Source: chromecache_147.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
      Source: chromecache_147.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
      Source: chromecache_141.3.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
      Source: chromecache_141.3.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
      Source: file.exe, 00000000.00000003.1662027276.000000000161A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1662082926.0000000001602000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
      Source: chromecache_141.3.drString found in binary or memory: https://youtube.com/t/terms?gl=
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
      Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55429
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
      Source: unknownNetwork traffic detected: HTTP traffic on port 55428 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55428
      Source: unknownNetwork traffic detected: HTTP traffic on port 55430 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55430
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
      Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
      Source: unknownNetwork traffic detected: HTTP traffic on port 55429 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.4:49773 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.4:49784 version: TLS 1.2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C5EAFF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00C5ED6A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C5EAFF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00C4AA57
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C79576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00C79576

      System Summary

      barindex
      Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
      Source: file.exe, 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6e354f6f-d
      Source: file.exe, 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_472f4578-e
      Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7e81df6d-3
      Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ebf758a2-3
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00C4D5EB
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C41201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00C41201
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00C4E8F6
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C520460_2_00C52046
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BE80600_2_00BE8060
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C482980_2_00C48298
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C1E4FF0_2_00C1E4FF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C1676B0_2_00C1676B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C748730_2_00C74873
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BECAF00_2_00BECAF0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C0CAA00_2_00C0CAA0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BFCC390_2_00BFCC39
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C16DD90_2_00C16DD9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BE91C00_2_00BE91C0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BFB1190_2_00BFB119
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C013940_2_00C01394
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C017060_2_00C01706
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C0781B0_2_00C0781B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C019B00_2_00C019B0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BE79200_2_00BE7920
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BF997D0_2_00BF997D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C07A4A0_2_00C07A4A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C07CA70_2_00C07CA7
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C01C770_2_00C01C77
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C19EEE0_2_00C19EEE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C6BE440_2_00C6BE44
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C01F320_2_00C01F32
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00BFF9F2 appears 31 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00C00A30 appears 46 times
      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: classification engineClassification label: mal72.troj.evad.winEXE@36/30@12/6
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C537B5 GetLastError,FormatMessageW,0_2_00C537B5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C410BF AdjustTokenPrivileges,CloseHandle,0_2_00C410BF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C416C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00C416C3
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C551CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00C551CD
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00C4D4DC
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00C5648E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BE42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00BE42A2
      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: file.exeVirustotal: Detection: 16%
      Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3200 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecoveryJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3200 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BE42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00BE42DE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C00A76 push ecx; ret 0_2_00C00A89
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BED014 push cs; ret 0_2_00BED01E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BF1263 pushad ; ret 0_2_00BF1266
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BF125F pushad ; ret 0_2_00BF1262
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BF1253 pushad ; ret 0_2_00BF1256
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BF124F pushad ; ret 0_2_00BF1252
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BF124D pushad ; ret 0_2_00BF124E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BF1247 pushad ; ret 0_2_00BF124A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C356D8 push eax; ret 0_2_00C356DA
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C356E9 push esp; ret 0_2_00C356EA
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C357E1 push ebx; ret 0_2_00C357E2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C357E4 push esi; ret 0_2_00C357FE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C3178B push ss; ret 0_2_00C3179D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C31788 push ss; ret 0_2_00C31789
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35788 push eax; ret 0_2_00C3578A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35799 push esp; ret 0_2_00C3579A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C3179F push ss; ret 0_2_00C317A1
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C317A3 push ss; ret 0_2_00C317A5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C317A8 push ss; ret 0_2_00C317A9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C317AC push ss; ret 0_2_00C317AD
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C317B0 push ss; ret 0_2_00C317B1
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C357B5 push ebx; ret 0_2_00C357B6
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35741 push esp; ret 0_2_00C35742
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C3575C push eax; ret 0_2_00C3575E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C3576D push esp; ret 0_2_00C3576E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35707 push eax; ret 0_2_00C35712
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35705 push ecx; ret 0_2_00C35706
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35730 push eax; ret 0_2_00C35732
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35801 push esi; ret 0_2_00C35802
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35805 push esi; ret 0_2_00C35806
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C35809 push esi; ret 0_2_00C3580A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BFF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00BFF98E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C71C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00C71C41
      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96139
      Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.3 %
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00C4DBBE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C568EE FindFirstFileW,FindClose,0_2_00C568EE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00C5698F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C4D076
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C4D3A9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C59642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C59642
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C5979D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C59B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00C59B2B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C55C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00C55C97
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BE42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00BE42DE
      Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C5EAA2 BlockInput,0_2_00C5EAA2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C12622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C12622
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BE42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00BE42DE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C04CE8 mov eax, dword ptr fs:[00000030h]0_2_00C04CE8
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C40B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00C40B62
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C12622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C12622
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C0083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C0083F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C009D5 SetUnhandledExceptionFilter,0_2_00C009D5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C00C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00C00C21
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C41201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00C41201
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C22BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00C22BA5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C4B226 SendInput,keybd_event,0_2_00C4B226
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C622DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00C622DA
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C40B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00C40B62
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C41663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00C41663
      Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: file.exeBinary or memory string: Shell_TrayWnd
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C00698 cpuid 0_2_00C00698
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C58195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00C58195
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C3D27A GetUserNameW,0_2_00C3D27A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C1BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00C1BB6F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BE42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00BE42DE

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000003.1661968085.00000000015FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6780, type: MEMORYSTR
      Source: file.exeBinary or memory string: WIN_81
      Source: file.exeBinary or memory string: WIN_XP
      Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
      Source: file.exeBinary or memory string: WIN_XPe
      Source: file.exeBinary or memory string: WIN_VISTA
      Source: file.exeBinary or memory string: WIN_7
      Source: file.exeBinary or memory string: WIN_8

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000003.1661968085.00000000015FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6780, type: MEMORYSTR
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C61204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00C61204
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00C61806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00C61806
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure2
      Valid Accounts
      1
      Native API
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      1
      Disable or Modify Tools
      21
      Input Capture
      2
      System Time Discovery
      Remote Services1
      Archive Collected Data
      2
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/Job2
      Valid Accounts
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      LSASS Memory1
      Account Discovery
      Remote Desktop Protocol21
      Input Capture
      11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
      Valid Accounts
      2
      Obfuscated Files or Information
      Security Account Manager1
      File and Directory Discovery
      SMB/Windows Admin Shares3
      Clipboard Data
      3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
      Access Token Manipulation
      1
      DLL Side-Loading
      NTDS15
      System Information Discovery
      Distributed Component Object ModelInput Capture4
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
      Process Injection
      2
      Valid Accounts
      LSA Secrets12
      Security Software Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Virtualization/Sandbox Evasion
      Cached Domain Credentials1
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
      Access Token Manipulation
      DCSync3
      Process Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
      Process Injection
      Proc Filesystem1
      Application Window Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
      System Owner/User Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      file.exe17%VirustotalBrowse
      file.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      www3.l.google.com0%VirustotalBrowse
      play.google.com0%VirustotalBrowse
      www.youtube.com0%VirustotalBrowse
      youtube.com0%VirustotalBrowse
      www.google.com0%VirustotalBrowse
      youtube-ui.l.google.com0%VirustotalBrowse
      accounts.youtube.com0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://play.google/intl/0%URL Reputationsafe
      https://families.google.com/intl/0%URL Reputationsafe
      https://policies.google.com/technologies/location-data0%URL Reputationsafe
      https://apis.google.com/js/api.js0%URL Reputationsafe
      https://apis.google.com/js/api.js0%URL Reputationsafe
      https://policies.google.com/privacy/google-partners0%URL Reputationsafe
      https://policies.google.com/terms/service-specific0%URL Reputationsafe
      https://g.co/recover0%URL Reputationsafe
      https://policies.google.com/privacy/additional0%URL Reputationsafe
      https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
      https://policies.google.com/technologies/cookies0%URL Reputationsafe
      https://policies.google.com/terms0%URL Reputationsafe
      https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
      https://support.google.com/accounts?hl=0%URL Reputationsafe
      https://policies.google.com/terms/location0%URL Reputationsafe
      https://policies.google.com/privacy0%URL Reputationsafe
      https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
      https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
      https://youtube.com/t/terms?gl=0%VirustotalBrowse
      https://play.google.com/work/enroll?identifier=0%VirustotalBrowse
      https://www.google.com0%VirustotalBrowse
      https://www.google.com/intl/1%VirustotalBrowse
      https://www.youtube.com/t/terms?chromeless=1&hl=0%VirustotalBrowse
      https://play.google.com/log?hasfast=true&authuser=0&format=json0%VirustotalBrowse
      https://play.google.com/log?format=json&hasfast=true0%VirustotalBrowse
      https://play.google.com/log?format=json&hasfast=true&authuser=00%VirustotalBrowse
      https://www.google.com/favicon.ico0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      youtube-ui.l.google.com
      142.250.186.78
      truefalseunknown
      www3.l.google.com
      142.250.186.142
      truefalseunknown
      play.google.com
      216.58.206.78
      truefalseunknown
      www.google.com
      142.250.181.228
      truefalseunknown
      youtube.com
      216.58.206.78
      truefalseunknown
      accounts.youtube.com
      unknown
      unknownfalseunknown
      www.youtube.com
      unknown
      unknownfalseunknown
      NameMaliciousAntivirus DetectionReputation
      https://play.google.com/log?format=json&hasfast=true&authuser=0falseunknown
      https://www.google.com/favicon.icofalseunknown
      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalseunknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://play.google/intl/chromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://families.google.com/intl/chromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://youtube.com/t/terms?gl=chromecache_141.3.drfalseunknown
      https://policies.google.com/technologies/location-datachromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://www.google.com/intl/chromecache_141.3.drfalseunknown
      https://apis.google.com/js/api.jschromecache_147.3.drfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://policies.google.com/privacy/google-partnerschromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://play.google.com/work/enroll?identifier=chromecache_141.3.drfalseunknown
      https://policies.google.com/terms/service-specificchromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://g.co/recoverchromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/privacy/additionalchromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/technologies/cookieschromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/termschromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_147.3.drfalse
      • URL Reputation: safe
      unknown
      https://www.google.comchromecache_141.3.drfalseunknown
      https://play.google.com/log?format=json&hasfast=truechromecache_141.3.drfalseunknown
      https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_141.3.drfalseunknown
      https://support.google.com/accounts?hl=chromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/terms/locationchromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/privacychromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://support.google.com/accounts?p=new-si-uichromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_141.3.drfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      142.250.186.78
      youtube-ui.l.google.comUnited States
      15169GOOGLEUSfalse
      216.58.206.78
      play.google.comUnited States
      15169GOOGLEUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      142.250.181.228
      www.google.comUnited States
      15169GOOGLEUSfalse
      142.250.186.142
      www3.l.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.4
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1523788
      Start date and time:2024-10-02 03:00:08 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 44s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:file.exe
      Detection:MAL
      Classification:mal72.troj.evad.winEXE@36/30@12/6
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 96%
      • Number of executed functions: 36
      • Number of non-executed functions: 308
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.184.195, 172.217.18.14, 142.251.173.84, 34.104.35.123, 172.217.18.3, 142.250.185.234, 142.250.181.234, 172.217.18.10, 142.250.184.202, 142.250.185.170, 142.250.186.74, 172.217.16.202, 142.250.184.234, 142.250.74.202, 142.250.186.42, 142.250.186.170, 172.217.16.138, 216.58.206.74, 216.58.206.42, 142.250.186.106, 142.250.185.202, 142.250.185.74, 142.250.186.138, 216.58.212.170, 172.217.23.106, 172.217.18.106, 93.184.221.240, 192.229.221.95, 142.250.186.163, 108.177.15.84, 172.217.16.206
      • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
      • Not all processes where analyzed, report is missing behavior information
      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      239.255.255.250file.exeGet hashmaliciousCredential FlusherBrowse
        http://tvsurf.jp/Get hashmaliciousUnknownBrowse
          https://docs.google.com/forms/d/e/1FAIpQLSdpweVM1inxltc4AWxPatki3D8pgrAZSJz39loK6XS45S8Ubg/viewform?usp=pp_urlGet hashmaliciousUnknownBrowse
            http://racrodisaver.co.in/Get hashmaliciousUnknownBrowse
              file.exeGet hashmaliciousCredential FlusherBrowse
                https://files.constantcontact.com/2d77228b901/702368a5-3f96-4cb6-b61d-aab8728be1ff.pdfGet hashmaliciousUnknownBrowse
                  https://www.elightsailorsbank.uksfholdings.com/Get hashmaliciousUnknownBrowse
                    https://docs.google.com/presentation/d/e/2PACX-1vRuKBrQqA6BNfxZo0BAmhaaVHWHS5xGpGnvHJ3KKWtc6LdsEuOoWSlBNaOKZjp5GXLjhWJKRMb-grou/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                      https://sanbernardinoscounty.telcom-info.com/Get hashmaliciousHtmlDropperBrowse
                        file.exeGet hashmaliciousCredential FlusherBrowse
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          28a2c9bd18a11de089ef85a160da29e4file.exeGet hashmaliciousCredential FlusherBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          http://tvsurf.jp/Get hashmaliciousUnknownBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          https://docs.google.com/forms/d/e/1FAIpQLSdpweVM1inxltc4AWxPatki3D8pgrAZSJz39loK6XS45S8Ubg/viewform?usp=pp_urlGet hashmaliciousUnknownBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          http://racrodisaver.co.in/Get hashmaliciousUnknownBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          file.exeGet hashmaliciousCredential FlusherBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          https://files.constantcontact.com/2d77228b901/702368a5-3f96-4cb6-b61d-aab8728be1ff.pdfGet hashmaliciousUnknownBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          https://www.elightsailorsbank.uksfholdings.com/Get hashmaliciousUnknownBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          https://docs.google.com/presentation/d/e/2PACX-1vRuKBrQqA6BNfxZo0BAmhaaVHWHS5xGpGnvHJ3KKWtc6LdsEuOoWSlBNaOKZjp5GXLjhWJKRMb-grou/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          https://sanbernardinoscounty.telcom-info.com/Get hashmaliciousHtmlDropperBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          file.exeGet hashmaliciousCredential FlusherBrowse
                          • 4.175.87.197
                          • 184.28.90.27
                          No context
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (468)
                          Category:downloaded
                          Size (bytes):1858
                          Entropy (8bit):5.298162049824456
                          Encrypted:false
                          SSDEEP:48:o7vGoolL3ALFKphnpiu7xOKAcfO/3d/rYh4vZorw:o/QLUFUL4KA+2y0Mw
                          MD5:CE055F881BDAB4EF6C1C8AA4B3890348
                          SHA1:2671741A70E9F5B608F690AAEEA4972003747654
                          SHA-256:9B91C23691D6032CDFE28863E369624B2EDB033E1487A1D1BB0977E3590E5462
                          SHA-512:8A22250628985C2E570E6FBADFC0D5CB6753F0735130F9E74962A409476C2859C5C81F8A0F5C427A9F13ED399C8E251FA43FF67AD5F16860640D45E7A538E857
                          Malicious:false
                          Reputation:low
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Nc=a.Ea.Nc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.qu,Nc:_.DE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.m3)||function(){}};_.GPb=function(a){return(a==null?void 0:a.Op)||function(){}};._.HPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.IPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.kO=function(){return!0};_.nu(_.An,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (683)
                          Category:downloaded
                          Size (bytes):3131
                          Entropy (8bit):5.355381206612617
                          Encrypted:false
                          SSDEEP:48:o7FEEM3MtH15jNQ8jsK3rnw0dkckTrKEp/OqLE9xz0W5Bzv3M6hIHYA+JITbwrF8:oq675jOArwoAmI/DLaxNPL5m+m6w
                          MD5:E2A7251AD83A0D0634FEA2703D10ED07
                          SHA1:90D72011F31FC40D3DA3748F2817F90A29EB5C01
                          SHA-256:1079B49C4AAF5C10E4F2E6A086623F40D200A71FF2A1F64E88AA6C91E4BE7A6F
                          SHA-512:CD6D75580EA8BD97CF7C7C0E0BD9D9A54FB6EA7DF1DDB5A95E94D38B260F9EE1425C640839ECD229B8D01E145CF2786CA374D31EC537EB8FE17FF415D5B985F5
                          Malicious:false
                          Reputation:low
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gA=function(a){_.W.call(this,a.Fa)};_.J(gA,_.W);gA.Ba=_.W.Ba;gA.prototype.eS=function(a){return _.Xe(this,{Xa:{gT:_.ll}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.li(function(e){window._wjdc=function(f){d(f);e(ZJa(f,b,a))}}):ZJa(c,b,a)})};var ZJa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.gT.eS(c)};.gA.prototype.aa=function(a,b){var c=_.Zra(b).Rj;if(c.startsWith("$")){var d=_.gm.get(a);_.uq[b]&&(d||(d={},_.gm.set(a,d)),d[c]=_.uq[b],delete _.uq[b],_.vq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.nu(_.Lfa,gA);._.l();._.k("SNUn3");._.YJa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var $Ja=function(a){var b=_.tq(a);return b?new _.li(function(c,d){var e=function(){b=_.tq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                          Category:downloaded
                          Size (bytes):5430
                          Entropy (8bit):3.6534652184263736
                          Encrypted:false
                          SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                          MD5:F3418A443E7D841097C714D69EC4BCB8
                          SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                          SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                          SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                          Malicious:false
                          Reputation:high, very likely benign file
                          URL:https://www.google.com/favicon.ico
                          Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (5693)
                          Category:downloaded
                          Size (bytes):698314
                          Entropy (8bit):5.595120835898624
                          Encrypted:false
                          SSDEEP:6144:TJvaKtQfcxene0F2HhPM8RGYcBlKmd5r6XISxi7SlncOpYMSrBg5X3O4mAEFD7:TJyKtkIct842ISxXJ09
                          MD5:F82438F9EAD5F57493C673008EED9E09
                          SHA1:E4681E68FD66D8C76C6ACBC21E2C45F36FD645BC
                          SHA-256:B4B092F54EAAA82BFAA159B8D61FB867B51C3067CBD60F4904A205A11F503250
                          SHA-512:89027A7B1B3A080D40411F2E6E3B62BF57AC60879223566E71BD41D900C17051F0A058EFE04F8F1FED5E05DC54617D7A86F83D21BDED0F79347795C8B980B4B2
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                          Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (2907)
                          Category:downloaded
                          Size (bytes):22833
                          Entropy (8bit):5.425034548615223
                          Encrypted:false
                          SSDEEP:384:7lFo6ZEdpgtmyiPixV9OX9gMBpHkHnfst9lZulagGcwYHiRFjJzN7:77o6ZviPixV8xpEHn89l4IgGcwYCRtb7
                          MD5:749B18538FE32BFE0815D75F899F5B21
                          SHA1:AF95A019211AF69F752A43CAA54A83C2AFD41D28
                          SHA-256:116B2687C1D5E00DB56A79894AB0C12D4E2E000B9379B7E7AD751B84DF611F3F
                          SHA-512:E4B6F4556AA0FD9979BB52681508F5E26FFB256473803F74F7F5C8D93FA3636D7D0A5835618FBC6123022805CE0D9616A7451A0F302C665E28A6090B5D588505
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.uu.prototype.da=_.ca(40,function(){return _.rj(this,3)});_.$y=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.$y.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.az=function(){this.ka=!0;var a=_.vj(_.dk(_.Be("TSDtV",window),_.zya),_.uu,1,_.qj())[0];if(a){var b={};for(var c=_.n(_.vj(a,_.Aya,2,_.qj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Jj(d,1).toString();switch(_.tj(d,_.vu)){case 3:b[e]=_.Hj(d,_.lj(d,_.vu,3));break;case 2:b[e]=_.Jj(d,_.lj(d,_.vu,2));break;case 4:b[e]=_.Kj(d,_.lj(d,_.vu,4));break;case 5:b[e]=_.Lj(d,_.lj(d,_.vu,5));break;case 6:b[e]=_.Pj(d,_.ff,6,_.vu);break;default:throw Error("jd`"+_.tj(d,_.vu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.az.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Cya(a.flagName);if(b===null)a=a.de
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:HTML document, ASCII text, with very long lines (681)
                          Category:downloaded
                          Size (bytes):4066
                          Entropy (8bit):5.363016925556486
                          Encrypted:false
                          SSDEEP:96:G2CiFZX5BReR68ujioIRVrqtyzBeTV6SfyAKLif9c7w:bCMZXVeR6jiosVrqtyzBaImyAKw9x
                          MD5:FC5E597D923838E10390DADD12651A81
                          SHA1:C9959F8D539DB5DF07B8246EC12539B6A9CC101F
                          SHA-256:A7EBD5280C50AE93C061EAE1E9727329E015E97531F8F2D82D0E3EA76ADB37B4
                          SHA-512:784CA572808F184A849388723FBB3701E6981D885BBA8A330A933F90BF0B36A2E4A491D4463A27911B1D9F7A7134F23E15F187FC7CB4554EAE9BC252513EED7C
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                          Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.aqa);._.k("sOXFj");.var tu=function(a){_.W.call(this,a.Fa)};_.J(tu,_.W);tu.Ba=_.W.Ba;tu.prototype.aa=function(a){return a()};_.nu(_.$pa,tu);._.l();._.k("oGtAuc");._.yya=new _.pf(_.aqa);._.l();._.k("q0xTif");.var sza=function(a){var b=function(d){_.Sn(d)&&(_.Sn(d).Jc=null,_.Du(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Pu=function(a){_.kt.call(this,a.Fa);this.Qa=this.dom=null;if(this.kl()){var b=_.zm(this.Ug(),[_.Em,_.Dm]);b=_.ni([b[_.Em],b[_.Dm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.hu(this,b)}this.Ra=a.lm.zea};_.J(Pu,_.kt);Pu.Ba=function(){return{lm:{zea:function(a){return _.Ue(a)}}}};Pu.prototype.zp=function(a){return this.Ra.zp(a)};.Pu.prototype.getData=function(a){return this.Ra.getData(a)};Pu.prototype.qo=function(){_.Kt(this.d
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                          Category:downloaded
                          Size (bytes):52280
                          Entropy (8bit):7.995413196679271
                          Encrypted:true
                          SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                          MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                          SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                          SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                          SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                          Malicious:false
                          URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                          Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (533)
                          Category:downloaded
                          Size (bytes):9210
                          Entropy (8bit):5.404371326611379
                          Encrypted:false
                          SSDEEP:192:EEFZpeip4HzZlY0If0Ma23jcUcrhCx6VD1TYPi8:Es/p4jgjUhtD1TY68
                          MD5:21E893B65627B397E22619A9F5BB9662
                          SHA1:F561B0F66211C1E7B22F94B4935C312AB7087E85
                          SHA-256:FFA9B8BC8EF2CDFF5EB4BA1A0BA1710A253A5B42535E2A369D5026967DCF4673
                          SHA-512:3DE3CD6A4E9B06AB3EB324E90A40B5F2AEEA8D7D6A2651C310E993CF79EEB5AC6E2E33C587F46B2DD20CC862354FD1A61AEBB9B990E6805F6629404BA285F8FA
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.qNa=_.y("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Lc(b);else if(b instanceof _.Fp&&b.ia&&b.ia===_.A)b=_.Ya(b.Lw()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Ya(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.HX=function(a){var b=_.Io(a,"[jsslot]");if(b.size()>0)return b;b=new _.Go([_.Kk("span")]);_.Jo(b,"jsslot","");a.empty().append(b);return b};_.NLb=function(a){return a===null||typeof a==="string"&&_.Hi(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Ua=a.controller.Ua;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.mv},header:{jsname:"tJHJj",ctor:_.mv},nav:{jsname:"DH6Rkf",ct
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (755)
                          Category:downloaded
                          Size (bytes):1460
                          Entropy (8bit):5.291808298251231
                          Encrypted:false
                          SSDEEP:24:kMYD7DuZvuhqCsNRxoYTY9/qoVk7hz1l2p6vDMW94uEQOeGbCx4VGbgCSFBV87OU:o7DuZWhv6oy12kvwKEeGbC6GbHSh/Hrw
                          MD5:4CA7ADFE744A690411EA4D3EA8DB9E4B
                          SHA1:2CF1777A199E25378D330DA68BED1871B5C5BC32
                          SHA-256:128129BA736B3094323499B0498A5B3A909C1529717461C34B70080A5B1603BD
                          SHA-512:8BD3477AF41D1F0FE74AFFCB177BEC0F5F4FDCBBA6BD29D9C2567E6FFDEF5DEB7FF74BF348F33209C39D7BB4958E748DF6731D3DC8F6947352276BC92EAF9E79
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.VZa=new _.pf(_.Am);._.l();._.k("P6sQOc");.var $Za=!!(_.Kh[1]&16);var b_a=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=a_a(this)},c_a=function(a){var b={};_.La(a.yS(),function(e){b[e]=!0});var c=a.pS(),d=a.tS();return new b_a(a.qP(),c.aa()*1E3,a.WR(),d.aa()*1E3,b)},a_a=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ka,a.aa),a.Ca)},OG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var PG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.EV;this.ea=a.Ea.metadata;a=a.Ea.Xga;this.fetch=a.fetch.bind(a)};_.J(PG,_.W);PG.Ba=function(){return{Ea:{EV:_.YZa,metadata:_.VZa,Xga:_.OZa}}};PG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Sm(a);var c=this.da.eV;return(c=c?c_a(c):null)&&OG(c)?_.wya(a,d_a(this,a,b,c)):_.Sm(a)};.var d_a=function(a,b,c,d){return c.then(function(e){return e},function(e)
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (553)
                          Category:downloaded
                          Size (bytes):743936
                          Entropy (8bit):5.791086230020914
                          Encrypted:false
                          SSDEEP:6144:YVXWBQkPdzg5pTX1ROv/duPzd8C3s891/N:Nfd8j91/N
                          MD5:1A3606C746E7B1C949D9078E8E8C1244
                          SHA1:56A3EB1E93E61ACD7AAD39DC3526CB60E23651B1
                          SHA-256:5F49AE5162183E2EF6F082B29EC99F18DB0212B8ADDB03699B1BFB0AC7869742
                          SHA-512:F2D15243311C472331C5F3F083BB6C18D38EC0247A3F3CBAFD96DBA40E4EAE489CDA04176672E39FE3760EF7347596B2A5EAB0FB0125E881EF514475C99863B9
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlE6O04h0gj7Nu50q-nmaRKM6WWcJw/m=_b,_tp"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x39e13c40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Ma,Sa,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (570)
                          Category:downloaded
                          Size (bytes):3467
                          Entropy (8bit):5.514745431912774
                          Encrypted:false
                          SSDEEP:96:ozbld2fNUmeqJNizhNtt1W8t//loyIpXmdVE2w:onSKE8PWe/Cy4X3j
                          MD5:8DEF399E8355ABC23E64505281005099
                          SHA1:24FF74C3AEFD7696D84FF148465DF4B1B60B1696
                          SHA-256:F128D7218E1286B05DF11310AD3C8F4CF781402698E45448850D2A3A22F5F185
                          SHA-512:33721DD47658D8E12ADF6BD9E9316EB89F5B6297927F7FD60F954E04B829DCBF0E1AE6DDD9A3401F45E0011AE4B1397B960C218238A3D0F633A2173D8E604082
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var cya=function(){var a=_.He();return _.Lj(a,1)},Yt=function(a){this.Da=_.t(a,0,Yt.messageId)};_.J(Yt,_.w);Yt.prototype.Ha=function(){return _.Dj(this,1)};Yt.prototype.Va=function(a){return _.Vj(this,1,a)};Yt.messageId="f.bo";var Zt=function(){_.hm.call(this)};_.J(Zt,_.hm);Zt.prototype.xd=function(){this.CT=!1;dya(this);_.hm.prototype.xd.call(this)};Zt.prototype.aa=function(){eya(this);if(this.wC)return fya(this),!1;if(!this.KV)return $t(this),!0;this.dispatchEvent("p");if(!this.zP)return $t(this),!0;this.wM?(this.dispatchEvent("r"),$t(this)):fya(this);return!1};.var gya=function(a){var b=new _.ap(a.W4);a.qQ!=null&&_.Jn(b,"authuser",a.qQ);return b},fya=function(a){a.wC=!0;var b=gya(a),c="rt=r&f_uid="+_.pk(a.zP);_.cn(b,(0,_.bg)(a.ea,a),"POST",c)};.Zt.prototype.ea=function(a){a=a.target;eya(this);if(_.fn(a)){this.cK=0;if(this.wM)this.wC=!1,this.dispatchEvent("r"
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with no line terminators
                          Category:downloaded
                          Size (bytes):84
                          Entropy (8bit):4.875266466142591
                          Encrypted:false
                          SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                          MD5:87B6333E98B7620EA1FF98D1A837A39E
                          SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                          SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                          SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                          Malicious:false
                          URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                          Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (395)
                          Category:downloaded
                          Size (bytes):1608
                          Entropy (8bit):5.257113147606035
                          Encrypted:false
                          SSDEEP:48:o72ZrNZ4yNAbU+15fMxIdf5WENoBCbw7DbG2bEJrw:oyNNAY+1i4HoBNG2Ilw
                          MD5:F06E2DC5CC446B39F878B5F8E4D78418
                          SHA1:9F1F34FDD8F8DAB942A9B95D9F720587B6F6AD48
                          SHA-256:118E4D2FE7CEF205F9AFC87636554C6D8220882B158333EE3D1990282D158B8F
                          SHA-512:893C4F883CD1C88C6AAF5A6E7F232D62823A53E1FFDE5C1C52BB066D75781DD041F4D281CDBF18070D921CE862652D8863E2B9D5E0190CFA4128890D62C44168
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Hla);_.eA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.eA,_.W);_.eA.Ba=function(){return{Xa:{cache:_.dt}}};_.eA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.xG(c)},this);return{}};_.nu(_.Nla,_.eA);._.l();._.k("ZDZcre");.var fH=function(a){_.W.call(this,a.Fa);this.Wl=a.Ea.Wl;this.d4=a.Ea.metadata;this.aa=a.Ea.ot};_.J(fH,_.W);fH.Ba=function(){return{Ea:{Wl:_.KG,metadata:_.VZa,ot:_.HG}}};fH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.d4.getType(c.Od())===2?b.Wl.Rb(c):b.Wl.fetch(c);return _.yl(c,_.LG)?d.then(function(e){return _.Dd(e)}):d},this)};_.nu(_.Sla,fH);._.l();._.k("K5nYTd");._.UZa=new _.pf(_.Ola);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var NG=function(a){_.W.call(this,a.Fa);this.aa=a.Ea.tQ};_.J(NG,_.W);NG.Ba=func
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (522)
                          Category:downloaded
                          Size (bytes):5050
                          Entropy (8bit):5.289052544075544
                          Encrypted:false
                          SSDEEP:96:o4We0hP7OBFXYvB1sig3Fd8HkaXzLmUrv8Vh1WJlLQXT2v2gqw:655758Fd8HkaPZ0GmAD
                          MD5:26E26FD11772DFF5C7004BEA334289CC
                          SHA1:638DAAF541BDE31E95AEE4F8ADA677434D7051DB
                          SHA-256:ADFE3E4960982F5EF4C043052A9990D8683C5FC2B590E817B6B1A5774DDE2CE3
                          SHA-512:C31929EB6D1C60D6A84A2574FF60490394A6D6F9B354972F3328952F570D80B3F2AEC916B0E1B66DDB1AC056EB75BFAC477E7AF631D0AD1810EDBAF025465D66
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.jNa=_.y("wg1P6b",[_.TA,_.Cn,_.Kn]);._.k("wg1P6b");.var Z5a;Z5a=_.mh(["aria-"]);._.uJ=function(a){_.X.call(this,a.Fa);this.Ka=this.wa=this.aa=this.viewportElement=this.Na=null;this.Hc=a.Ea.ff;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Pi();a=-1*parseInt(_.Co(this.Pi().el(),"marginTop")||"0",10);var b=parseInt(_.Co(this.Pi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.$5a(this,this.aa.el())));_.kF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.uJ,_.X);_.uJ.Ba=function(){return{Ea:{ff:_.ZE,focus:_.KE,Fc:_.ru}}};_.uJ.prototype.xF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.fz)?(a=a.data.fz,this.Ca=a==="MOUS
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (1694)
                          Category:downloaded
                          Size (bytes):32500
                          Entropy (8bit):5.378903546681047
                          Encrypted:false
                          SSDEEP:768:zYlbuROstb0e39nKGrkysU0smpu4OLOdzIf1p/5GeSsngurz6aKEEEGo/:zYl61Cysbu4OLOdzIfrIen72ZFo/
                          MD5:BF4BF9728A7C302FBA5B14F3D0F1878B
                          SHA1:2607CA7A93710D629400077FF3602CB207E6F53D
                          SHA-256:8981E7B228DF7D6A8797C0CD1E9B0F1F88337D5F0E1C27A04E7A57D2C4309798
                          SHA-512:AC9E170FC3AFDC0CF6BB8E926B93EF129A5FAD1BBA51B60BABCF3555E9B652E98F86A00FB099879DED35DD3FFE72ECFA597E20E6CA8CF402BEDEC40F78412EDA
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Aua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.ap("//www.google.com/images/cleardot.gif");_.op(c)}this.ka=c};_.h=Aua.prototype;_.h.Zc=null;_.h.lZ=1E4;_.h.bA=!1;_.h.nQ=0;_.h.zJ=null;_.h.bV=null;_.h.setTimeout=function(a){this.lZ=a};_.h.start=function(){if(this.bA)throw Error("dc");this.bA=!0;this.nQ=0;Bua(this)};_.h.stop=function(){Cua(this);this.bA=!1};.var Bua=function(a){a.nQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.km((0,_.bg)(a.aH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Fja,a),a.aa.onerror=(0,_.bg)(a.Eja,a),a.aa.onabort=(0,_.bg)(a.Dja,a),a.zJ=_.km(a.Gja,a.lZ,a),a.aa.src=String(a.ka))};_.h=Aua.prototype;_.h.Fja=function(){this.aH(!0)};_.h.Eja=function(){this.aH(!1)};_.h.Dja=function(){this.aH(!1)};_.h.Gja=function(){this.aH(!1)};._.h.aH=function(a){Cua(this);a?(this.bA=!1,this.da.call(this.ea,!0)):this.nQ<=0?Bua(this):(this.bA=!1,
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.581111526455095
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:file.exe
                          File size:918'016 bytes
                          MD5:0083d14c374eacc7490d77cf1c0ec24d
                          SHA1:3712e1ccd617a7a16bb987e48bdbd832378d9a69
                          SHA256:ed2cd00fc7953f7fe548e562e2efba931572e187b681ffa6c4e550a337974efa
                          SHA512:501331e4023cec09692e322417e28c9300816c713ef34185fc1a88cdcead847b62b1aa8f21a48980741af06e2dcd5806a8346569d2bf9093f9d760a5cb00d963
                          SSDEEP:12288:BqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaTTQ:BqDEvCTbMWu7rQYlBQcBiT6rprG8anQ
                          TLSH:66159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                          Icon Hash:aaf3e3e3938382a0
                          Entrypoint:0x420577
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                          Time Stamp:0x66FC9852 [Wed Oct 2 00:48:18 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:948cc502fe9226992dce9417f952fce3
                          Instruction
                          call 00007F3E847D6133h
                          jmp 00007F3E847D5A3Fh
                          push ebp
                          mov ebp, esp
                          push esi
                          push dword ptr [ebp+08h]
                          mov esi, ecx
                          call 00007F3E847D5C1Dh
                          mov dword ptr [esi], 0049FDF0h
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          and dword ptr [ecx+04h], 00000000h
                          mov eax, ecx
                          and dword ptr [ecx+08h], 00000000h
                          mov dword ptr [ecx+04h], 0049FDF8h
                          mov dword ptr [ecx], 0049FDF0h
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          push dword ptr [ebp+08h]
                          mov esi, ecx
                          call 00007F3E847D5BEAh
                          mov dword ptr [esi], 0049FE0Ch
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          and dword ptr [ecx+04h], 00000000h
                          mov eax, ecx
                          and dword ptr [ecx+08h], 00000000h
                          mov dword ptr [ecx+04h], 0049FE14h
                          mov dword ptr [ecx], 0049FE0Ch
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          mov esi, ecx
                          lea eax, dword ptr [esi+04h]
                          mov dword ptr [esi], 0049FDD0h
                          and dword ptr [eax], 00000000h
                          and dword ptr [eax+04h], 00000000h
                          push eax
                          mov eax, dword ptr [ebp+08h]
                          add eax, 04h
                          push eax
                          call 00007F3E847D87DDh
                          pop ecx
                          pop ecx
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          lea eax, dword ptr [ecx+04h]
                          mov dword ptr [ecx], 0049FDD0h
                          push eax
                          call 00007F3E847D8828h
                          pop ecx
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          mov esi, ecx
                          lea eax, dword ptr [esi+04h]
                          mov dword ptr [esi], 0049FDD0h
                          push eax
                          call 00007F3E847D8811h
                          test byte ptr [ebp+08h], 00000001h
                          pop ecx
                          Programming Language:
                          • [ C ] VS2008 SP1 build 30729
                          • [IMP] VS2008 SP1 build 30729
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9750.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0xd40000x97500x98001f4c8f5b1284def9e60d0d6135a1801fFalse0.29438219572368424data5.225999060905397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                          RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                          RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                          RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                          RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                          RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                          RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                          RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                          RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                          RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                          RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                          RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                          RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                          RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                          RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                          RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                          RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                          RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                          RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                          RT_RCDATA0xdc7b80xa18data1.0042569659442724
                          RT_GROUP_ICON0xdd1d00x76dataEnglishGreat Britain0.6610169491525424
                          RT_GROUP_ICON0xdd2480x14dataEnglishGreat Britain1.25
                          RT_GROUP_ICON0xdd25c0x14dataEnglishGreat Britain1.15
                          RT_GROUP_ICON0xdd2700x14dataEnglishGreat Britain1.25
                          RT_VERSION0xdd2840xdcdataEnglishGreat Britain0.6181818181818182
                          RT_MANIFEST0xdd3600x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                          DLLImport
                          WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                          MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                          WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                          PSAPI.DLLGetProcessMemoryInfo
                          IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                          USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                          UxTheme.dllIsThemeActive
                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                          USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                          GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                          SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                          OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                          Language of compilation systemCountry where language is spokenMap
                          EnglishGreat Britain
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 2, 2024 03:01:00.694494963 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:00.694593906 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:00.694663048 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:00.695451021 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:00.695487976 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.348037958 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.376781940 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:01.376804113 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.377224922 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.377279997 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:01.378552914 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.378597021 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:01.382900953 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:01.382967949 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.383429050 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:01.383439064 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.433551073 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:01.629956961 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.630069971 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.630125999 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:01.631402969 CEST49732443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:01.631441116 CEST44349732216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:01.642836094 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:01.642874002 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:01.642936945 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:01.643569946 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:01.643589020 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.282176971 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.282449961 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.282479048 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.283020020 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.283088923 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.284045935 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.284099102 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.285056114 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.285140991 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.285270929 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.285280943 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.332438946 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.579858065 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.579909086 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.580085993 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.580095053 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:02.580152988 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.582070112 CEST49736443192.168.2.4142.250.186.78
                          Oct 2, 2024 03:01:02.582093000 CEST44349736142.250.186.78192.168.2.4
                          Oct 2, 2024 03:01:03.941863060 CEST49675443192.168.2.4173.222.162.32
                          Oct 2, 2024 03:01:05.004761934 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:05.004801989 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:05.004885912 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:05.005053997 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:05.005072117 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:05.175656080 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:05.175685883 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:05.175759077 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:05.177318096 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:05.177329063 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:05.648680925 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:05.648890018 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:05.648905993 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:05.650305986 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:05.650362015 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:05.651281118 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:05.651360989 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:05.698733091 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:05.698748112 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:05.745599031 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:05.816350937 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:05.816423893 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:05.820323944 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:05.820331097 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:05.820573092 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:05.870709896 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:06.293081045 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:06.339410067 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:06.478005886 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:06.478075981 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:06.478123903 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:06.478233099 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:06.478249073 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:06.478260040 CEST49742443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:06.478266001 CEST44349742184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:06.720010996 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:06.720046997 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:06.720104933 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:06.721445084 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:06.721458912 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:07.446871996 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:07.447045088 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:07.451109886 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:07.451117992 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:07.451329947 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:07.455260992 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:07.499433994 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:07.729756117 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:07.729830027 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:07.731513023 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:07.732444048 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:07.732444048 CEST49745443192.168.2.4184.28.90.27
                          Oct 2, 2024 03:01:07.732460022 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:07.732466936 CEST44349745184.28.90.27192.168.2.4
                          Oct 2, 2024 03:01:09.724523067 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:09.724550962 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:09.724610090 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:09.724800110 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:09.724811077 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.371251106 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.371412992 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.371426105 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.371808052 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.371867895 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.372415066 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.372466087 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.373351097 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.373408079 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.373614073 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.373621941 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.417812109 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.694205999 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.694252968 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.694284916 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.694303036 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.694320917 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.694339037 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.700153112 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.700210094 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.700218916 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.706537008 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.706568003 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.706605911 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.706615925 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.706660032 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.712691069 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.712759018 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.718885899 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.718966007 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.718998909 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.719044924 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.760442972 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:10.760485888 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:10.760545015 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:10.760744095 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:10.760757923 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:10.784420967 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.784460068 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.784496069 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.784516096 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.784528017 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.784557104 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.784564972 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.784606934 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.790138006 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.790178061 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.790206909 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.790218115 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.790261984 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.796197891 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.796267986 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.802360058 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.802416086 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.802424908 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.808700085 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.808763981 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.808773041 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.815180063 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.815244913 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.815253019 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.815496922 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.815542936 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.827594995 CEST49756443192.168.2.4142.250.186.142
                          Oct 2, 2024 03:01:10.827614069 CEST44349756142.250.186.142192.168.2.4
                          Oct 2, 2024 03:01:10.877407074 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:10.877429008 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:10.877506971 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:10.877794027 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:10.877813101 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.409322977 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.409549952 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.409569025 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.409926891 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.409986973 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.410655022 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.410702944 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.411715031 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.411824942 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.411962986 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.411969900 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.464099884 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.593663931 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.593888998 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.593903065 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.594230890 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.594288111 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.594829082 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.594882011 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.595002890 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.595052958 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.595154047 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.595161915 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.636384010 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.712574005 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.712637901 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.712681055 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.713105917 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.713118076 CEST44349760216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.713125944 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.713160038 CEST49760443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.713875055 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.713906050 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.713959932 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.714176893 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.714190006 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.893675089 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.894233942 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.894247055 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.894268036 CEST44349762216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.894299984 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.894336939 CEST49762443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.895051003 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.895083904 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:11.895155907 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.895428896 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:11.895442009 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.347667933 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.347863913 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.347901106 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.348216057 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.348289013 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.348820925 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.348872900 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.348967075 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.349035978 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.349081039 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.349097967 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.349106073 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.403511047 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.528419018 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.528610945 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.528621912 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.528944969 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.528999090 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.529572010 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.529627085 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.529973984 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.530029058 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.530093908 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.530102015 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.530117989 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.565659046 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.565776110 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.565830946 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.566365004 CEST49765443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.566380024 CEST44349765216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.568964958 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:12.575402975 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.575948954 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.615401983 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:12.746422052 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.747231960 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.747292995 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.748162031 CEST49767443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:12.748169899 CEST44349767216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:12.834820986 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:12.834965944 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:12.835021019 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:12.835036039 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:12.835131884 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:12.835180044 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:12.835186005 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:12.835468054 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:12.835515022 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:12.835702896 CEST49741443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:01:12.835706949 CEST44349741142.250.181.228192.168.2.4
                          Oct 2, 2024 03:01:16.692779064 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:16.692815065 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:16.692928076 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:16.694108963 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:16.694118023 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:17.486896992 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:17.486970901 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:17.490113974 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:17.490122080 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:17.490346909 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:17.542351007 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:18.208303928 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:18.251426935 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.467694044 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.467713118 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.467719078 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.467731953 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.467739105 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.467741013 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.467765093 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:18.467772961 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.467799902 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:18.467819929 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:18.468583107 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.468635082 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:18.468640089 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.468657970 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:18.469042063 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:18.765635014 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:18.765659094 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:18.765810966 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:18.766100883 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:18.766112089 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:19.250158072 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:19.250179052 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:19.250199080 CEST49773443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:19.250205040 CEST443497734.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:19.406492949 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:19.406795025 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:19.406810045 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:19.407124043 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:19.407409906 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:19.407465935 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:19.407546043 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:19.407557964 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:19.407566071 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:19.726253033 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:19.727643013 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:19.731453896 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:19.732206106 CEST49778443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:19.732218981 CEST44349778216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:41.670578957 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:41.670634031 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:41.670727968 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:41.671034098 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:41.671051979 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.296426058 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.312237024 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.312269926 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.312622070 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.312952042 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.313013077 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.313128948 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.313146114 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.313157082 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.454272032 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.454303026 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.454451084 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.454679012 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.454689980 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.553391933 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.553500891 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.553710938 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.553878069 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.553916931 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.596589088 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.597495079 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:42.597572088 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.597692966 CEST49781443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:42.597702980 CEST44349781216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.091984034 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.092241049 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.092258930 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.092609882 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.092892885 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.092952013 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.093044043 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.093081951 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.093086004 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.200934887 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.201148987 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.201178074 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.201536894 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.201817989 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.201889038 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.201917887 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.201968908 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.201982021 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.246298075 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.391711950 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.392556906 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.392616987 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.393105030 CEST49782443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.393117905 CEST44349782216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.503635883 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.504663944 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:43.504750967 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.504815102 CEST49783443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:01:43.504846096 CEST44349783216.58.206.78192.168.2.4
                          Oct 2, 2024 03:01:55.503118992 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:55.503158092 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:55.503221035 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:55.503566980 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:55.503580093 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.281124115 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.281200886 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.287349939 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.287362099 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.287604094 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.316056967 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.363400936 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.614425898 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.614449024 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.614463091 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.614511013 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.614537001 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.614552021 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.614590883 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.615483999 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.615523100 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.615536928 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.615542889 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.615569115 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.615569115 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.615606070 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.644160986 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.644179106 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:01:56.644190073 CEST49784443192.168.2.44.175.87.197
                          Oct 2, 2024 03:01:56.644195080 CEST443497844.175.87.197192.168.2.4
                          Oct 2, 2024 03:02:05.059547901 CEST49786443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:02:05.059582949 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:05.059662104 CEST49786443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:02:05.059907913 CEST49786443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:02:05.059926033 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:05.722795963 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:05.723052025 CEST49786443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:02:05.723078012 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:05.723366022 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:05.723632097 CEST49786443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:02:05.723689079 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:05.776918888 CEST49786443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:02:10.232196093 CEST4972480192.168.2.4199.232.214.172
                          Oct 2, 2024 03:02:10.237442017 CEST8049724199.232.214.172192.168.2.4
                          Oct 2, 2024 03:02:10.237519979 CEST4972480192.168.2.4199.232.214.172
                          Oct 2, 2024 03:02:13.420778036 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:13.420830011 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:13.420883894 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:13.421392918 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:13.421420097 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:13.421477079 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:13.421658039 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:13.421672106 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:13.421821117 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:13.421838045 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.101203918 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.101572990 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.101588964 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.101917028 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.102224112 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.102277040 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.102277994 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.102380991 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.102400064 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.102407932 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.102485895 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.102499008 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.102818012 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.103068113 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.103125095 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.103207111 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.103221893 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.103235006 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.400619984 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.401086092 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.401212931 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.401278019 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.401752949 CEST49789443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.401767015 CEST44349789216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.401930094 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:14.401973963 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.402270079 CEST49788443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:14.402286053 CEST44349788216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:15.633614063 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:15.633683920 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:15.633734941 CEST49786443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:02:28.322160959 CEST49786443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:02:28.322185993 CEST44349786142.250.181.228192.168.2.4
                          Oct 2, 2024 03:02:32.387687922 CEST5542653192.168.2.41.1.1.1
                          Oct 2, 2024 03:02:32.392575026 CEST53554261.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:32.392689943 CEST5542653192.168.2.41.1.1.1
                          Oct 2, 2024 03:02:32.392738104 CEST5542653192.168.2.41.1.1.1
                          Oct 2, 2024 03:02:32.397871017 CEST53554261.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:32.844121933 CEST53554261.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:32.844973087 CEST5542653192.168.2.41.1.1.1
                          Oct 2, 2024 03:02:32.850002050 CEST53554261.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:32.850106955 CEST5542653192.168.2.41.1.1.1
                          Oct 2, 2024 03:02:43.536245108 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:43.536298990 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:43.536376953 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:43.536737919 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:43.536753893 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:43.767721891 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:43.767761946 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:43.767821074 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:43.768076897 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:43.768091917 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.170566082 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.170893908 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.170916080 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.171233892 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.171484947 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.171541929 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.171612978 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.171632051 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.171642065 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.397099972 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.397360086 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.397382975 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.397701025 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.397993088 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.398051023 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.398128986 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.398149967 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.398160934 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.469968081 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.470624924 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.470680952 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.470782042 CEST55428443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.470801115 CEST44355428216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.694279909 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.695090055 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:02:44.695147991 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.695405006 CEST55429443192.168.2.4216.58.206.78
                          Oct 2, 2024 03:02:44.695417881 CEST44355429216.58.206.78192.168.2.4
                          Oct 2, 2024 03:03:05.122500896 CEST55430443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:03:05.122530937 CEST44355430142.250.181.228192.168.2.4
                          Oct 2, 2024 03:03:05.122602940 CEST55430443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:03:05.122883081 CEST55430443192.168.2.4142.250.181.228
                          Oct 2, 2024 03:03:05.122898102 CEST44355430142.250.181.228192.168.2.4
                          Oct 2, 2024 03:03:05.773521900 CEST44355430142.250.181.228192.168.2.4
                          Oct 2, 2024 03:03:05.824466944 CEST55430443192.168.2.4142.250.181.228
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 2, 2024 03:01:00.644874096 CEST53546871.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:00.670622110 CEST5108653192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:00.670778990 CEST5700653192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:00.680566072 CEST53570061.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:00.680743933 CEST53510861.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:00.691694975 CEST53637601.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:01.634242058 CEST6056453192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:01.634407043 CEST5650053192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:01.640862942 CEST53605641.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:01.641448975 CEST53565001.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:01.710680008 CEST53545391.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:04.996521950 CEST6248953192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:04.996588945 CEST5959353192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:05.003854036 CEST53624891.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:05.003901958 CEST53595931.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:06.914540052 CEST53623411.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:09.707880974 CEST5461353192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:09.708040953 CEST6215453192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:09.714474916 CEST53546131.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:09.715394974 CEST53621541.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:10.741667986 CEST6447253192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:10.741818905 CEST5278653192.168.2.41.1.1.1
                          Oct 2, 2024 03:01:10.749495983 CEST53644721.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:10.750228882 CEST53527861.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:12.801067114 CEST53616711.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:18.667090893 CEST53631651.1.1.1192.168.2.4
                          Oct 2, 2024 03:01:21.799177885 CEST138138192.168.2.4192.168.2.255
                          Oct 2, 2024 03:01:37.653053045 CEST53594921.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:00.335366964 CEST53625011.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:00.435928106 CEST53521681.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:11.789369106 CEST53511901.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:13.353992939 CEST5472753192.168.2.41.1.1.1
                          Oct 2, 2024 03:02:13.354113102 CEST5339653192.168.2.41.1.1.1
                          Oct 2, 2024 03:02:13.419821978 CEST53547271.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:13.420214891 CEST53533961.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:28.329862118 CEST53548431.1.1.1192.168.2.4
                          Oct 2, 2024 03:02:32.386821032 CEST53526801.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Oct 2, 2024 03:01:00.670622110 CEST192.168.2.41.1.1.10x70c0Standard query (0)youtube.comA (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:00.670778990 CEST192.168.2.41.1.1.10xd831Standard query (0)youtube.com65IN (0x0001)false
                          Oct 2, 2024 03:01:01.634242058 CEST192.168.2.41.1.1.10x93dfStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.634407043 CEST192.168.2.41.1.1.10xf8c4Standard query (0)www.youtube.com65IN (0x0001)false
                          Oct 2, 2024 03:01:04.996521950 CEST192.168.2.41.1.1.10xf89eStandard query (0)www.google.comA (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:04.996588945 CEST192.168.2.41.1.1.10x9bdStandard query (0)www.google.com65IN (0x0001)false
                          Oct 2, 2024 03:01:09.707880974 CEST192.168.2.41.1.1.10x4120Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:09.708040953 CEST192.168.2.41.1.1.10x9b6eStandard query (0)accounts.youtube.com65IN (0x0001)false
                          Oct 2, 2024 03:01:10.741667986 CEST192.168.2.41.1.1.10x9584Standard query (0)play.google.comA (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:10.741818905 CEST192.168.2.41.1.1.10x77b7Standard query (0)play.google.com65IN (0x0001)false
                          Oct 2, 2024 03:02:13.353992939 CEST192.168.2.41.1.1.10xf433Standard query (0)play.google.comA (IP address)IN (0x0001)false
                          Oct 2, 2024 03:02:13.354113102 CEST192.168.2.41.1.1.10xaee3Standard query (0)play.google.com65IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 2, 2024 03:01:00.680566072 CEST1.1.1.1192.168.2.40xd831No error (0)youtube.com65IN (0x0001)false
                          Oct 2, 2024 03:01:00.680743933 CEST1.1.1.1192.168.2.40x70c0No error (0)youtube.com216.58.206.78A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com216.58.212.174A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.640862942 CEST1.1.1.1192.168.2.40x93dfNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:01.641448975 CEST1.1.1.1192.168.2.40xf8c4No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                          Oct 2, 2024 03:01:01.641448975 CEST1.1.1.1192.168.2.40xf8c4No error (0)youtube-ui.l.google.com65IN (0x0001)false
                          Oct 2, 2024 03:01:05.003854036 CEST1.1.1.1192.168.2.40xf89eNo error (0)www.google.com142.250.181.228A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:05.003901958 CEST1.1.1.1192.168.2.40x9bdNo error (0)www.google.com65IN (0x0001)false
                          Oct 2, 2024 03:01:09.714474916 CEST1.1.1.1192.168.2.40x4120No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                          Oct 2, 2024 03:01:09.714474916 CEST1.1.1.1192.168.2.40x4120No error (0)www3.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:01:09.715394974 CEST1.1.1.1192.168.2.40x9b6eNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                          Oct 2, 2024 03:01:10.749495983 CEST1.1.1.1192.168.2.40x9584No error (0)play.google.com216.58.206.78A (IP address)IN (0x0001)false
                          Oct 2, 2024 03:02:13.419821978 CEST1.1.1.1192.168.2.40xf433No error (0)play.google.com216.58.206.78A (IP address)IN (0x0001)false
                          • youtube.com
                          • www.youtube.com
                          • fs.microsoft.com
                          • https:
                            • accounts.youtube.com
                            • play.google.com
                            • www.google.com
                          • slscr.update.microsoft.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.449732216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:01 UTC851OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                          Host: youtube.com
                          Connection: keep-alive
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          sec-ch-ua-platform: "Windows"
                          Upgrade-Insecure-Requests: 1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: none
                          Sec-Fetch-Mode: navigate
                          Sec-Fetch-User: ?1
                          Sec-Fetch-Dest: document
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-02 01:01:01 UTC1704INHTTP/1.1 301 Moved Permanently
                          Content-Type: application/binary
                          X-Content-Type-Options: nosniff
                          Expires: Wed, 02 Oct 2024 01:01:01 GMT
                          Date: Wed, 02 Oct 2024 01:01:01 GMT
                          Cache-Control: private, max-age=31536000
                          Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                          X-Frame-Options: SAMEORIGIN
                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                          Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                          Content-Security-Policy: require-trusted-types-for 'script'
                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                          Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                          Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Server: ESF
                          Content-Length: 0
                          X-XSS-Protection: 0
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.449736142.250.186.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:02 UTC869OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                          Host: www.youtube.com
                          Connection: keep-alive
                          Upgrade-Insecure-Requests: 1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: none
                          Sec-Fetch-Mode: navigate
                          Sec-Fetch-User: ?1
                          Sec-Fetch-Dest: document
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-02 01:01:02 UTC2634INHTTP/1.1 303 See Other
                          Content-Type: application/binary
                          X-Content-Type-Options: nosniff
                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                          Pragma: no-cache
                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                          Date: Wed, 02 Oct 2024 01:01:02 GMT
                          Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                          X-Frame-Options: SAMEORIGIN
                          Strict-Transport-Security: max-age=31536000
                          Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                          Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                          Content-Security-Policy: require-trusted-types-for 'script'
                          P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                          Server: ESF
                          Content-Length: 0
                          X-XSS-Protection: 0
                          Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Wed, 02-Oct-2024 01:31:02 GMT; Path=/; Secure; HttpOnly
                          Set-Cookie: YSC=VTF1q8MjCZY; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                          Set-Cookie: VISITOR_INFO1_LIVE=W9NTMYQsqs4; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 01:01:02 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                          Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgLQ%3D%3D; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 01:01:02 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.449742184.28.90.27443
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:06 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          Accept-Encoding: identity
                          User-Agent: Microsoft BITS/7.8
                          Host: fs.microsoft.com
                          2024-10-02 01:01:06 UTC467INHTTP/1.1 200 OK
                          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                          Content-Type: application/octet-stream
                          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                          Server: ECAcc (lpl/EF06)
                          X-CID: 11
                          X-Ms-ApiVersion: Distribute 1.2
                          X-Ms-Region: prod-neu-z1
                          Cache-Control: public, max-age=143084
                          Date: Wed, 02 Oct 2024 01:01:06 GMT
                          Connection: close
                          X-CID: 2


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          3192.168.2.449745184.28.90.27443
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:07 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          Accept-Encoding: identity
                          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                          Range: bytes=0-2147483646
                          User-Agent: Microsoft BITS/7.8
                          Host: fs.microsoft.com
                          2024-10-02 01:01:07 UTC515INHTTP/1.1 200 OK
                          ApiVersion: Distribute 1.1
                          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                          Content-Type: application/octet-stream
                          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                          Server: ECAcc (lpl/EF06)
                          X-CID: 11
                          X-Ms-ApiVersion: Distribute 1.2
                          X-Ms-Region: prod-weu-z1
                          Cache-Control: public, max-age=143027
                          Date: Wed, 02 Oct 2024 01:01:07 GMT
                          Content-Length: 55
                          Connection: close
                          X-CID: 2
                          2024-10-02 01:01:07 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          4192.168.2.449756142.250.186.1424433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:10 UTC1236OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1679895145&timestamp=1727830868372 HTTP/1.1
                          Host: accounts.youtube.com
                          Connection: keep-alive
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-arch: "x86"
                          sec-ch-ua-platform: "Windows"
                          sec-ch-ua-platform-version: "10.0.0"
                          sec-ch-ua-model: ""
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          Upgrade-Insecure-Requests: 1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: cross-site
                          Sec-Fetch-Mode: navigate
                          Sec-Fetch-User: ?1
                          Sec-Fetch-Dest: iframe
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-02 01:01:10 UTC1969INHTTP/1.1 200 OK
                          Content-Type: text/html; charset=utf-8
                          X-Frame-Options: ALLOW-FROM https://accounts.google.com
                          Content-Security-Policy: frame-ancestors https://accounts.google.com
                          Content-Security-Policy: script-src 'report-sample' 'nonce-X8YTxyuqqaAP3rUkP1d4iw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                          Pragma: no-cache
                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                          Date: Wed, 02 Oct 2024 01:01:10 GMT
                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                          Cross-Origin-Opener-Policy: same-origin
                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Cross-Origin-Resource-Policy: cross-origin
                          reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmLw15BikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh-Patk_b2QRu_Jg5hUlJLym_MD4zJTWvJLOkMiU_NzEzLzk_Pzsztbg4tagstSjeyMDIxMDSyEjPwCK-wAAA-Ast6g"
                          Server: ESF
                          X-XSS-Protection: 0
                          X-Content-Type-Options: nosniff
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:01:10 UTC1969INData Raw: 37 36 31 39 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 58 38 59 54 78 79 75 71 71 61 41 50 33 72 55 6b 50 31 64 34 69 77 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                          Data Ascii: 7619<html><head><script nonce="X8YTxyuqqaAP3rUkP1d4iw">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                          2024-10-02 01:01:10 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                          Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                          2024-10-02 01:01:10 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                          Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                          2024-10-02 01:01:10 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                          Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                          2024-10-02 01:01:10 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                          Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                          2024-10-02 01:01:10 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                          Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                          2024-10-02 01:01:10 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                          Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                          2024-10-02 01:01:10 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                          Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                          2024-10-02 01:01:10 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                          Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                          2024-10-02 01:01:10 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                          Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          5192.168.2.449760216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:11 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Accept: */*
                          Access-Control-Request-Method: POST
                          Access-Control-Request-Headers: x-goog-authuser
                          Origin: https://accounts.google.com
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-02 01:01:11 UTC520INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                          Access-Control-Max-Age: 86400
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:01:11 GMT
                          Server: Playlog
                          Content-Length: 0
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          6192.168.2.449762216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:11 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Accept: */*
                          Access-Control-Request-Method: POST
                          Access-Control-Request-Headers: x-goog-authuser
                          Origin: https://accounts.google.com
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-02 01:01:11 UTC520INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                          Access-Control-Max-Age: 86400
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:01:11 GMT
                          Server: Playlog
                          Content-Length: 0
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          7192.168.2.449765216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:12 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 519
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-02 01:01:12 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 30 38 36 39 34 31 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727830869410",null,null,null
                          2024-10-02 01:01:12 UTC932INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Set-Cookie: NID=518=CmVcBD3Mm4Qpz1WhzJPeqwWLE_77PserRuXi98mmGVMvS2ZMeWmEL-4I5LRV_RZZM4c7KmVoVu-QCWVDOPL8iwm4jfk0UZoSvP0RltnYVYPjxj1NH7cnOEAi1v1SQzFvlJzw7aeyuHjDwZVsXV8b9vy8TaKzmiykG0kQhtxzJuX_evwJVA; expires=Thu, 03-Apr-2025 01:01:12 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:01:12 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Expires: Wed, 02 Oct 2024 01:01:12 GMT
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:01:12 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:01:12 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          8192.168.2.449767216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:12 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 505
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-02 01:01:12 UTC505OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 30 38 36 39 35 33 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727830869539",null,null,null
                          2024-10-02 01:01:12 UTC933INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Set-Cookie: NID=518=o8JAjUqsb1ECcvFc5uj-0ZcGPAcPxjy3Ofd5wfnRzOWRyk9-XgATXa7xexURrFvVerOUudZ3OC7K9NPNVbLnneq-poPCuJc0MCZJAVbkgB2hvD-obcEK24VLmQg17VrTa-2XNyYj30BgqUQYbeHMGmEdAqTr5EwTaSxyHIGu1RVVI5L5wo0; expires=Thu, 03-Apr-2025 01:01:12 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:01:12 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Expires: Wed, 02 Oct 2024 01:01:12 GMT
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:01:12 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:01:12 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          9192.168.2.449741142.250.181.2284433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:12 UTC1213OUTGET /favicon.ico HTTP/1.1
                          Host: www.google.com
                          Connection: keep-alive
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: no-cors
                          Sec-Fetch-Dest: image
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=CmVcBD3Mm4Qpz1WhzJPeqwWLE_77PserRuXi98mmGVMvS2ZMeWmEL-4I5LRV_RZZM4c7KmVoVu-QCWVDOPL8iwm4jfk0UZoSvP0RltnYVYPjxj1NH7cnOEAi1v1SQzFvlJzw7aeyuHjDwZVsXV8b9vy8TaKzmiykG0kQhtxzJuX_evwJVA
                          2024-10-02 01:01:12 UTC704INHTTP/1.1 200 OK
                          Accept-Ranges: bytes
                          Cross-Origin-Resource-Policy: cross-origin
                          Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                          Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                          Content-Length: 5430
                          X-Content-Type-Options: nosniff
                          Server: sffe
                          X-XSS-Protection: 0
                          Date: Wed, 02 Oct 2024 00:52:03 GMT
                          Expires: Thu, 10 Oct 2024 00:52:03 GMT
                          Cache-Control: public, max-age=691200
                          Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                          Content-Type: image/x-icon
                          Vary: Accept-Encoding
                          Age: 549
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close
                          2024-10-02 01:01:12 UTC686INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                          Data Ascii: h& ( 0.v]X:X:rY
                          2024-10-02 01:01:12 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a eb
                          Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                          2024-10-02 01:01:12 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff fc
                          Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                          2024-10-02 01:01:12 UTC1390INData Raw: f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                          Data Ascii: BBBBBBF!4I
                          2024-10-02 01:01:12 UTC574INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                          Data Ascii: $'


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          10192.168.2.4497734.175.87.197443
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:18 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=HY3ClahCK1Y4vtm&MD=9tgDKVzV HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                          Host: slscr.update.microsoft.com
                          2024-10-02 01:01:18 UTC560INHTTP/1.1 200 OK
                          Cache-Control: no-cache
                          Pragma: no-cache
                          Content-Type: application/octet-stream
                          Expires: -1
                          Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                          ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                          MS-CorrelationId: 55d81cda-f85c-4448-b2a1-d312f6d74a40
                          MS-RequestId: 85c25504-23f0-4210-98b7-cd08c001e95c
                          MS-CV: rtKhaYPGjU6i38nX.0
                          X-Microsoft-SLSClientCache: 2880
                          Content-Disposition: attachment; filename=environment.cab
                          X-Content-Type-Options: nosniff
                          Date: Wed, 02 Oct 2024 01:01:17 GMT
                          Connection: close
                          Content-Length: 24490
                          2024-10-02 01:01:18 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                          Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                          2024-10-02 01:01:18 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                          Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          11192.168.2.449778216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:19 UTC1299OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1215
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: text/plain;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=o8JAjUqsb1ECcvFc5uj-0ZcGPAcPxjy3Ofd5wfnRzOWRyk9-XgATXa7xexURrFvVerOUudZ3OC7K9NPNVbLnneq-poPCuJc0MCZJAVbkgB2hvD-obcEK24VLmQg17VrTa-2XNyYj30BgqUQYbeHMGmEdAqTr5EwTaSxyHIGu1RVVI5L5wo0
                          2024-10-02 01:01:19 UTC1215OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 38 33 30 38 36 37 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727830867000",null,null,null,
                          2024-10-02 01:01:19 UTC941INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Set-Cookie: NID=518=m128LHbWEfmzvpybRPLTbb2lriUiRNTCx4EyQcbhI-mkVT6HZBhq0LM_MJ_4NoZE0kMxb9TjthQyIL8fS2u1NbJV97AdGDtA6wOHYm0tnWBKHFJFgy-_OOuS_8gGI7t7sTzeCHB-7covdwZWJL2bAw5NTOGGMJkpjU544HRCYPFZudNMtuaN6QEkvyE; expires=Thu, 03-Apr-2025 01:01:19 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:01:19 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Expires: Wed, 02 Oct 2024 01:01:19 GMT
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:01:19 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:01:19 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          12192.168.2.449781216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:42 UTC1290OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1038
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          sec-ch-ua-full-version: "117.0.5938.132"
                          Content-Type: text/plain;charset=UTF-8
                          sec-ch-ua-platform-version: "10.0.0"
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: no-cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=m128LHbWEfmzvpybRPLTbb2lriUiRNTCx4EyQcbhI-mkVT6HZBhq0LM_MJ_4NoZE0kMxb9TjthQyIL8fS2u1NbJV97AdGDtA6wOHYm0tnWBKHFJFgy-_OOuS_8gGI7t7sTzeCHB-7covdwZWJL2bAw5NTOGGMJkpjU544HRCYPFZudNMtuaN6QEkvyE
                          2024-10-02 01:01:42 UTC1038OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 39 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240929.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                          2024-10-02 01:01:42 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:01:42 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:01:42 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:01:42 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          13192.168.2.449782216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:43 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1260
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=m128LHbWEfmzvpybRPLTbb2lriUiRNTCx4EyQcbhI-mkVT6HZBhq0LM_MJ_4NoZE0kMxb9TjthQyIL8fS2u1NbJV97AdGDtA6wOHYm0tnWBKHFJFgy-_OOuS_8gGI7t7sTzeCHB-7covdwZWJL2bAw5NTOGGMJkpjU544HRCYPFZudNMtuaN6QEkvyE
                          2024-10-02 01:01:43 UTC1260OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 30 39 30 31 31 32 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727830901124",null,null,null
                          2024-10-02 01:01:43 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:01:43 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:01:43 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:01:43 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          14192.168.2.449783216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:43 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1151
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=m128LHbWEfmzvpybRPLTbb2lriUiRNTCx4EyQcbhI-mkVT6HZBhq0LM_MJ_4NoZE0kMxb9TjthQyIL8fS2u1NbJV97AdGDtA6wOHYm0tnWBKHFJFgy-_OOuS_8gGI7t7sTzeCHB-7covdwZWJL2bAw5NTOGGMJkpjU544HRCYPFZudNMtuaN6QEkvyE
                          2024-10-02 01:01:43 UTC1151OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 30 39 30 31 32 32 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727830901224",null,null,null
                          2024-10-02 01:01:43 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:01:43 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:01:43 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:01:43 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          15192.168.2.4497844.175.87.197443
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:01:56 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=HY3ClahCK1Y4vtm&MD=9tgDKVzV HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                          Host: slscr.update.microsoft.com
                          2024-10-02 01:01:56 UTC560INHTTP/1.1 200 OK
                          Cache-Control: no-cache
                          Pragma: no-cache
                          Content-Type: application/octet-stream
                          Expires: -1
                          Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                          ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                          MS-CorrelationId: 53a2a6f9-f174-4169-b5b3-e38deda33a1b
                          MS-RequestId: b10558da-f2be-4276-975e-09893121c601
                          MS-CV: TIMU/KeDH0qTe1xn.0
                          X-Microsoft-SLSClientCache: 1440
                          Content-Disposition: attachment; filename=environment.cab
                          X-Content-Type-Options: nosniff
                          Date: Wed, 02 Oct 2024 01:01:56 GMT
                          Connection: close
                          Content-Length: 30005
                          2024-10-02 01:01:56 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                          Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                          2024-10-02 01:01:56 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                          Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          16192.168.2.449788216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:02:14 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1358
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=m128LHbWEfmzvpybRPLTbb2lriUiRNTCx4EyQcbhI-mkVT6HZBhq0LM_MJ_4NoZE0kMxb9TjthQyIL8fS2u1NbJV97AdGDtA6wOHYm0tnWBKHFJFgy-_OOuS_8gGI7t7sTzeCHB-7covdwZWJL2bAw5NTOGGMJkpjU544HRCYPFZudNMtuaN6QEkvyE
                          2024-10-02 01:02:14 UTC1358OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 30 39 33 32 30 33 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727830932031",null,null,null
                          2024-10-02 01:02:14 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:02:14 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:02:14 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:02:14 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          17192.168.2.449789216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:02:14 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1253
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=m128LHbWEfmzvpybRPLTbb2lriUiRNTCx4EyQcbhI-mkVT6HZBhq0LM_MJ_4NoZE0kMxb9TjthQyIL8fS2u1NbJV97AdGDtA6wOHYm0tnWBKHFJFgy-_OOuS_8gGI7t7sTzeCHB-7covdwZWJL2bAw5NTOGGMJkpjU544HRCYPFZudNMtuaN6QEkvyE
                          2024-10-02 01:02:14 UTC1253OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 30 39 33 32 30 39 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727830932099",null,null,null
                          2024-10-02 01:02:14 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:02:14 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:02:14 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:02:14 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          18192.168.2.455428216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:02:44 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1107
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=m128LHbWEfmzvpybRPLTbb2lriUiRNTCx4EyQcbhI-mkVT6HZBhq0LM_MJ_4NoZE0kMxb9TjthQyIL8fS2u1NbJV97AdGDtA6wOHYm0tnWBKHFJFgy-_OOuS_8gGI7t7sTzeCHB-7covdwZWJL2bAw5NTOGGMJkpjU544HRCYPFZudNMtuaN6QEkvyE
                          2024-10-02 01:02:44 UTC1107OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 30 39 36 32 32 31 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727830962212",null,null,null
                          2024-10-02 01:02:44 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:02:44 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:02:44 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:02:44 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          19192.168.2.455429216.58.206.784433244C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-02 01:02:44 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1491
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiWocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=m128LHbWEfmzvpybRPLTbb2lriUiRNTCx4EyQcbhI-mkVT6HZBhq0LM_MJ_4NoZE0kMxb9TjthQyIL8fS2u1NbJV97AdGDtA6wOHYm0tnWBKHFJFgy-_OOuS_8gGI7t7sTzeCHB-7covdwZWJL2bAw5NTOGGMJkpjU544HRCYPFZudNMtuaN6QEkvyE
                          2024-10-02 01:02:44 UTC1491OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 33 30 39 36 32 34 34 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727830962445",null,null,null
                          2024-10-02 01:02:44 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Wed, 02 Oct 2024 01:02:44 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-02 01:02:44 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-02 01:02:44 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:21:00:57
                          Start date:01/10/2024
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\file.exe"
                          Imagebase:0xbe0000
                          File size:918'016 bytes
                          MD5 hash:0083D14C374EACC7490D77CF1C0EC24D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000003.1661968085.00000000015FF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:21:00:58
                          Start date:01/10/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:3
                          Start time:21:00:58
                          Start date:01/10/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:4
                          Start time:21:01:09
                          Start date:01/10/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3200 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:5
                          Start time:21:01:09
                          Start date:01/10/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=2080,i,13875054584425462490,14288134942725612422,262144 --disable-features=CrashRecovery /prefetch:8
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:1.8%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:4.8%
                            Total number of Nodes:1468
                            Total number of Limit Nodes:57
                            execution_graph 95520 c22402 95523 be1410 95520->95523 95524 be144f mciSendStringW 95523->95524 95525 c224b8 DestroyWindow 95523->95525 95526 be146b 95524->95526 95527 be16c6 95524->95527 95534 c224c4 95525->95534 95528 be1479 95526->95528 95526->95534 95527->95526 95529 be16d5 UnregisterHotKey 95527->95529 95556 be182e 95528->95556 95529->95527 95531 c224e2 FindClose 95531->95534 95534->95531 95536 c22509 95534->95536 95537 c224d8 95534->95537 95535 be148e 95538 c2252d 95535->95538 95546 be149c 95535->95546 95536->95538 95539 c2251c FreeLibrary 95536->95539 95537->95534 95562 be6246 CloseHandle 95537->95562 95540 c22541 VirtualFree 95538->95540 95547 be1509 95538->95547 95539->95536 95540->95538 95541 be14f8 CoUninitialize 95541->95547 95542 be1514 95544 be1524 95542->95544 95543 c22589 95549 c22598 ISource 95543->95549 95563 c532eb 6 API calls ISource 95543->95563 95560 be1944 VirtualFreeEx CloseHandle 95544->95560 95546->95541 95547->95542 95547->95543 95552 c22627 95549->95552 95564 c464d4 22 API calls ISource 95549->95564 95551 be153a 95551->95549 95553 be161f 95551->95553 95552->95552 95553->95552 95561 be1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 95553->95561 95555 be16c1 95558 be183b 95556->95558 95557 be1480 95557->95535 95557->95536 95558->95557 95565 c4702a 22 API calls 95558->95565 95560->95551 95561->95555 95562->95537 95563->95543 95564->95549 95565->95558 95566 bef7bf 95567 befcb6 95566->95567 95568 bef7d3 95566->95568 95665 beaceb 23 API calls ISource 95567->95665 95570 befcc2 95568->95570 95601 bffddb 95568->95601 95666 beaceb 23 API calls ISource 95570->95666 95573 bef7e5 95573->95570 95574 bef83e 95573->95574 95575 befd3d 95573->95575 95579 beed9d ISource 95574->95579 95611 bf1310 95574->95611 95667 c51155 22 API calls 95575->95667 95578 c34beb 95673 c5359c 82 API calls __wsopen_s 95578->95673 95580 bffddb 22 API calls 95599 beec76 ISource 95580->95599 95581 befef7 95581->95579 95669 bea8c7 22 API calls __fread_nolock 95581->95669 95584 bea8c7 22 API calls 95584->95599 95585 c34b0b 95671 c5359c 82 API calls __wsopen_s 95585->95671 95588 c34600 95588->95579 95668 bea8c7 22 API calls __fread_nolock 95588->95668 95592 befbe3 95592->95579 95594 c34bdc 95592->95594 95600 bef3ae ISource 95592->95600 95593 bea961 22 API calls 95593->95599 95672 c5359c 82 API calls __wsopen_s 95594->95672 95595 c000a3 29 API calls pre_c_initialization 95595->95599 95597 c00242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95597->95599 95598 c001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95598->95599 95599->95578 95599->95579 95599->95580 95599->95581 95599->95584 95599->95585 95599->95588 95599->95592 95599->95593 95599->95595 95599->95597 95599->95598 95599->95600 95663 bf01e0 346 API calls 2 library calls 95599->95663 95664 bf06a0 41 API calls ISource 95599->95664 95600->95579 95670 c5359c 82 API calls __wsopen_s 95600->95670 95604 bffde0 95601->95604 95603 bffdfa 95603->95573 95604->95603 95606 bffdfc 95604->95606 95674 c0ea0c 95604->95674 95681 c04ead 7 API calls 2 library calls 95604->95681 95610 c0066d 95606->95610 95682 c032a4 RaiseException 95606->95682 95608 c0068a 95608->95573 95683 c032a4 RaiseException 95610->95683 95612 bf1376 95611->95612 95613 bf17b0 95611->95613 95614 c36331 95612->95614 95615 bf1390 95612->95615 95744 c00242 5 API calls __Init_thread_wait 95613->95744 95618 c3633d 95614->95618 95755 c6709c 346 API calls 95614->95755 95617 bf1940 9 API calls 95615->95617 95621 bf13a0 95617->95621 95618->95599 95620 bf17ba 95622 bf17fb 95620->95622 95745 be9cb3 95620->95745 95623 bf1940 9 API calls 95621->95623 95626 c36346 95622->95626 95628 bf182c 95622->95628 95625 bf13b6 95623->95625 95625->95622 95627 bf13ec 95625->95627 95756 c5359c 82 API calls __wsopen_s 95626->95756 95627->95626 95650 bf1408 __fread_nolock 95627->95650 95752 beaceb 23 API calls ISource 95628->95752 95631 bf17d4 95751 c001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95631->95751 95632 bf1839 95753 bfd217 346 API calls 95632->95753 95635 c3636e 95757 c5359c 82 API calls __wsopen_s 95635->95757 95636 bf152f 95638 c363d1 95636->95638 95639 bf153c 95636->95639 95759 c65745 54 API calls _wcslen 95638->95759 95641 bf1940 9 API calls 95639->95641 95642 bf1549 95641->95642 95648 bf1940 9 API calls 95642->95648 95651 bf15c7 ISource 95642->95651 95643 bffddb 22 API calls 95643->95650 95644 bf1872 95754 bffaeb 23 API calls 95644->95754 95647 bf171d 95647->95599 95654 bf1563 95648->95654 95650->95632 95650->95635 95650->95636 95650->95643 95650->95651 95655 c363b2 95650->95655 95709 bffe0b 95650->95709 95719 beec40 95650->95719 95651->95644 95653 bf167b ISource 95651->95653 95686 bf1940 95651->95686 95696 c6a2ea 95651->95696 95701 c6ab67 95651->95701 95704 c55c5a 95651->95704 95761 c5359c 82 API calls __wsopen_s 95651->95761 95653->95647 95743 bfce17 22 API calls ISource 95653->95743 95654->95651 95760 bea8c7 22 API calls __fread_nolock 95654->95760 95758 c5359c 82 API calls __wsopen_s 95655->95758 95663->95599 95664->95599 95665->95570 95666->95575 95667->95579 95668->95579 95669->95579 95670->95579 95671->95579 95672->95578 95673->95579 95676 c13820 __dosmaperr 95674->95676 95675 c1385e 95685 c0f2d9 20 API calls __dosmaperr 95675->95685 95676->95675 95677 c13849 RtlAllocateHeap 95676->95677 95684 c04ead 7 API calls 2 library calls 95676->95684 95677->95676 95679 c1385c 95677->95679 95679->95604 95681->95604 95682->95610 95683->95608 95684->95676 95685->95679 95687 bf1981 95686->95687 95689 bf195d 95686->95689 95762 c00242 5 API calls __Init_thread_wait 95687->95762 95688 bf196e 95688->95651 95689->95688 95764 c00242 5 API calls __Init_thread_wait 95689->95764 95691 bf198b 95691->95689 95763 c001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95691->95763 95693 bf8727 95693->95688 95765 c001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95693->95765 95766 be7510 95696->95766 95700 c6a315 95700->95651 95814 c6aff9 95701->95814 95705 be7510 53 API calls 95704->95705 95706 c55c6d 95705->95706 95927 c4dbbe lstrlenW 95706->95927 95708 c55c77 95708->95651 95713 bffddb 95709->95713 95710 c0ea0c ___std_exception_copy 21 API calls 95710->95713 95711 bffdfa 95711->95650 95713->95710 95713->95711 95716 bffdfc 95713->95716 95932 c04ead 7 API calls 2 library calls 95713->95932 95714 c0066d 95934 c032a4 RaiseException 95714->95934 95716->95714 95933 c032a4 RaiseException 95716->95933 95717 c0068a 95717->95650 95741 beec76 ISource 95719->95741 95720 c00242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95720->95741 95721 c000a3 29 API calls pre_c_initialization 95721->95741 95722 c001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95722->95741 95723 bffddb 22 API calls 95723->95741 95724 befef7 95737 beed9d ISource 95724->95737 95938 bea8c7 22 API calls __fread_nolock 95724->95938 95727 bea8c7 22 API calls 95727->95741 95728 c34600 95728->95737 95937 bea8c7 22 API calls __fread_nolock 95728->95937 95729 c34b0b 95940 c5359c 82 API calls __wsopen_s 95729->95940 95735 befbe3 95735->95737 95738 c34bdc 95735->95738 95742 bef3ae ISource 95735->95742 95736 bea961 22 API calls 95736->95741 95737->95650 95941 c5359c 82 API calls __wsopen_s 95738->95941 95740 c34beb 95942 c5359c 82 API calls __wsopen_s 95740->95942 95741->95720 95741->95721 95741->95722 95741->95723 95741->95724 95741->95727 95741->95728 95741->95729 95741->95735 95741->95736 95741->95737 95741->95740 95741->95742 95935 bf01e0 346 API calls 2 library calls 95741->95935 95936 bf06a0 41 API calls ISource 95741->95936 95742->95737 95939 c5359c 82 API calls __wsopen_s 95742->95939 95743->95653 95744->95620 95746 be9cc2 _wcslen 95745->95746 95747 bffe0b 22 API calls 95746->95747 95748 be9cea __fread_nolock 95747->95748 95749 bffddb 22 API calls 95748->95749 95750 be9d00 95749->95750 95750->95631 95751->95622 95752->95632 95753->95644 95754->95644 95755->95618 95756->95651 95757->95651 95758->95651 95759->95654 95760->95651 95761->95651 95762->95691 95763->95689 95764->95693 95765->95688 95767 be7525 95766->95767 95768 be7522 95766->95768 95769 be752d 95767->95769 95770 be755b 95767->95770 95789 c4d4dc CreateToolhelp32Snapshot Process32FirstW 95768->95789 95799 c051c6 26 API calls 95769->95799 95771 c250f6 95770->95771 95773 be756d 95770->95773 95781 c2500f 95770->95781 95802 c05183 26 API calls 95771->95802 95800 bffb21 51 API calls 95773->95800 95774 be753d 95779 bffddb 22 API calls 95774->95779 95777 c2510e 95777->95777 95782 be7547 95779->95782 95780 c25088 95801 bffb21 51 API calls 95780->95801 95781->95780 95784 bffe0b 22 API calls 95781->95784 95783 be9cb3 22 API calls 95782->95783 95783->95768 95785 c25058 95784->95785 95786 bffddb 22 API calls 95785->95786 95787 c2507f 95786->95787 95788 be9cb3 22 API calls 95787->95788 95788->95780 95803 c4def7 95789->95803 95791 c4d529 Process32NextW 95792 c4d5db CloseHandle 95791->95792 95793 c4d522 95791->95793 95792->95700 95793->95791 95793->95792 95794 bea961 22 API calls 95793->95794 95795 be9cb3 22 API calls 95793->95795 95809 be525f 22 API calls 95793->95809 95810 be6350 22 API calls 95793->95810 95811 bfce60 41 API calls 95793->95811 95794->95793 95795->95793 95799->95774 95800->95774 95801->95771 95802->95777 95804 c4df02 95803->95804 95805 c4df19 95804->95805 95808 c4df1f 95804->95808 95812 c063b2 GetStringTypeW _strftime 95804->95812 95813 c062fb 39 API calls 95805->95813 95808->95793 95809->95793 95810->95793 95811->95793 95812->95804 95813->95808 95815 c6b01d ___scrt_fastfail 95814->95815 95816 c6b094 95815->95816 95817 c6b058 95815->95817 95819 c6b08b 95816->95819 95912 beb567 39 API calls 95816->95912 95909 beb567 39 API calls 95817->95909 95829 c6b0ed 95819->95829 95914 beb567 39 API calls 95819->95914 95821 be7510 53 API calls 95825 c6b10b 95821->95825 95822 c6b0a5 95913 beb567 39 API calls 95822->95913 95823 c6b063 95823->95819 95910 beb567 39 API calls 95823->95910 95905 be7620 95825->95905 95828 c6b078 95911 beb567 39 API calls 95828->95911 95829->95821 95832 c6b115 95833 c6b11f 95832->95833 95834 c6b1d8 95832->95834 95836 be7510 53 API calls 95833->95836 95835 c6b20a GetCurrentDirectoryW 95834->95835 95837 be7510 53 API calls 95834->95837 95838 bffe0b 22 API calls 95835->95838 95839 c6b130 95836->95839 95840 c6b1ef 95837->95840 95841 c6b22f GetCurrentDirectoryW 95838->95841 95842 be7620 22 API calls 95839->95842 95843 be7620 22 API calls 95840->95843 95844 c6b23c 95841->95844 95845 c6b13a 95842->95845 95846 c6b1f9 _wcslen 95843->95846 95848 c6b275 95844->95848 95915 be9c6e 22 API calls 95844->95915 95847 be7510 53 API calls 95845->95847 95846->95835 95846->95848 95849 c6b14b 95847->95849 95856 c6b287 95848->95856 95857 c6b28b 95848->95857 95851 be7620 22 API calls 95849->95851 95853 c6b155 95851->95853 95852 c6b255 95916 be9c6e 22 API calls 95852->95916 95855 be7510 53 API calls 95853->95855 95859 c6b166 95855->95859 95861 c6b39a CreateProcessW 95856->95861 95862 c6b2f8 95856->95862 95918 c507c0 10 API calls 95857->95918 95858 c6b265 95917 be9c6e 22 API calls 95858->95917 95864 be7620 22 API calls 95859->95864 95904 c6b32f _wcslen 95861->95904 95921 c411c8 39 API calls 95862->95921 95867 c6b170 95864->95867 95865 c6b294 95919 c506e6 10 API calls 95865->95919 95870 c6b1a6 GetSystemDirectoryW 95867->95870 95874 be7510 53 API calls 95867->95874 95869 c6b2fd 95872 c6b323 95869->95872 95873 c6b32a 95869->95873 95876 bffe0b 22 API calls 95870->95876 95871 c6b2aa 95920 c505a7 8 API calls 95871->95920 95922 c41201 128 API calls 2 library calls 95872->95922 95923 c414ce 6 API calls 95873->95923 95879 c6b187 95874->95879 95877 c6b1cb GetSystemDirectoryW 95876->95877 95877->95844 95883 be7620 22 API calls 95879->95883 95881 c6b2d0 95881->95856 95882 c6b328 95882->95904 95886 c6b191 _wcslen 95883->95886 95884 c6b3d6 GetLastError 95896 c6b41a 95884->95896 95885 c6b42f CloseHandle 95887 c6b43f 95885->95887 95897 c6b49a 95885->95897 95886->95844 95886->95870 95889 c6b446 CloseHandle 95887->95889 95890 c6b451 95887->95890 95889->95890 95891 c6b463 95890->95891 95892 c6b458 CloseHandle 95890->95892 95894 c6b475 95891->95894 95895 c6b46a CloseHandle 95891->95895 95892->95891 95893 c6b4a6 95893->95896 95924 c509d9 34 API calls 95894->95924 95895->95894 95926 c50175 6 API calls 95896->95926 95897->95893 95902 c6b4d2 CloseHandle 95897->95902 95900 c6ab79 95900->95651 95901 c6b486 95925 c6b536 25 API calls 95901->95925 95902->95896 95904->95884 95904->95885 95906 be762a _wcslen 95905->95906 95907 bffe0b 22 API calls 95906->95907 95908 be763f 95907->95908 95908->95832 95909->95823 95910->95828 95911->95819 95912->95822 95913->95819 95914->95829 95915->95852 95916->95858 95917->95848 95918->95865 95919->95871 95920->95881 95921->95869 95922->95882 95923->95904 95924->95901 95925->95897 95926->95900 95928 c4dc06 95927->95928 95929 c4dbdc GetFileAttributesW 95927->95929 95928->95708 95929->95928 95930 c4dbe8 FindFirstFileW 95929->95930 95930->95928 95931 c4dbf9 FindClose 95930->95931 95931->95928 95932->95713 95933->95714 95934->95717 95935->95741 95936->95741 95937->95737 95938->95737 95939->95737 95940->95737 95941->95740 95942->95737 95943 c09141 95953 c0dcb8 95943->95953 95947 c0914e 95966 c14d7a 95947->95966 95950 c09178 95970 c129c8 95950->95970 95952 c09183 95976 c0dcc1 95953->95976 95955 c09149 95956 c14cda 95955->95956 95957 c14ce6 __FrameHandler3::FrameUnwindToState 95956->95957 95993 c12f5e EnterCriticalSection 95957->95993 95959 c14cf1 95960 c14d5c 95959->95960 95962 c14d30 DeleteCriticalSection 95959->95962 95997 c0e678 95959->95997 95994 c14d71 95960->95994 95963 c129c8 _free 20 API calls 95962->95963 95963->95959 95965 c14d68 __wsopen_s 95965->95947 95967 c14d90 95966->95967 95968 c0915d DeleteCriticalSection 95966->95968 95967->95968 95969 c129c8 _free 20 API calls 95967->95969 95968->95947 95968->95950 95969->95968 95971 c129d3 RtlFreeHeap 95970->95971 95975 c129fc __dosmaperr 95970->95975 95972 c129e8 95971->95972 95971->95975 96121 c0f2d9 20 API calls __dosmaperr 95972->96121 95974 c129ee GetLastError 95974->95975 95975->95952 95977 c0dccd __FrameHandler3::FrameUnwindToState 95976->95977 95986 c12f5e EnterCriticalSection 95977->95986 95979 c0dd70 95987 c0dd90 95979->95987 95983 c0dd7c __wsopen_s 95983->95955 95984 c0dc71 66 API calls 95985 c0dcdc 95984->95985 95985->95979 95985->95984 95990 c0918d EnterCriticalSection 95985->95990 95991 c0dd66 LeaveCriticalSection __fread_nolock 95985->95991 95986->95985 95992 c12fa6 LeaveCriticalSection 95987->95992 95989 c0dd97 95989->95983 95990->95985 95991->95985 95992->95989 95993->95959 96010 c12fa6 LeaveCriticalSection 95994->96010 95996 c14d78 95996->95965 95998 c0e684 __FrameHandler3::FrameUnwindToState 95997->95998 95999 c0e695 95998->95999 96000 c0e6aa 95998->96000 96028 c0f2d9 20 API calls __dosmaperr 95999->96028 96009 c0e6a5 __wsopen_s 96000->96009 96011 c0918d EnterCriticalSection 96000->96011 96003 c0e69a 96029 c127ec 26 API calls _strftime 96003->96029 96005 c0e6c6 96012 c0e602 96005->96012 96007 c0e6d1 96030 c0e6ee LeaveCriticalSection __fread_nolock 96007->96030 96009->95959 96010->95996 96011->96005 96013 c0e624 96012->96013 96014 c0e60f 96012->96014 96026 c0e61f 96013->96026 96031 c0dc0b 96013->96031 96059 c0f2d9 20 API calls __dosmaperr 96014->96059 96016 c0e614 96060 c127ec 26 API calls _strftime 96016->96060 96020 c14d7a 20 API calls 96021 c0e640 96020->96021 96037 c0d955 96021->96037 96023 c0e646 96044 c1862f 96023->96044 96026->96007 96027 c129c8 _free 20 API calls 96027->96026 96028->96003 96029->96009 96030->96009 96032 c0dc23 96031->96032 96036 c0dc1f 96031->96036 96033 c0d955 __fread_nolock 26 API calls 96032->96033 96032->96036 96034 c0dc43 96033->96034 96061 c159be 62 API calls 4 library calls 96034->96061 96036->96020 96038 c0d961 96037->96038 96039 c0d976 96037->96039 96062 c0f2d9 20 API calls __dosmaperr 96038->96062 96039->96023 96041 c0d966 96063 c127ec 26 API calls _strftime 96041->96063 96043 c0d971 96043->96023 96045 c18653 96044->96045 96046 c1863e 96044->96046 96048 c1868e 96045->96048 96051 c1867a 96045->96051 96067 c0f2c6 20 API calls __dosmaperr 96046->96067 96069 c0f2c6 20 API calls __dosmaperr 96048->96069 96050 c18643 96068 c0f2d9 20 API calls __dosmaperr 96050->96068 96064 c18607 96051->96064 96052 c18693 96070 c0f2d9 20 API calls __dosmaperr 96052->96070 96056 c1869b 96071 c127ec 26 API calls _strftime 96056->96071 96057 c0e64c 96057->96026 96057->96027 96059->96016 96060->96026 96061->96036 96062->96041 96063->96043 96072 c18585 96064->96072 96066 c1862b 96066->96057 96067->96050 96068->96057 96069->96052 96070->96056 96071->96057 96073 c18591 __FrameHandler3::FrameUnwindToState 96072->96073 96083 c15147 EnterCriticalSection 96073->96083 96075 c1859f 96076 c185d1 96075->96076 96077 c185c6 96075->96077 96099 c0f2d9 20 API calls __dosmaperr 96076->96099 96084 c186ae 96077->96084 96080 c185cc 96100 c185fb LeaveCriticalSection __wsopen_s 96080->96100 96082 c185ee __wsopen_s 96082->96066 96083->96075 96101 c153c4 96084->96101 96086 c186c4 96114 c15333 21 API calls 2 library calls 96086->96114 96088 c186be 96088->96086 96089 c186f6 96088->96089 96091 c153c4 __wsopen_s 26 API calls 96088->96091 96089->96086 96092 c153c4 __wsopen_s 26 API calls 96089->96092 96090 c1871c 96093 c1873e 96090->96093 96115 c0f2a3 20 API calls __dosmaperr 96090->96115 96094 c186ed 96091->96094 96095 c18702 CloseHandle 96092->96095 96093->96080 96098 c153c4 __wsopen_s 26 API calls 96094->96098 96095->96086 96096 c1870e GetLastError 96095->96096 96096->96086 96098->96089 96099->96080 96100->96082 96102 c153d1 96101->96102 96103 c153e6 96101->96103 96116 c0f2c6 20 API calls __dosmaperr 96102->96116 96109 c1540b 96103->96109 96118 c0f2c6 20 API calls __dosmaperr 96103->96118 96105 c153d6 96117 c0f2d9 20 API calls __dosmaperr 96105->96117 96107 c15416 96119 c0f2d9 20 API calls __dosmaperr 96107->96119 96109->96088 96111 c1541e 96120 c127ec 26 API calls _strftime 96111->96120 96112 c153de 96112->96088 96114->96090 96115->96093 96116->96105 96117->96112 96118->96107 96119->96111 96120->96112 96121->95974 96122 c32a00 96136 bed7b0 ISource 96122->96136 96123 bedb11 PeekMessageW 96123->96136 96124 bed807 GetInputState 96124->96123 96124->96136 96126 c31cbe TranslateAcceleratorW 96126->96136 96127 beda04 timeGetTime 96127->96136 96128 bedb8f PeekMessageW 96128->96136 96129 bedb73 TranslateMessage DispatchMessageW 96129->96128 96130 bedbaf Sleep 96147 bedbc0 96130->96147 96131 c32b74 Sleep 96131->96147 96132 bfe551 timeGetTime 96132->96147 96133 c31dda timeGetTime 96221 bfe300 23 API calls 96133->96221 96135 c4d4dc 47 API calls 96135->96147 96136->96123 96136->96124 96136->96126 96136->96127 96136->96128 96136->96129 96136->96130 96136->96131 96136->96133 96141 bed9d5 96136->96141 96150 beec40 346 API calls 96136->96150 96151 bf1310 346 API calls 96136->96151 96154 bedd50 96136->96154 96161 bebf40 96136->96161 96219 bedfd0 346 API calls 3 library calls 96136->96219 96220 bfedf6 IsDialogMessageW GetClassLongW 96136->96220 96222 c53a2a 23 API calls 96136->96222 96223 c5359c 82 API calls __wsopen_s 96136->96223 96137 c32c0b GetExitCodeProcess 96142 c32c21 WaitForSingleObject 96137->96142 96143 c32c37 CloseHandle 96137->96143 96138 c32a31 96138->96141 96139 c729bf GetForegroundWindow 96139->96147 96142->96136 96142->96143 96143->96147 96144 c32ca9 Sleep 96144->96136 96147->96132 96147->96135 96147->96136 96147->96137 96147->96138 96147->96139 96147->96141 96147->96144 96224 c65658 23 API calls 96147->96224 96225 c4e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96147->96225 96150->96136 96151->96136 96155 bedd6f 96154->96155 96156 bedd83 96154->96156 96226 bed260 96155->96226 96258 c5359c 82 API calls __wsopen_s 96156->96258 96158 bedd7a 96158->96136 96160 c32f75 96160->96160 96266 beadf0 96161->96266 96163 bebf9d 96164 c304b6 96163->96164 96165 bebfa9 96163->96165 96285 c5359c 82 API calls __wsopen_s 96164->96285 96167 bec01e 96165->96167 96168 c304c6 96165->96168 96271 beac91 96167->96271 96286 c5359c 82 API calls __wsopen_s 96168->96286 96171 c304f5 96172 c3055a 96171->96172 96287 bfd217 346 API calls 96171->96287 96206 bec603 96172->96206 96288 c5359c 82 API calls __wsopen_s 96172->96288 96173 bec7da 96179 bffe0b 22 API calls 96173->96179 96175 c47120 22 API calls 96178 bec039 ISource __fread_nolock 96175->96178 96178->96171 96178->96172 96178->96173 96178->96175 96183 bec808 __fread_nolock 96178->96183 96184 bffddb 22 API calls 96178->96184 96186 beaf8a 22 API calls 96178->96186 96187 c3091a 96178->96187 96190 beec40 346 API calls 96178->96190 96191 c308a5 96178->96191 96195 c30591 96178->96195 96196 c308f6 96178->96196 96202 bec237 96178->96202 96204 bffe0b 22 API calls 96178->96204 96178->96206 96212 c309bf 96178->96212 96214 bebbe0 40 API calls 96178->96214 96275 bead81 96178->96275 96290 c47099 22 API calls __fread_nolock 96178->96290 96291 c65745 54 API calls _wcslen 96178->96291 96292 bfaa42 22 API calls ISource 96178->96292 96293 c4f05c 40 API calls 96178->96293 96294 bea993 41 API calls 96178->96294 96295 beaceb 23 API calls ISource 96178->96295 96179->96183 96185 bffe0b 22 API calls 96183->96185 96184->96178 96217 bec350 ISource __fread_nolock 96185->96217 96186->96178 96298 c53209 23 API calls 96187->96298 96190->96178 96192 beec40 346 API calls 96191->96192 96194 c308cf 96192->96194 96194->96206 96296 bea81b 41 API calls 96194->96296 96289 c5359c 82 API calls __wsopen_s 96195->96289 96297 c5359c 82 API calls __wsopen_s 96196->96297 96203 bec253 96202->96203 96299 bea8c7 22 API calls __fread_nolock 96202->96299 96207 c30976 96203->96207 96210 bec297 ISource 96203->96210 96204->96178 96206->96136 96300 beaceb 23 API calls ISource 96207->96300 96210->96212 96282 beaceb 23 API calls ISource 96210->96282 96212->96206 96301 c5359c 82 API calls __wsopen_s 96212->96301 96213 bec335 96213->96212 96215 bec342 96213->96215 96214->96178 96283 bea704 22 API calls ISource 96215->96283 96218 bec3ac 96217->96218 96284 bfce17 22 API calls ISource 96217->96284 96218->96136 96219->96136 96220->96136 96221->96136 96222->96136 96223->96136 96224->96147 96225->96147 96227 beec40 346 API calls 96226->96227 96246 bed29d 96227->96246 96228 c31bc4 96265 c5359c 82 API calls __wsopen_s 96228->96265 96230 bed6d5 96232 bed30b ISource 96230->96232 96241 bffe0b 22 API calls 96230->96241 96231 bed3c3 96231->96230 96234 bed3ce 96231->96234 96232->96158 96233 bed5ff 96235 c31bb5 96233->96235 96236 bed614 96233->96236 96238 bffddb 22 API calls 96234->96238 96264 c65705 23 API calls 96235->96264 96240 bffddb 22 API calls 96236->96240 96237 bed4b8 96243 bffe0b 22 API calls 96237->96243 96242 bed3d5 __fread_nolock 96238->96242 96251 bed46a 96240->96251 96241->96242 96244 bed3f6 96242->96244 96245 bffddb 22 API calls 96242->96245 96253 bed429 ISource __fread_nolock 96243->96253 96244->96253 96259 bebec0 346 API calls 96244->96259 96245->96244 96246->96228 96246->96230 96246->96231 96246->96232 96246->96237 96247 bffddb 22 API calls 96246->96247 96246->96253 96247->96246 96249 c31ba4 96263 c5359c 82 API calls __wsopen_s 96249->96263 96251->96158 96253->96233 96253->96249 96253->96251 96254 c31b7f 96253->96254 96256 c31b5d 96253->96256 96260 be1f6f 346 API calls 96253->96260 96262 c5359c 82 API calls __wsopen_s 96254->96262 96261 c5359c 82 API calls __wsopen_s 96256->96261 96258->96160 96259->96253 96260->96253 96261->96251 96262->96251 96263->96251 96264->96228 96265->96232 96267 beae01 96266->96267 96270 beae1c ISource 96266->96270 96302 beaec9 96267->96302 96269 beae09 CharUpperBuffW 96269->96270 96270->96163 96272 beacae 96271->96272 96273 beacd1 96272->96273 96308 c5359c 82 API calls __wsopen_s 96272->96308 96273->96178 96276 c2fadb 96275->96276 96277 bead92 96275->96277 96278 bffddb 22 API calls 96277->96278 96279 bead99 96278->96279 96309 beadcd 96279->96309 96282->96213 96283->96217 96284->96217 96285->96168 96286->96206 96287->96172 96288->96206 96289->96206 96290->96178 96291->96178 96292->96178 96293->96178 96294->96178 96295->96178 96296->96196 96297->96206 96298->96202 96299->96203 96300->96212 96301->96206 96303 beaedc 96302->96303 96304 beaed9 __fread_nolock 96302->96304 96305 bffddb 22 API calls 96303->96305 96304->96269 96306 beaee7 96305->96306 96307 bffe0b 22 API calls 96306->96307 96307->96304 96308->96273 96313 beaddd 96309->96313 96310 beadb6 96310->96178 96311 bffddb 22 API calls 96311->96313 96313->96310 96313->96311 96315 beadcd 22 API calls 96313->96315 96316 bea961 96313->96316 96321 bea8c7 22 API calls __fread_nolock 96313->96321 96315->96313 96317 bffe0b 22 API calls 96316->96317 96318 bea976 96317->96318 96319 bffddb 22 API calls 96318->96319 96320 bea984 96319->96320 96320->96313 96321->96313 96322 c18402 96327 c181be 96322->96327 96325 c1842a 96332 c181ef try_get_first_available_module 96327->96332 96329 c183ee 96346 c127ec 26 API calls _strftime 96329->96346 96331 c18343 96331->96325 96339 c20984 96331->96339 96338 c18338 96332->96338 96342 c08e0b 40 API calls 2 library calls 96332->96342 96334 c1838c 96334->96338 96343 c08e0b 40 API calls 2 library calls 96334->96343 96336 c183ab 96336->96338 96344 c08e0b 40 API calls 2 library calls 96336->96344 96338->96331 96345 c0f2d9 20 API calls __dosmaperr 96338->96345 96347 c20081 96339->96347 96341 c2099f 96341->96325 96342->96334 96343->96336 96344->96338 96345->96329 96346->96331 96350 c2008d __FrameHandler3::FrameUnwindToState 96347->96350 96348 c2009b 96404 c0f2d9 20 API calls __dosmaperr 96348->96404 96350->96348 96351 c200d4 96350->96351 96358 c2065b 96351->96358 96352 c200a0 96405 c127ec 26 API calls _strftime 96352->96405 96356 c200aa __wsopen_s 96356->96341 96359 c20678 96358->96359 96360 c206a6 96359->96360 96361 c2068d 96359->96361 96407 c15221 96360->96407 96421 c0f2c6 20 API calls __dosmaperr 96361->96421 96364 c206ab 96366 c206b4 96364->96366 96367 c206cb 96364->96367 96365 c20692 96422 c0f2d9 20 API calls __dosmaperr 96365->96422 96423 c0f2c6 20 API calls __dosmaperr 96366->96423 96420 c2039a CreateFileW 96367->96420 96371 c206b9 96424 c0f2d9 20 API calls __dosmaperr 96371->96424 96373 c20781 GetFileType 96374 c207d3 96373->96374 96375 c2078c GetLastError 96373->96375 96429 c1516a 21 API calls 2 library calls 96374->96429 96427 c0f2a3 20 API calls __dosmaperr 96375->96427 96376 c20756 GetLastError 96426 c0f2a3 20 API calls __dosmaperr 96376->96426 96379 c20704 96379->96373 96379->96376 96425 c2039a CreateFileW 96379->96425 96380 c2079a CloseHandle 96380->96365 96382 c207c3 96380->96382 96428 c0f2d9 20 API calls __dosmaperr 96382->96428 96384 c20749 96384->96373 96384->96376 96385 c207f4 96387 c20840 96385->96387 96430 c205ab 72 API calls 3 library calls 96385->96430 96392 c2086d 96387->96392 96431 c2014d 72 API calls 4 library calls 96387->96431 96388 c207c8 96388->96365 96391 c20866 96391->96392 96394 c2087e 96391->96394 96393 c186ae __wsopen_s 29 API calls 96392->96393 96395 c200f8 96393->96395 96394->96395 96396 c208fc CloseHandle 96394->96396 96406 c20121 LeaveCriticalSection __wsopen_s 96395->96406 96432 c2039a CreateFileW 96396->96432 96398 c20927 96399 c2095d 96398->96399 96400 c20931 GetLastError 96398->96400 96399->96395 96433 c0f2a3 20 API calls __dosmaperr 96400->96433 96402 c2093d 96434 c15333 21 API calls 2 library calls 96402->96434 96404->96352 96405->96356 96406->96356 96408 c1522d __FrameHandler3::FrameUnwindToState 96407->96408 96435 c12f5e EnterCriticalSection 96408->96435 96410 c15259 96439 c15000 96410->96439 96413 c152a4 __wsopen_s 96413->96364 96414 c15234 96414->96410 96416 c152c7 EnterCriticalSection 96414->96416 96417 c1527b 96414->96417 96416->96417 96418 c152d4 LeaveCriticalSection 96416->96418 96436 c1532a 96417->96436 96418->96414 96420->96379 96421->96365 96422->96395 96423->96371 96424->96365 96425->96384 96426->96365 96427->96380 96428->96388 96429->96385 96430->96387 96431->96391 96432->96398 96433->96402 96434->96399 96435->96414 96447 c12fa6 LeaveCriticalSection 96436->96447 96438 c15331 96438->96413 96448 c14c7d 96439->96448 96441 c1501f 96443 c129c8 _free 20 API calls 96441->96443 96442 c15012 96442->96441 96455 c13405 11 API calls 2 library calls 96442->96455 96445 c15071 96443->96445 96445->96417 96446 c15147 EnterCriticalSection 96445->96446 96446->96417 96447->96438 96453 c14c8a __dosmaperr 96448->96453 96449 c14cca 96457 c0f2d9 20 API calls __dosmaperr 96449->96457 96450 c14cb5 RtlAllocateHeap 96451 c14cc8 96450->96451 96450->96453 96451->96442 96453->96449 96453->96450 96456 c04ead 7 API calls 2 library calls 96453->96456 96455->96442 96456->96453 96457->96451 96458 be105b 96463 be344d 96458->96463 96460 be106a 96494 c000a3 29 API calls __onexit 96460->96494 96462 be1074 96464 be345d __wsopen_s 96463->96464 96465 bea961 22 API calls 96464->96465 96466 be3513 96465->96466 96495 be3a5a 96466->96495 96468 be351c 96502 be3357 96468->96502 96475 bea961 22 API calls 96476 be354d 96475->96476 96523 bea6c3 96476->96523 96479 c23176 RegQueryValueExW 96480 c23193 96479->96480 96481 c2320c RegCloseKey 96479->96481 96482 bffe0b 22 API calls 96480->96482 96484 be3578 96481->96484 96493 c2321e _wcslen 96481->96493 96483 c231ac 96482->96483 96529 be5722 96483->96529 96484->96460 96487 c231d4 96532 be6b57 96487->96532 96489 be4c6d 22 API calls 96489->96493 96490 c231ee ISource 96490->96481 96491 be9cb3 22 API calls 96491->96493 96492 be515f 22 API calls 96492->96493 96493->96484 96493->96489 96493->96491 96493->96492 96494->96462 96544 c21f50 96495->96544 96498 be9cb3 22 API calls 96499 be3a8d 96498->96499 96546 be3aa2 96499->96546 96501 be3a97 96501->96468 96503 c21f50 __wsopen_s 96502->96503 96504 be3364 GetFullPathNameW 96503->96504 96505 be3386 96504->96505 96506 be6b57 22 API calls 96505->96506 96507 be33a4 96506->96507 96508 be33c6 96507->96508 96509 be33dd 96508->96509 96510 c230bb 96508->96510 96564 be33ee 96509->96564 96512 bffddb 22 API calls 96510->96512 96514 c230c5 _wcslen 96512->96514 96513 be33e8 96517 be515f 96513->96517 96515 bffe0b 22 API calls 96514->96515 96516 c230fe __fread_nolock 96515->96516 96518 be516e 96517->96518 96522 be518f __fread_nolock 96517->96522 96520 bffe0b 22 API calls 96518->96520 96519 bffddb 22 API calls 96521 be3544 96519->96521 96520->96522 96521->96475 96522->96519 96524 bea6dd 96523->96524 96525 be3556 RegOpenKeyExW 96523->96525 96526 bffddb 22 API calls 96524->96526 96525->96479 96525->96484 96527 bea6e7 96526->96527 96528 bffe0b 22 API calls 96527->96528 96528->96525 96530 bffddb 22 API calls 96529->96530 96531 be5734 RegQueryValueExW 96530->96531 96531->96487 96531->96490 96533 c24ba1 96532->96533 96534 be6b67 _wcslen 96532->96534 96535 be93b2 22 API calls 96533->96535 96537 be6b7d 96534->96537 96538 be6ba2 96534->96538 96536 c24baa 96535->96536 96536->96536 96579 be6f34 22 API calls 96537->96579 96540 bffddb 22 API calls 96538->96540 96542 be6bae 96540->96542 96541 be6b85 __fread_nolock 96541->96490 96543 bffe0b 22 API calls 96542->96543 96543->96541 96545 be3a67 GetModuleFileNameW 96544->96545 96545->96498 96547 c21f50 __wsopen_s 96546->96547 96548 be3aaf GetFullPathNameW 96547->96548 96549 be3ace 96548->96549 96550 be3ae9 96548->96550 96551 be6b57 22 API calls 96549->96551 96552 bea6c3 22 API calls 96550->96552 96553 be3ada 96551->96553 96552->96553 96556 be37a0 96553->96556 96557 be37ae 96556->96557 96560 be93b2 96557->96560 96559 be37c2 96559->96501 96561 be93c0 96560->96561 96563 be93c9 __fread_nolock 96560->96563 96562 beaec9 22 API calls 96561->96562 96561->96563 96562->96563 96563->96559 96565 be33fe _wcslen 96564->96565 96566 c2311d 96565->96566 96567 be3411 96565->96567 96569 bffddb 22 API calls 96566->96569 96574 bea587 96567->96574 96571 c23127 96569->96571 96570 be341e __fread_nolock 96570->96513 96572 bffe0b 22 API calls 96571->96572 96573 c23157 __fread_nolock 96572->96573 96576 bea59d 96574->96576 96578 bea598 __fread_nolock 96574->96578 96575 c2f80f 96576->96575 96577 bffe0b 22 API calls 96576->96577 96577->96578 96578->96570 96579->96541 96580 be1098 96585 be42de 96580->96585 96584 be10a7 96586 bea961 22 API calls 96585->96586 96587 be42f5 GetVersionExW 96586->96587 96588 be6b57 22 API calls 96587->96588 96589 be4342 96588->96589 96590 be93b2 22 API calls 96589->96590 96594 be4378 96589->96594 96591 be436c 96590->96591 96593 be37a0 22 API calls 96591->96593 96592 be441b GetCurrentProcess IsWow64Process 96595 be4437 96592->96595 96593->96594 96594->96592 96596 c237df 96594->96596 96597 be444f LoadLibraryA 96595->96597 96598 c23824 GetSystemInfo 96595->96598 96599 be449c GetSystemInfo 96597->96599 96600 be4460 GetProcAddress 96597->96600 96602 be4476 96599->96602 96600->96599 96601 be4470 GetNativeSystemInfo 96600->96601 96601->96602 96603 be447a FreeLibrary 96602->96603 96604 be109d 96602->96604 96603->96604 96605 c000a3 29 API calls __onexit 96604->96605 96605->96584 96606 c22ba5 96607 be2b25 96606->96607 96608 c22baf 96606->96608 96634 be2b83 7 API calls 96607->96634 96610 be3a5a 24 API calls 96608->96610 96612 c22bb8 96610->96612 96614 be9cb3 22 API calls 96612->96614 96615 c22bc6 96614->96615 96617 c22bf5 96615->96617 96618 c22bce 96615->96618 96616 be2b2f 96625 be2b44 96616->96625 96638 be3837 96616->96638 96619 be33c6 22 API calls 96617->96619 96621 be33c6 22 API calls 96618->96621 96622 c22bf1 GetForegroundWindow ShellExecuteW 96619->96622 96623 c22bd9 96621->96623 96630 c22c26 96622->96630 96652 be6350 22 API calls 96623->96652 96624 be2b5f 96632 be2b66 SetCurrentDirectoryW 96624->96632 96625->96624 96648 be30f2 96625->96648 96629 c22be7 96631 be33c6 22 API calls 96629->96631 96630->96624 96631->96622 96633 be2b7a 96632->96633 96653 be2cd4 7 API calls 96634->96653 96636 be2b2a 96637 be2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96636->96637 96637->96616 96639 be3862 ___scrt_fastfail 96638->96639 96654 be4212 96639->96654 96642 be38e8 96644 c23386 Shell_NotifyIconW 96642->96644 96645 be3906 Shell_NotifyIconW 96642->96645 96658 be3923 96645->96658 96647 be391c 96647->96625 96649 be3154 96648->96649 96650 be3104 ___scrt_fastfail 96648->96650 96649->96624 96651 be3123 Shell_NotifyIconW 96650->96651 96651->96649 96652->96629 96653->96636 96655 c235a4 96654->96655 96656 be38b7 96654->96656 96655->96656 96657 c235ad DestroyIcon 96655->96657 96656->96642 96680 c4c874 42 API calls _strftime 96656->96680 96657->96656 96659 be393f 96658->96659 96660 be3a13 96658->96660 96681 be6270 96659->96681 96660->96647 96663 c23393 LoadStringW 96666 c233ad 96663->96666 96664 be395a 96665 be6b57 22 API calls 96664->96665 96667 be396f 96665->96667 96674 be3994 ___scrt_fastfail 96666->96674 96687 bea8c7 22 API calls __fread_nolock 96666->96687 96668 be397c 96667->96668 96669 c233c9 96667->96669 96668->96666 96672 be3986 96668->96672 96688 be6350 22 API calls 96669->96688 96686 be6350 22 API calls 96672->96686 96677 be39f9 Shell_NotifyIconW 96674->96677 96675 c233d7 96675->96674 96676 be33c6 22 API calls 96675->96676 96678 c233f9 96676->96678 96677->96660 96679 be33c6 22 API calls 96678->96679 96679->96674 96680->96642 96682 bffe0b 22 API calls 96681->96682 96683 be6295 96682->96683 96684 bffddb 22 API calls 96683->96684 96685 be394d 96684->96685 96685->96663 96685->96664 96686->96674 96687->96674 96688->96675 96689 be3156 96692 be3170 96689->96692 96693 be3187 96692->96693 96694 be318c 96693->96694 96695 be31eb 96693->96695 96696 be31e9 96693->96696 96700 be3199 96694->96700 96701 be3265 PostQuitMessage 96694->96701 96698 c22dfb 96695->96698 96699 be31f1 96695->96699 96697 be31d0 DefWindowProcW 96696->96697 96707 be316a 96697->96707 96740 be18e2 10 API calls 96698->96740 96702 be321d SetTimer RegisterWindowMessageW 96699->96702 96703 be31f8 96699->96703 96705 be31a4 96700->96705 96706 c22e7c 96700->96706 96701->96707 96702->96707 96711 be3246 CreatePopupMenu 96702->96711 96708 c22d9c 96703->96708 96709 be3201 KillTimer 96703->96709 96712 be31ae 96705->96712 96713 c22e68 96705->96713 96744 c4bf30 34 API calls ___scrt_fastfail 96706->96744 96721 c22da1 96708->96721 96722 c22dd7 MoveWindow 96708->96722 96715 be30f2 Shell_NotifyIconW 96709->96715 96710 c22e1c 96741 bfe499 42 API calls 96710->96741 96711->96707 96718 be31b9 96712->96718 96719 c22e4d 96712->96719 96743 c4c161 27 API calls ___scrt_fastfail 96713->96743 96725 be3214 96715->96725 96727 be31c4 96718->96727 96728 be3253 96718->96728 96719->96697 96742 c40ad7 22 API calls 96719->96742 96720 c22e8e 96720->96697 96720->96707 96723 c22dc6 SetFocus 96721->96723 96724 c22da7 96721->96724 96722->96707 96723->96707 96724->96727 96729 c22db0 96724->96729 96737 be3c50 DeleteObject DestroyWindow 96725->96737 96726 be3263 96726->96707 96727->96697 96734 be30f2 Shell_NotifyIconW 96727->96734 96738 be326f 44 API calls ___scrt_fastfail 96728->96738 96739 be18e2 10 API calls 96729->96739 96735 c22e41 96734->96735 96736 be3837 49 API calls 96735->96736 96736->96696 96737->96707 96738->96726 96739->96707 96740->96710 96741->96727 96742->96696 96743->96726 96744->96720 96745 be2e37 96746 bea961 22 API calls 96745->96746 96747 be2e4d 96746->96747 96824 be4ae3 96747->96824 96749 be2e6b 96750 be3a5a 24 API calls 96749->96750 96751 be2e7f 96750->96751 96752 be9cb3 22 API calls 96751->96752 96753 be2e8c 96752->96753 96838 be4ecb 96753->96838 96756 c22cb0 96878 c52cf9 96756->96878 96757 be2ead 96860 bea8c7 22 API calls __fread_nolock 96757->96860 96759 c22cc3 96761 c22ccf 96759->96761 96904 be4f39 96759->96904 96766 be4f39 68 API calls 96761->96766 96762 be2ec3 96861 be6f88 22 API calls 96762->96861 96765 be2ecf 96767 be9cb3 22 API calls 96765->96767 96768 c22ce5 96766->96768 96769 be2edc 96767->96769 96910 be3084 22 API calls 96768->96910 96862 bea81b 41 API calls 96769->96862 96772 be2eec 96774 be9cb3 22 API calls 96772->96774 96773 c22d02 96911 be3084 22 API calls 96773->96911 96776 be2f12 96774->96776 96863 bea81b 41 API calls 96776->96863 96777 c22d1e 96779 be3a5a 24 API calls 96777->96779 96781 c22d44 96779->96781 96780 be2f21 96783 bea961 22 API calls 96780->96783 96912 be3084 22 API calls 96781->96912 96785 be2f3f 96783->96785 96784 c22d50 96913 bea8c7 22 API calls __fread_nolock 96784->96913 96864 be3084 22 API calls 96785->96864 96788 c22d5e 96914 be3084 22 API calls 96788->96914 96790 be2f4b 96865 c04a28 40 API calls 2 library calls 96790->96865 96791 c22d6d 96915 bea8c7 22 API calls __fread_nolock 96791->96915 96793 be2f59 96793->96768 96794 be2f63 96793->96794 96866 c04a28 40 API calls 2 library calls 96794->96866 96797 c22d83 96916 be3084 22 API calls 96797->96916 96798 be2f6e 96798->96773 96800 be2f78 96798->96800 96867 c04a28 40 API calls 2 library calls 96800->96867 96801 c22d90 96803 be2f83 96803->96777 96804 be2f8d 96803->96804 96868 c04a28 40 API calls 2 library calls 96804->96868 96806 be2f98 96807 be2fdc 96806->96807 96869 be3084 22 API calls 96806->96869 96807->96791 96808 be2fe8 96807->96808 96808->96801 96872 be63eb 22 API calls 96808->96872 96810 be2fbf 96870 bea8c7 22 API calls __fread_nolock 96810->96870 96813 be2ff8 96873 be6a50 22 API calls 96813->96873 96814 be2fcd 96871 be3084 22 API calls 96814->96871 96817 be3006 96874 be70b0 23 API calls 96817->96874 96821 be3021 96822 be3065 96821->96822 96875 be6f88 22 API calls 96821->96875 96876 be70b0 23 API calls 96821->96876 96877 be3084 22 API calls 96821->96877 96825 be4af0 __wsopen_s 96824->96825 96826 be6b57 22 API calls 96825->96826 96827 be4b22 96825->96827 96826->96827 96834 be4b58 96827->96834 96917 be4c6d 96827->96917 96829 be9cb3 22 API calls 96831 be4c52 96829->96831 96830 be9cb3 22 API calls 96830->96834 96832 be515f 22 API calls 96831->96832 96836 be4c5e 96832->96836 96833 be4c6d 22 API calls 96833->96834 96834->96830 96834->96833 96835 be515f 22 API calls 96834->96835 96837 be4c29 96834->96837 96835->96834 96836->96749 96837->96829 96837->96836 96920 be4e90 LoadLibraryA 96838->96920 96843 be4ef6 LoadLibraryExW 96928 be4e59 LoadLibraryA 96843->96928 96844 c23ccf 96845 be4f39 68 API calls 96844->96845 96847 c23cd6 96845->96847 96849 be4e59 3 API calls 96847->96849 96851 c23cde 96849->96851 96950 be50f5 40 API calls __fread_nolock 96851->96950 96852 be4f20 96852->96851 96853 be4f2c 96852->96853 96855 be4f39 68 API calls 96853->96855 96856 be2ea5 96855->96856 96856->96756 96856->96757 96857 c23cf5 96951 c528fe 27 API calls 96857->96951 96859 c23d05 96860->96762 96861->96765 96862->96772 96863->96780 96864->96790 96865->96793 96866->96798 96867->96803 96868->96806 96869->96810 96870->96814 96871->96807 96872->96813 96873->96817 96874->96821 96875->96821 96876->96821 96877->96821 96879 c52d15 96878->96879 97015 be511f 64 API calls 96879->97015 96881 c52d29 97016 c52e66 75 API calls 96881->97016 96883 c52d3b 96884 c52d3f 96883->96884 97017 be50f5 40 API calls __fread_nolock 96883->97017 96884->96759 96886 c52d56 97018 be50f5 40 API calls __fread_nolock 96886->97018 96888 c52d66 97019 be50f5 40 API calls __fread_nolock 96888->97019 96890 c52d81 97020 be50f5 40 API calls __fread_nolock 96890->97020 96892 c52d9c 97021 be511f 64 API calls 96892->97021 96894 c52db3 96895 c0ea0c ___std_exception_copy 21 API calls 96894->96895 96896 c52dba 96895->96896 96897 c0ea0c ___std_exception_copy 21 API calls 96896->96897 96898 c52dc4 96897->96898 97022 be50f5 40 API calls __fread_nolock 96898->97022 96900 c52dd8 97023 c528fe 27 API calls 96900->97023 96902 c52dee 96902->96884 97024 c522ce 96902->97024 96905 be4f43 96904->96905 96907 be4f4a 96904->96907 96906 c0e678 67 API calls 96905->96906 96906->96907 96908 be4f6a FreeLibrary 96907->96908 96909 be4f59 96907->96909 96908->96909 96909->96761 96910->96773 96911->96777 96912->96784 96913->96788 96914->96791 96915->96797 96916->96801 96918 beaec9 22 API calls 96917->96918 96919 be4c78 96918->96919 96919->96827 96921 be4ea8 GetProcAddress 96920->96921 96922 be4ec6 96920->96922 96923 be4eb8 96921->96923 96925 c0e5eb 96922->96925 96923->96922 96924 be4ebf FreeLibrary 96923->96924 96924->96922 96952 c0e52a 96925->96952 96927 be4eea 96927->96843 96927->96844 96929 be4e6e GetProcAddress 96928->96929 96930 be4e8d 96928->96930 96931 be4e7e 96929->96931 96933 be4f80 96930->96933 96931->96930 96932 be4e86 FreeLibrary 96931->96932 96932->96930 96934 bffe0b 22 API calls 96933->96934 96935 be4f95 96934->96935 96936 be5722 22 API calls 96935->96936 96937 be4fa1 __fread_nolock 96936->96937 96938 be50a5 96937->96938 96939 c23d1d 96937->96939 96949 be4fdc 96937->96949 97004 be42a2 CreateStreamOnHGlobal 96938->97004 97012 c5304d 74 API calls 96939->97012 96942 c23d22 97013 be511f 64 API calls 96942->97013 96945 c23d45 97014 be50f5 40 API calls __fread_nolock 96945->97014 96948 be506e ISource 96948->96852 96949->96942 96949->96948 97010 be50f5 40 API calls __fread_nolock 96949->97010 97011 be511f 64 API calls 96949->97011 96950->96857 96951->96859 96955 c0e536 __FrameHandler3::FrameUnwindToState 96952->96955 96953 c0e544 96977 c0f2d9 20 API calls __dosmaperr 96953->96977 96955->96953 96957 c0e574 96955->96957 96956 c0e549 96978 c127ec 26 API calls _strftime 96956->96978 96959 c0e586 96957->96959 96960 c0e579 96957->96960 96969 c18061 96959->96969 96979 c0f2d9 20 API calls __dosmaperr 96960->96979 96963 c0e554 __wsopen_s 96963->96927 96964 c0e58f 96965 c0e5a2 96964->96965 96966 c0e595 96964->96966 96981 c0e5d4 LeaveCriticalSection __fread_nolock 96965->96981 96980 c0f2d9 20 API calls __dosmaperr 96966->96980 96970 c1806d __FrameHandler3::FrameUnwindToState 96969->96970 96982 c12f5e EnterCriticalSection 96970->96982 96972 c1807b 96983 c180fb 96972->96983 96976 c180ac __wsopen_s 96976->96964 96977->96956 96978->96963 96979->96963 96980->96963 96981->96963 96982->96972 96989 c1811e 96983->96989 96984 c18177 96985 c14c7d __dosmaperr 20 API calls 96984->96985 96986 c18180 96985->96986 96988 c129c8 _free 20 API calls 96986->96988 96990 c18189 96988->96990 96989->96984 96989->96989 96995 c18088 96989->96995 96999 c0918d EnterCriticalSection 96989->96999 97000 c091a1 LeaveCriticalSection 96989->97000 96990->96995 97001 c13405 11 API calls 2 library calls 96990->97001 96992 c181a8 97002 c0918d EnterCriticalSection 96992->97002 96996 c180b7 96995->96996 97003 c12fa6 LeaveCriticalSection 96996->97003 96998 c180be 96998->96976 96999->96989 97000->96989 97001->96992 97002->96995 97003->96998 97005 be42bc FindResourceExW 97004->97005 97009 be42d9 97004->97009 97006 c235ba LoadResource 97005->97006 97005->97009 97007 c235cf SizeofResource 97006->97007 97006->97009 97008 c235e3 LockResource 97007->97008 97007->97009 97008->97009 97009->96949 97010->96949 97011->96949 97012->96942 97013->96945 97014->96948 97015->96881 97016->96883 97017->96886 97018->96888 97019->96890 97020->96892 97021->96894 97022->96900 97023->96902 97025 c522d9 97024->97025 97026 c522e7 97024->97026 97027 c0e5eb 29 API calls 97025->97027 97028 c5232c 97026->97028 97029 c0e5eb 29 API calls 97026->97029 97052 c522f0 97026->97052 97027->97026 97053 c52557 40 API calls __fread_nolock 97028->97053 97031 c52311 97029->97031 97031->97028 97033 c5231a 97031->97033 97032 c52370 97034 c52395 97032->97034 97035 c52374 97032->97035 97037 c0e678 67 API calls 97033->97037 97033->97052 97054 c52171 97034->97054 97036 c52381 97035->97036 97039 c0e678 67 API calls 97035->97039 97043 c0e678 67 API calls 97036->97043 97036->97052 97037->97052 97039->97036 97040 c5239d 97041 c523c3 97040->97041 97042 c523a3 97040->97042 97061 c523f3 74 API calls 97041->97061 97044 c523b0 97042->97044 97046 c0e678 67 API calls 97042->97046 97043->97052 97047 c0e678 67 API calls 97044->97047 97044->97052 97046->97044 97047->97052 97048 c523ca 97049 c523de 97048->97049 97050 c0e678 67 API calls 97048->97050 97051 c0e678 67 API calls 97049->97051 97049->97052 97050->97049 97051->97052 97052->96884 97053->97032 97055 c0ea0c ___std_exception_copy 21 API calls 97054->97055 97056 c5217f 97055->97056 97057 c0ea0c ___std_exception_copy 21 API calls 97056->97057 97058 c52190 97057->97058 97059 c0ea0c ___std_exception_copy 21 API calls 97058->97059 97060 c5219c 97059->97060 97060->97040 97061->97048 97062 be1033 97067 be4c91 97062->97067 97066 be1042 97068 bea961 22 API calls 97067->97068 97069 be4cff 97068->97069 97075 be3af0 97069->97075 97072 be4d9c 97073 be1038 97072->97073 97078 be51f7 22 API calls __fread_nolock 97072->97078 97074 c000a3 29 API calls __onexit 97073->97074 97074->97066 97079 be3b1c 97075->97079 97078->97072 97080 be3b0f 97079->97080 97081 be3b29 97079->97081 97080->97072 97081->97080 97082 be3b30 RegOpenKeyExW 97081->97082 97082->97080 97083 be3b4a RegQueryValueExW 97082->97083 97084 be3b80 RegCloseKey 97083->97084 97085 be3b6b 97083->97085 97084->97080 97085->97084 97086 be1cad SystemParametersInfoW 97087 be1044 97092 be10f3 97087->97092 97089 be104a 97128 c000a3 29 API calls __onexit 97089->97128 97091 be1054 97129 be1398 97092->97129 97096 be116a 97097 bea961 22 API calls 97096->97097 97098 be1174 97097->97098 97099 bea961 22 API calls 97098->97099 97100 be117e 97099->97100 97101 bea961 22 API calls 97100->97101 97102 be1188 97101->97102 97103 bea961 22 API calls 97102->97103 97104 be11c6 97103->97104 97105 bea961 22 API calls 97104->97105 97106 be1292 97105->97106 97139 be171c 97106->97139 97110 be12c4 97111 bea961 22 API calls 97110->97111 97112 be12ce 97111->97112 97113 bf1940 9 API calls 97112->97113 97114 be12f9 97113->97114 97160 be1aab 97114->97160 97116 be1315 97117 be1325 GetStdHandle 97116->97117 97118 be137a 97117->97118 97119 c22485 97117->97119 97123 be1387 OleInitialize 97118->97123 97119->97118 97120 c2248e 97119->97120 97121 bffddb 22 API calls 97120->97121 97122 c22495 97121->97122 97167 c5011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97122->97167 97123->97089 97125 c2249e 97168 c50944 CreateThread 97125->97168 97127 c224aa CloseHandle 97127->97118 97128->97091 97169 be13f1 97129->97169 97132 be13f1 22 API calls 97133 be13d0 97132->97133 97134 bea961 22 API calls 97133->97134 97135 be13dc 97134->97135 97136 be6b57 22 API calls 97135->97136 97137 be1129 97136->97137 97138 be1bc3 6 API calls 97137->97138 97138->97096 97140 bea961 22 API calls 97139->97140 97141 be172c 97140->97141 97142 bea961 22 API calls 97141->97142 97143 be1734 97142->97143 97144 bea961 22 API calls 97143->97144 97145 be174f 97144->97145 97146 bffddb 22 API calls 97145->97146 97147 be129c 97146->97147 97148 be1b4a 97147->97148 97149 be1b58 97148->97149 97150 bea961 22 API calls 97149->97150 97151 be1b63 97150->97151 97152 bea961 22 API calls 97151->97152 97153 be1b6e 97152->97153 97154 bea961 22 API calls 97153->97154 97155 be1b79 97154->97155 97156 bea961 22 API calls 97155->97156 97157 be1b84 97156->97157 97158 bffddb 22 API calls 97157->97158 97159 be1b96 RegisterWindowMessageW 97158->97159 97159->97110 97161 be1abb 97160->97161 97162 c2272d 97160->97162 97163 bffddb 22 API calls 97161->97163 97176 c53209 23 API calls 97162->97176 97165 be1ac3 97163->97165 97165->97116 97166 c22738 97167->97125 97168->97127 97177 c5092a 28 API calls 97168->97177 97170 bea961 22 API calls 97169->97170 97171 be13fc 97170->97171 97172 bea961 22 API calls 97171->97172 97173 be1404 97172->97173 97174 bea961 22 API calls 97173->97174 97175 be13c6 97174->97175 97175->97132 97176->97166 97178 c003fb 97179 c00407 __FrameHandler3::FrameUnwindToState 97178->97179 97207 bffeb1 97179->97207 97181 c0040e 97182 c00561 97181->97182 97186 c00438 97181->97186 97237 c0083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97182->97237 97184 c00568 97230 c04e52 97184->97230 97194 c00477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97186->97194 97218 c1247d 97186->97218 97192 c00457 97198 c004d8 97194->97198 97233 c04e1a 38 API calls 3 library calls 97194->97233 97197 c004de 97199 c004f3 97197->97199 97226 c00959 97198->97226 97234 c00992 GetModuleHandleW 97199->97234 97201 c004fa 97201->97184 97202 c004fe 97201->97202 97203 c00507 97202->97203 97235 c04df5 28 API calls _abort 97202->97235 97236 c00040 13 API calls 2 library calls 97203->97236 97206 c0050f 97206->97192 97208 bffeba 97207->97208 97239 c00698 IsProcessorFeaturePresent 97208->97239 97210 bffec6 97240 c02c94 10 API calls 3 library calls 97210->97240 97212 bffecb 97213 bffecf 97212->97213 97241 c12317 97212->97241 97213->97181 97216 bffee6 97216->97181 97219 c12494 97218->97219 97220 c00a8c _ValidateLocalCookies 5 API calls 97219->97220 97221 c00451 97220->97221 97221->97192 97222 c12421 97221->97222 97224 c12450 97222->97224 97223 c00a8c _ValidateLocalCookies 5 API calls 97225 c12479 97223->97225 97224->97223 97225->97194 97292 c02340 97226->97292 97228 c0096c GetStartupInfoW 97229 c0097f 97228->97229 97229->97197 97294 c04bcf 97230->97294 97233->97198 97234->97201 97235->97203 97236->97206 97237->97184 97239->97210 97240->97212 97245 c1d1f6 97241->97245 97244 c02cbd 8 API calls 3 library calls 97244->97213 97246 c1d213 97245->97246 97249 c1d20f 97245->97249 97246->97249 97251 c14bfb 97246->97251 97248 bffed8 97248->97216 97248->97244 97263 c00a8c 97249->97263 97252 c14c07 __FrameHandler3::FrameUnwindToState 97251->97252 97270 c12f5e EnterCriticalSection 97252->97270 97254 c14c0e 97271 c150af 97254->97271 97256 c14c2c 97286 c14c48 LeaveCriticalSection _abort 97256->97286 97257 c14c1d 97257->97256 97284 c14a8f 29 API calls 97257->97284 97260 c14c3d __wsopen_s 97260->97246 97261 c14c27 97285 c14b45 GetStdHandle GetFileType 97261->97285 97264 c00a95 97263->97264 97265 c00a97 IsProcessorFeaturePresent 97263->97265 97264->97248 97267 c00c5d 97265->97267 97291 c00c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97267->97291 97269 c00d40 97269->97248 97270->97254 97272 c150bb __FrameHandler3::FrameUnwindToState 97271->97272 97273 c150c8 97272->97273 97274 c150df 97272->97274 97288 c0f2d9 20 API calls __dosmaperr 97273->97288 97287 c12f5e EnterCriticalSection 97274->97287 97277 c150cd 97289 c127ec 26 API calls _strftime 97277->97289 97279 c150d7 __wsopen_s 97279->97257 97280 c15117 97290 c1513e LeaveCriticalSection _abort 97280->97290 97282 c15000 __wsopen_s 21 API calls 97283 c150eb 97282->97283 97283->97280 97283->97282 97284->97261 97285->97256 97286->97260 97287->97283 97288->97277 97289->97279 97290->97279 97291->97269 97293 c02357 97292->97293 97293->97228 97293->97293 97295 c04bdb FindHandlerForForeignException 97294->97295 97296 c04be2 97295->97296 97297 c04bf4 97295->97297 97333 c04d29 GetModuleHandleW 97296->97333 97318 c12f5e EnterCriticalSection 97297->97318 97300 c04be7 97300->97297 97334 c04d6d GetModuleHandleExW 97300->97334 97304 c04c70 97309 c04c88 97304->97309 97313 c12421 _abort 5 API calls 97304->97313 97306 c04ce2 97342 c21d29 5 API calls _ValidateLocalCookies 97306->97342 97307 c04cb6 97325 c04ce8 97307->97325 97308 c04bfb 97308->97304 97317 c04c99 97308->97317 97319 c121a8 97308->97319 97314 c12421 _abort 5 API calls 97309->97314 97313->97309 97314->97317 97322 c04cd9 97317->97322 97318->97308 97343 c11ee1 97319->97343 97362 c12fa6 LeaveCriticalSection 97322->97362 97324 c04cb2 97324->97306 97324->97307 97363 c1360c 97325->97363 97328 c04d16 97331 c04d6d _abort 8 API calls 97328->97331 97329 c04cf6 GetPEB 97329->97328 97330 c04d06 GetCurrentProcess TerminateProcess 97329->97330 97330->97328 97332 c04d1e ExitProcess 97331->97332 97333->97300 97335 c04d97 GetProcAddress 97334->97335 97336 c04dba 97334->97336 97339 c04dac 97335->97339 97337 c04dc0 FreeLibrary 97336->97337 97338 c04dc9 97336->97338 97337->97338 97340 c00a8c _ValidateLocalCookies 5 API calls 97338->97340 97339->97336 97341 c04bf3 97340->97341 97341->97297 97346 c11e90 97343->97346 97345 c11f05 97345->97304 97347 c11e9c __FrameHandler3::FrameUnwindToState 97346->97347 97354 c12f5e EnterCriticalSection 97347->97354 97349 c11eaa 97355 c11f31 97349->97355 97353 c11ec8 __wsopen_s 97353->97345 97354->97349 97356 c11f51 97355->97356 97357 c11f59 97355->97357 97358 c00a8c _ValidateLocalCookies 5 API calls 97356->97358 97357->97356 97360 c129c8 _free 20 API calls 97357->97360 97359 c11eb7 97358->97359 97361 c11ed5 LeaveCriticalSection _abort 97359->97361 97360->97356 97361->97353 97362->97324 97364 c13631 97363->97364 97365 c13627 97363->97365 97370 c12fd7 5 API calls 2 library calls 97364->97370 97368 c00a8c _ValidateLocalCookies 5 API calls 97365->97368 97367 c13648 97367->97365 97369 c04cf2 97368->97369 97369->97328 97369->97329 97370->97367 97371 be2de3 97372 be2df0 __wsopen_s 97371->97372 97373 be2e09 97372->97373 97374 c22c2b ___scrt_fastfail 97372->97374 97375 be3aa2 23 API calls 97373->97375 97377 c22c47 GetOpenFileNameW 97374->97377 97376 be2e12 97375->97376 97387 be2da5 97376->97387 97378 c22c96 97377->97378 97380 be6b57 22 API calls 97378->97380 97382 c22cab 97380->97382 97382->97382 97384 be2e27 97405 be44a8 97384->97405 97388 c21f50 __wsopen_s 97387->97388 97389 be2db2 GetLongPathNameW 97388->97389 97390 be6b57 22 API calls 97389->97390 97391 be2dda 97390->97391 97392 be3598 97391->97392 97393 bea961 22 API calls 97392->97393 97394 be35aa 97393->97394 97395 be3aa2 23 API calls 97394->97395 97396 be35b5 97395->97396 97397 be35c0 97396->97397 97400 c232eb 97396->97400 97399 be515f 22 API calls 97397->97399 97401 be35cc 97399->97401 97402 c2330d 97400->97402 97441 bfce60 41 API calls 97400->97441 97435 be35f3 97401->97435 97404 be35df 97404->97384 97406 be4ecb 94 API calls 97405->97406 97407 be44cd 97406->97407 97408 c23833 97407->97408 97410 be4ecb 94 API calls 97407->97410 97409 c52cf9 80 API calls 97408->97409 97411 c23848 97409->97411 97412 be44e1 97410->97412 97413 c23869 97411->97413 97414 c2384c 97411->97414 97412->97408 97415 be44e9 97412->97415 97417 bffe0b 22 API calls 97413->97417 97416 be4f39 68 API calls 97414->97416 97418 c23854 97415->97418 97419 be44f5 97415->97419 97416->97418 97434 c238ae 97417->97434 97443 c4da5a 82 API calls 97418->97443 97442 be940c 136 API calls 2 library calls 97419->97442 97422 be2e31 97423 c23862 97423->97413 97424 c23a5f 97429 c23a67 97424->97429 97425 be4f39 68 API calls 97425->97429 97429->97425 97449 c4989b 82 API calls __wsopen_s 97429->97449 97431 be9cb3 22 API calls 97431->97434 97434->97424 97434->97429 97434->97431 97444 c4967e 22 API calls __fread_nolock 97434->97444 97445 c495ad 42 API calls _wcslen 97434->97445 97446 c50b5a 22 API calls 97434->97446 97447 bea4a1 22 API calls __fread_nolock 97434->97447 97448 be3ff7 22 API calls 97434->97448 97436 be3605 97435->97436 97440 be3624 __fread_nolock 97435->97440 97438 bffe0b 22 API calls 97436->97438 97437 bffddb 22 API calls 97439 be363b 97437->97439 97438->97440 97439->97404 97440->97437 97441->97400 97442->97422 97443->97423 97444->97434 97445->97434 97446->97434 97447->97434 97448->97434 97449->97429

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 389 be42de-be434d call bea961 GetVersionExW call be6b57 394 c23617-c2362a 389->394 395 be4353 389->395 397 c2362b-c2362f 394->397 396 be4355-be4357 395->396 398 be435d-be43bc call be93b2 call be37a0 396->398 399 c23656 396->399 400 c23632-c2363e 397->400 401 c23631 397->401 417 be43c2-be43c4 398->417 418 c237df-c237e6 398->418 404 c2365d-c23660 399->404 400->397 403 c23640-c23642 400->403 401->400 403->396 406 c23648-c2364f 403->406 407 c23666-c236a8 404->407 408 be441b-be4435 GetCurrentProcess IsWow64Process 404->408 406->394 410 c23651 406->410 407->408 411 c236ae-c236b1 407->411 413 be4437 408->413 414 be4494-be449a 408->414 410->399 415 c236b3-c236bd 411->415 416 c236db-c236e5 411->416 419 be443d-be4449 413->419 414->419 420 c236ca-c236d6 415->420 421 c236bf-c236c5 415->421 423 c236e7-c236f3 416->423 424 c236f8-c23702 416->424 417->404 422 be43ca-be43dd 417->422 425 c23806-c23809 418->425 426 c237e8 418->426 427 be444f-be445e LoadLibraryA 419->427 428 c23824-c23828 GetSystemInfo 419->428 420->408 421->408 431 c23726-c2372f 422->431 432 be43e3-be43e5 422->432 423->408 434 c23704-c23710 424->434 435 c23715-c23721 424->435 436 c237f4-c237fc 425->436 437 c2380b-c2381a 425->437 433 c237ee 426->433 429 be449c-be44a6 GetSystemInfo 427->429 430 be4460-be446e GetProcAddress 427->430 439 be4476-be4478 429->439 430->429 438 be4470-be4474 GetNativeSystemInfo 430->438 442 c23731-c23737 431->442 443 c2373c-c23748 431->443 440 be43eb-be43ee 432->440 441 c2374d-c23762 432->441 433->436 434->408 435->408 436->425 437->433 444 c2381c-c23822 437->444 438->439 447 be447a-be447b FreeLibrary 439->447 448 be4481-be4493 439->448 449 c23791-c23794 440->449 450 be43f4-be440f 440->450 445 c23764-c2376a 441->445 446 c2376f-c2377b 441->446 442->408 443->408 444->436 445->408 446->408 447->448 449->408 451 c2379a-c237c1 449->451 452 c23780-c2378c 450->452 453 be4415 450->453 454 c237c3-c237c9 451->454 455 c237ce-c237da 451->455 452->408 453->408 454->408 455->408
                            APIs
                            • GetVersionExW.KERNEL32(?), ref: 00BE430D
                              • Part of subcall function 00BE6B57: _wcslen.LIBCMT ref: 00BE6B6A
                            • GetCurrentProcess.KERNEL32(?,00C7CB64,00000000,?,?), ref: 00BE4422
                            • IsWow64Process.KERNEL32(00000000,?,?), ref: 00BE4429
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00BE4454
                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00BE4466
                            • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00BE4474
                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 00BE447B
                            • GetSystemInfo.KERNEL32(?,?,?), ref: 00BE44A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                            • String ID: GetNativeSystemInfo$kernel32.dll$|O
                            • API String ID: 3290436268-3101561225
                            • Opcode ID: ed234a70c0955bc80695c7d5317c1711bec988c637a6b3b53d08cc67d7895caf
                            • Instruction ID: 3d60cf7039667dca41fe9a6acf66eaad76cb13dbdcb73128cbb296f0aca7fc86
                            • Opcode Fuzzy Hash: ed234a70c0955bc80695c7d5317c1711bec988c637a6b3b53d08cc67d7895caf
                            • Instruction Fuzzy Hash: 68A1B36591A3D0DFCB11C76A7CA139D7FE47B26700F8C4AA9E88193B72F7244648CB21

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 793 be42a2-be42ba CreateStreamOnHGlobal 794 be42bc-be42d3 FindResourceExW 793->794 795 be42da-be42dd 793->795 796 be42d9 794->796 797 c235ba-c235c9 LoadResource 794->797 796->795 797->796 798 c235cf-c235dd SizeofResource 797->798 798->796 799 c235e3-c235ee LockResource 798->799 799->796 800 c235f4-c23612 799->800 800->796
                            APIs
                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00BE50AA,?,?,00000000,00000000), ref: 00BE42B2
                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00BE50AA,?,?,00000000,00000000), ref: 00BE42C9
                            • LoadResource.KERNEL32(?,00000000,?,?,00BE50AA,?,?,00000000,00000000,?,?,?,?,?,?,00BE4F20), ref: 00C235BE
                            • SizeofResource.KERNEL32(?,00000000,?,?,00BE50AA,?,?,00000000,00000000,?,?,?,?,?,?,00BE4F20), ref: 00C235D3
                            • LockResource.KERNEL32(00BE50AA,?,?,00BE50AA,?,?,00000000,00000000,?,?,?,?,?,?,00BE4F20,?), ref: 00C235E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                            • String ID: SCRIPT
                            • API String ID: 3051347437-3967369404
                            • Opcode ID: f0c4c80e59a1a79612cf6194e20081123b9b550549c0d8228d577e360d8f7cbb
                            • Instruction ID: d2d7779c8b68814b1521b62d7d8e79f3d1616fa51a27ed8b81ab42d5ecd16124
                            • Opcode Fuzzy Hash: f0c4c80e59a1a79612cf6194e20081123b9b550549c0d8228d577e360d8f7cbb
                            • Instruction Fuzzy Hash: FB118E70200741BFDB258B66DC88F2B7BB9EBC5B51F1481ADF516D66A0DB71DC448620

                            Control-flow Graph

                            APIs
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00BE2B6B
                              • Part of subcall function 00BE3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00CB1418,?,00BE2E7F,?,?,?,00000000), ref: 00BE3A78
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • GetForegroundWindow.USER32(runas,?,?,?,?,?,00CA2224), ref: 00C22C10
                            • ShellExecuteW.SHELL32(00000000,?,?,00CA2224), ref: 00C22C17
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                            • String ID: runas
                            • API String ID: 448630720-4000483414
                            • Opcode ID: 3b0f49338f589a01ac87c26875c661913fbb70685a4e150a2abf42be859d9783
                            • Instruction ID: 36263a1e010e5f32ca568ca780be4532e875b65379068f740f2c6e294e33ef59
                            • Opcode Fuzzy Hash: 3b0f49338f589a01ac87c26875c661913fbb70685a4e150a2abf42be859d9783
                            • Instruction Fuzzy Hash: F411D6311083C16AC714FF72D895EBE77E89F91750F5814ADF586170A2DF218A4A8712

                            Control-flow Graph

                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00C4D501
                            • Process32FirstW.KERNEL32(00000000,?), ref: 00C4D50F
                            • Process32NextW.KERNEL32(00000000,?), ref: 00C4D52F
                            • CloseHandle.KERNELBASE(00000000), ref: 00C4D5DC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                            • String ID:
                            • API String ID: 420147892-0
                            • Opcode ID: 0203ae68d1f7135f9bfd5a34ed65a6dfb320245ffd95624dafab37eae63d9c49
                            • Instruction ID: c7aaecfa40471205b9f53c6c0a594c3a3b0a52dd0768099c560e72d9d048a1ab
                            • Opcode Fuzzy Hash: 0203ae68d1f7135f9bfd5a34ed65a6dfb320245ffd95624dafab37eae63d9c49
                            • Instruction Fuzzy Hash: 2E31B1711083419FD300EF54D881BAFBBE8FF99354F50096DF586821A1EB71AA88CB92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 993 c4dbbe-c4dbda lstrlenW 994 c4dc06 993->994 995 c4dbdc-c4dbe6 GetFileAttributesW 993->995 997 c4dc09-c4dc0d 994->997 996 c4dbe8-c4dbf7 FindFirstFileW 995->996 995->997 996->994 998 c4dbf9-c4dc04 FindClose 996->998 998->997
                            APIs
                            • lstrlenW.KERNEL32(?,00C25222), ref: 00C4DBCE
                            • GetFileAttributesW.KERNELBASE(?), ref: 00C4DBDD
                            • FindFirstFileW.KERNEL32(?,?), ref: 00C4DBEE
                            • FindClose.KERNEL32(00000000), ref: 00C4DBFA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FileFind$AttributesCloseFirstlstrlen
                            • String ID:
                            • API String ID: 2695905019-0
                            • Opcode ID: a79656d34c78b61ded09ef15c55693a769cace17e4175633ea7de6f97fbb7a82
                            • Instruction ID: 92a36e9ba801b272f0309e9999a822b2e9b083b1be7e9b8a0e36408067ba8b2c
                            • Opcode Fuzzy Hash: a79656d34c78b61ded09ef15c55693a769cace17e4175633ea7de6f97fbb7a82
                            • Instruction Fuzzy Hash: DCF0A0308109115783217BB8AC8DAAE377CAF02334B50471AF83AC20F0EBB05AD48695
                            APIs
                            • GetCurrentProcess.KERNEL32(00C128E9,?,00C04CBE,00C128E9,00CA88B8,0000000C,00C04E15,00C128E9,00000002,00000000,?,00C128E9), ref: 00C04D09
                            • TerminateProcess.KERNEL32(00000000,?,00C04CBE,00C128E9,00CA88B8,0000000C,00C04E15,00C128E9,00000002,00000000,?,00C128E9), ref: 00C04D10
                            • ExitProcess.KERNEL32 ref: 00C04D22
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process$CurrentExitTerminate
                            • String ID:
                            • API String ID: 1703294689-0
                            • Opcode ID: ae368dc09307e95e9836094d92d2993661a5935c62da9f688a6cd85174a66c2d
                            • Instruction ID: 96a144bfef9fa2ae3e58f19556ea628c3700cbfa037a1d00ce62c10574177e5f
                            • Opcode Fuzzy Hash: ae368dc09307e95e9836094d92d2993661a5935c62da9f688a6cd85174a66c2d
                            • Instruction Fuzzy Hash: 93E0B671000249BBCF15AF54DD49B9D3F69FB41B95B104018FD199A172CB35DE82DA80

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 c6aff9-c6b056 call c02340 3 c6b094-c6b098 0->3 4 c6b058-c6b06b call beb567 0->4 5 c6b0dd-c6b0e0 3->5 6 c6b09a-c6b0bb call beb567 * 2 3->6 15 c6b06d-c6b092 call beb567 * 2 4->15 16 c6b0c8 4->16 8 c6b0f5-c6b119 call be7510 call be7620 5->8 9 c6b0e2-c6b0e5 5->9 30 c6b0bf-c6b0c4 6->30 32 c6b11f-c6b178 call be7510 call be7620 call be7510 call be7620 call be7510 call be7620 8->32 33 c6b1d8-c6b1e0 8->33 12 c6b0e8-c6b0ed call beb567 9->12 12->8 15->30 20 c6b0cb-c6b0cf 16->20 26 c6b0d1-c6b0d7 20->26 27 c6b0d9-c6b0db 20->27 26->12 27->5 27->8 30->5 34 c6b0c6 30->34 80 c6b1a6-c6b1d6 GetSystemDirectoryW call bffe0b GetSystemDirectoryW 32->80 81 c6b17a-c6b195 call be7510 call be7620 32->81 35 c6b1e2-c6b1fd call be7510 call be7620 33->35 36 c6b20a-c6b238 GetCurrentDirectoryW call bffe0b GetCurrentDirectoryW 33->36 34->20 35->36 50 c6b1ff-c6b208 call c04963 35->50 45 c6b23c 36->45 48 c6b240-c6b244 45->48 51 c6b246-c6b270 call be9c6e * 3 48->51 52 c6b275-c6b285 call c500d9 48->52 50->36 50->52 51->52 64 c6b287-c6b289 52->64 65 c6b28b-c6b2e1 call c507c0 call c506e6 call c505a7 52->65 68 c6b2ee-c6b2f2 64->68 65->68 96 c6b2e3 65->96 70 c6b39a-c6b3be CreateProcessW 68->70 71 c6b2f8-c6b321 call c411c8 68->71 78 c6b3c1-c6b3d4 call bffe14 * 2 70->78 85 c6b323-c6b328 call c41201 71->85 86 c6b32a call c414ce 71->86 101 c6b3d6-c6b3e8 78->101 102 c6b42f-c6b43d CloseHandle 78->102 80->45 81->80 107 c6b197-c6b1a0 call c04963 81->107 100 c6b32f-c6b33c call c04963 85->100 86->100 96->68 115 c6b347-c6b357 call c04963 100->115 116 c6b33e-c6b345 100->116 105 c6b3ed-c6b3fc 101->105 106 c6b3ea 101->106 109 c6b43f-c6b444 102->109 110 c6b49c 102->110 111 c6b401-c6b42a GetLastError call be630c call becfa0 105->111 112 c6b3fe 105->112 106->105 107->48 107->80 117 c6b446-c6b44c CloseHandle 109->117 118 c6b451-c6b456 109->118 113 c6b4a0-c6b4a4 110->113 130 c6b4e5-c6b4f6 call c50175 111->130 112->111 122 c6b4a6-c6b4b0 113->122 123 c6b4b2-c6b4bc 113->123 133 c6b362-c6b372 call c04963 115->133 134 c6b359-c6b360 115->134 116->115 116->116 117->118 119 c6b463-c6b468 118->119 120 c6b458-c6b45e CloseHandle 118->120 127 c6b475-c6b49a call c509d9 call c6b536 119->127 128 c6b46a-c6b470 CloseHandle 119->128 120->119 122->130 131 c6b4c4-c6b4e3 call becfa0 CloseHandle 123->131 132 c6b4be 123->132 127->113 128->127 131->130 132->131 146 c6b374-c6b37b 133->146 147 c6b37d-c6b398 call bffe14 * 3 133->147 134->133 134->134 146->146 146->147 147->78
                            APIs
                            • _wcslen.LIBCMT ref: 00C6B198
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C6B1B0
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C6B1D4
                            • _wcslen.LIBCMT ref: 00C6B200
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C6B214
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C6B236
                            • _wcslen.LIBCMT ref: 00C6B332
                              • Part of subcall function 00C505A7: GetStdHandle.KERNEL32(000000F6), ref: 00C505C6
                            • _wcslen.LIBCMT ref: 00C6B34B
                            • _wcslen.LIBCMT ref: 00C6B366
                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C6B3B6
                            • GetLastError.KERNEL32(00000000), ref: 00C6B407
                            • CloseHandle.KERNEL32(?), ref: 00C6B439
                            • CloseHandle.KERNEL32(00000000), ref: 00C6B44A
                            • CloseHandle.KERNEL32(00000000), ref: 00C6B45C
                            • CloseHandle.KERNEL32(00000000), ref: 00C6B46E
                            • CloseHandle.KERNEL32(?), ref: 00C6B4E3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                            • String ID:
                            • API String ID: 2178637699-0
                            • Opcode ID: 53a5f037d25e2835e9672fae5e5306bad3b1fe058938b11d098692b8d259f24c
                            • Instruction ID: ce17656235ae3e44a06d3a3fcb87a27114bad1fe9694589bc41f70b211078f22
                            • Opcode Fuzzy Hash: 53a5f037d25e2835e9672fae5e5306bad3b1fe058938b11d098692b8d259f24c
                            • Instruction Fuzzy Hash: 8DF1CD716083409FC724EF25C891B2FBBE4AF85314F14846DF9998B2A2DB30ED85CB52
                            APIs
                            • GetInputState.USER32 ref: 00BED807
                            • timeGetTime.WINMM ref: 00BEDA07
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BEDB28
                            • TranslateMessage.USER32(?), ref: 00BEDB7B
                            • DispatchMessageW.USER32(?), ref: 00BEDB89
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BEDB9F
                            • Sleep.KERNEL32(0000000A), ref: 00BEDBB1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                            • String ID:
                            • API String ID: 2189390790-0
                            • Opcode ID: bf21fb74300c1993db323f561e615b1263234a92b3922e942982603b7b3330b4
                            • Instruction ID: 6181415c6161465e3803ba41f0dd6785feab9720b44a6ed1d58fa8f0977c1591
                            • Opcode Fuzzy Hash: bf21fb74300c1993db323f561e615b1263234a92b3922e942982603b7b3330b4
                            • Instruction Fuzzy Hash: 8142F430608382DFDB24CF26C884B7AB7E0FF45314F5446ADE96687291D7B4E984DB92

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 00BE2D07
                            • RegisterClassExW.USER32(00000030), ref: 00BE2D31
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BE2D42
                            • InitCommonControlsEx.COMCTL32(?), ref: 00BE2D5F
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00BE2D6F
                            • LoadIconW.USER32(000000A9), ref: 00BE2D85
                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00BE2D94
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                            • API String ID: 2914291525-1005189915
                            • Opcode ID: 443acc1bfaa4b2c788c49fadc9b653392bcb5a9e7a3f76b56fcd37d5fabe5908
                            • Instruction ID: 9f326ecbf3738f3be42ce9936d21867687b0fc4cddda00872fc636e1a9802bee
                            • Opcode Fuzzy Hash: 443acc1bfaa4b2c788c49fadc9b653392bcb5a9e7a3f76b56fcd37d5fabe5908
                            • Instruction Fuzzy Hash: 1B21F7B1D01349AFDB00DFA4EC99BDDBBB8FB08701F14821AF915A62A0D7B10584CF91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 457 c2065b-c2068b call c2042f 460 c206a6-c206b2 call c15221 457->460 461 c2068d-c20698 call c0f2c6 457->461 466 c206b4-c206c9 call c0f2c6 call c0f2d9 460->466 467 c206cb-c20714 call c2039a 460->467 468 c2069a-c206a1 call c0f2d9 461->468 466->468 477 c20781-c2078a GetFileType 467->477 478 c20716-c2071f 467->478 475 c2097d-c20983 468->475 479 c207d3-c207d6 477->479 480 c2078c-c207bd GetLastError call c0f2a3 CloseHandle 477->480 482 c20721-c20725 478->482 483 c20756-c2077c GetLastError call c0f2a3 478->483 486 c207d8-c207dd 479->486 487 c207df-c207e5 479->487 480->468 494 c207c3-c207ce call c0f2d9 480->494 482->483 488 c20727-c20754 call c2039a 482->488 483->468 491 c207e9-c20837 call c1516a 486->491 487->491 492 c207e7 487->492 488->477 488->483 499 c20847-c2086b call c2014d 491->499 500 c20839-c20845 call c205ab 491->500 492->491 494->468 507 c2087e-c208c1 499->507 508 c2086d 499->508 500->499 506 c2086f-c20879 call c186ae 500->506 506->475 510 c208e2-c208f0 507->510 511 c208c3-c208c7 507->511 508->506 514 c208f6-c208fa 510->514 515 c2097b 510->515 511->510 513 c208c9-c208dd 511->513 513->510 514->515 516 c208fc-c2092f CloseHandle call c2039a 514->516 515->475 519 c20963-c20977 516->519 520 c20931-c2095d GetLastError call c0f2a3 call c15333 516->520 519->515 520->519
                            APIs
                              • Part of subcall function 00C2039A: CreateFileW.KERNELBASE(00000000,00000000,?,00C20704,?,?,00000000,?,00C20704,00000000,0000000C), ref: 00C203B7
                            • GetLastError.KERNEL32 ref: 00C2076F
                            • __dosmaperr.LIBCMT ref: 00C20776
                            • GetFileType.KERNELBASE(00000000), ref: 00C20782
                            • GetLastError.KERNEL32 ref: 00C2078C
                            • __dosmaperr.LIBCMT ref: 00C20795
                            • CloseHandle.KERNEL32(00000000), ref: 00C207B5
                            • CloseHandle.KERNEL32(?), ref: 00C208FF
                            • GetLastError.KERNEL32 ref: 00C20931
                            • __dosmaperr.LIBCMT ref: 00C20938
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                            • String ID: H
                            • API String ID: 4237864984-2852464175
                            • Opcode ID: 3b6110ad7aa95be1a1243097bc6c65dd75da52dcf241cb2d0e47e35bdb0ae011
                            • Instruction ID: cf406549cc10132e79d8418751eb40d831cdf764ddd1ceb54dd9a418045d453c
                            • Opcode Fuzzy Hash: 3b6110ad7aa95be1a1243097bc6c65dd75da52dcf241cb2d0e47e35bdb0ae011
                            • Instruction Fuzzy Hash: EDA11832A041188FDF19EF68EC51BAE7BA0AB46320F24015EF8159B3E2D7319D53DB91

                            Control-flow Graph

                            APIs
                              • Part of subcall function 00BE3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00CB1418,?,00BE2E7F,?,?,?,00000000), ref: 00BE3A78
                              • Part of subcall function 00BE3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00BE3379
                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00BE356A
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00C2318D
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00C231CE
                            • RegCloseKey.ADVAPI32(?), ref: 00C23210
                            • _wcslen.LIBCMT ref: 00C23277
                            • _wcslen.LIBCMT ref: 00C23286
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                            • API String ID: 98802146-2727554177
                            • Opcode ID: 79db31e88f9a172b76f212ca9186c53e16eda470c7406a40d9da6885c548e7f1
                            • Instruction ID: 72d0cf4a467dca1944ebdd60500117299a1dc6b44cdd0f9115349799faa09469
                            • Opcode Fuzzy Hash: 79db31e88f9a172b76f212ca9186c53e16eda470c7406a40d9da6885c548e7f1
                            • Instruction Fuzzy Hash: A67158714043419EC314EF66E885AAEBBECFF99740F404A2EF555931B1EB349A48CB62

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 00BE2B8E
                            • LoadCursorW.USER32(00000000,00007F00), ref: 00BE2B9D
                            • LoadIconW.USER32(00000063), ref: 00BE2BB3
                            • LoadIconW.USER32(000000A4), ref: 00BE2BC5
                            • LoadIconW.USER32(000000A2), ref: 00BE2BD7
                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00BE2BEF
                            • RegisterClassExW.USER32(?), ref: 00BE2C40
                              • Part of subcall function 00BE2CD4: GetSysColorBrush.USER32(0000000F), ref: 00BE2D07
                              • Part of subcall function 00BE2CD4: RegisterClassExW.USER32(00000030), ref: 00BE2D31
                              • Part of subcall function 00BE2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BE2D42
                              • Part of subcall function 00BE2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00BE2D5F
                              • Part of subcall function 00BE2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00BE2D6F
                              • Part of subcall function 00BE2CD4: LoadIconW.USER32(000000A9), ref: 00BE2D85
                              • Part of subcall function 00BE2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00BE2D94
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                            • String ID: #$0$AutoIt v3
                            • API String ID: 423443420-4155596026
                            • Opcode ID: f21a94d3542fe7b8e3d303a59421dd3d350f2bd7b2e275fad75d44e82f3e8d62
                            • Instruction ID: 1d22e6c496f37a6207adaf4dd69e1c952f97448ecc4c1accad2480a75c7986a4
                            • Opcode Fuzzy Hash: f21a94d3542fe7b8e3d303a59421dd3d350f2bd7b2e275fad75d44e82f3e8d62
                            • Instruction Fuzzy Hash: 21212F71E00354ABDB109FA5ECA5BAD7FF4FB48B50F58415AEA04A66B0E7B10940CF90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 598 be3170-be3185 599 be3187-be318a 598->599 600 be31e5-be31e7 598->600 601 be318c-be3193 599->601 602 be31eb 599->602 600->599 603 be31e9 600->603 607 be3199-be319e 601->607 608 be3265-be326d PostQuitMessage 601->608 605 c22dfb-c22e23 call be18e2 call bfe499 602->605 606 be31f1-be31f6 602->606 604 be31d0-be31d8 DefWindowProcW 603->604 614 be31de-be31e4 604->614 644 c22e28-c22e2f 605->644 609 be321d-be3244 SetTimer RegisterWindowMessageW 606->609 610 be31f8-be31fb 606->610 612 be31a4-be31a8 607->612 613 c22e7c-c22e90 call c4bf30 607->613 615 be3219-be321b 608->615 609->615 619 be3246-be3251 CreatePopupMenu 609->619 616 c22d9c-c22d9f 610->616 617 be3201-be320f KillTimer call be30f2 610->617 620 be31ae-be31b3 612->620 621 c22e68-c22e77 call c4c161 612->621 613->615 639 c22e96 613->639 615->614 629 c22da1-c22da5 616->629 630 c22dd7-c22df6 MoveWindow 616->630 634 be3214 call be3c50 617->634 619->615 626 be31b9-be31be 620->626 627 c22e4d-c22e54 620->627 621->615 637 be31c4-be31ca 626->637 638 be3253-be3263 call be326f 626->638 627->604 633 c22e5a-c22e63 call c40ad7 627->633 631 c22dc6-c22dd2 SetFocus 629->631 632 c22da7-c22daa 629->632 630->615 631->615 632->637 640 c22db0-c22dc1 call be18e2 632->640 633->604 634->615 637->604 637->644 638->615 639->604 640->615 644->604 648 c22e35-c22e48 call be30f2 call be3837 644->648 648->604
                            APIs
                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00BE316A,?,?), ref: 00BE31D8
                            • KillTimer.USER32(?,00000001,?,?,?,?,?,00BE316A,?,?), ref: 00BE3204
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00BE3227
                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00BE316A,?,?), ref: 00BE3232
                            • CreatePopupMenu.USER32 ref: 00BE3246
                            • PostQuitMessage.USER32(00000000), ref: 00BE3267
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                            • String ID: TaskbarCreated
                            • API String ID: 129472671-2362178303
                            • Opcode ID: 45c78923792ddc27d0c1d8e0a1ec679c5b4c48515c4a91a7cffa411b3f47f626
                            • Instruction ID: e8afba24972c540351695b0b602629835ba12c955cac7d4e7e600a4d955fc39d
                            • Opcode Fuzzy Hash: 45c78923792ddc27d0c1d8e0a1ec679c5b4c48515c4a91a7cffa411b3f47f626
                            • Instruction Fuzzy Hash: 7F416931204280A7DF141B399C9DBBD37D9EB05B41F4802ADFA56971A1DB71CF40D762

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 654 be1410-be1449 655 be144f-be1465 mciSendStringW 654->655 656 c224b8-c224b9 DestroyWindow 654->656 657 be146b-be1473 655->657 658 be16c6-be16d3 655->658 659 c224c4-c224d1 656->659 657->659 660 be1479-be1488 call be182e 657->660 661 be16f8-be16ff 658->661 662 be16d5-be16f0 UnregisterHotKey 658->662 663 c224d3-c224d6 659->663 664 c22500-c22507 659->664 675 be148e-be1496 660->675 676 c2250e-c2251a 660->676 661->657 667 be1705 661->667 662->661 666 be16f2-be16f3 call be10d0 662->666 668 c224e2-c224e5 FindClose 663->668 669 c224d8-c224e0 call be6246 663->669 664->659 672 c22509 664->672 666->661 667->658 674 c224eb-c224f8 668->674 669->674 672->676 674->664 678 c224fa-c224fb call c532b1 674->678 679 c22532-c2253f 675->679 680 be149c-be14c1 call becfa0 675->680 681 c22524-c2252b 676->681 682 c2251c-c2251e FreeLibrary 676->682 678->664 684 c22541-c2255e VirtualFree 679->684 685 c22566-c2256d 679->685 692 be14f8-be1503 CoUninitialize 680->692 693 be14c3 680->693 681->676 683 c2252d 681->683 682->681 683->679 684->685 688 c22560-c22561 call c53317 684->688 685->679 689 c2256f 685->689 688->685 694 c22574-c22578 689->694 692->694 695 be1509-be150e 692->695 696 be14c6-be14f6 call be1a05 call be19ae 693->696 694->695 699 c2257e-c22584 694->699 697 be1514-be151e 695->697 698 c22589-c22596 call c532eb 695->698 696->692 701 be1707-be1714 call bff80e 697->701 702 be1524-be15a5 call be988f call be1944 call be17d5 call bffe14 call be177c call be988f call becfa0 call be17fe call bffe14 697->702 710 c22598 698->710 699->695 701->702 715 be171a 701->715 716 c2259d-c225bf call bffdcd 702->716 744 be15ab-be15cf call bffe14 702->744 710->716 715->701 722 c225c1 716->722 725 c225c6-c225e8 call bffdcd 722->725 732 c225ea 725->732 735 c225ef-c22611 call bffdcd 732->735 741 c22613 735->741 743 c22618-c22625 call c464d4 741->743 749 c22627 743->749 744->725 750 be15d5-be15f9 call bffe14 744->750 752 c2262c-c22639 call bfac64 749->752 750->735 755 be15ff-be1619 call bffe14 750->755 758 c2263b 752->758 755->743 760 be161f-be1643 call be17d5 call bffe14 755->760 762 c22640-c2264d call c53245 758->762 760->752 769 be1649-be1651 760->769 768 c2264f 762->768 770 c22654-c22661 call c532cc 768->770 769->762 771 be1657-be1675 call be988f call be190a 769->771 776 c22663 770->776 771->770 780 be167b-be1689 771->780 779 c22668-c22675 call c532cc 776->779 785 c22677 779->785 780->779 782 be168f-be16c5 call be988f * 3 call be1876 780->782 785->785
                            APIs
                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00BE1459
                            • CoUninitialize.COMBASE ref: 00BE14F8
                            • UnregisterHotKey.USER32(?), ref: 00BE16DD
                            • DestroyWindow.USER32(?), ref: 00C224B9
                            • FreeLibrary.KERNEL32(?), ref: 00C2251E
                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00C2254B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                            • String ID: close all
                            • API String ID: 469580280-3243417748
                            • Opcode ID: 196a750bdf3eced285c69d608d203289515b5eccbb2af18ac7f17cf08f5da7d9
                            • Instruction ID: b1429f1518026c21e7da26860738bc9cb1e67ce0bece475a67a89cf4c8ef3fa5
                            • Opcode Fuzzy Hash: 196a750bdf3eced285c69d608d203289515b5eccbb2af18ac7f17cf08f5da7d9
                            • Instruction Fuzzy Hash: 11D18D71701262DFCB29EF19D895A29F7E0BF04700F2486EDE54A6B652CB30AD56CF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 803 be2c63-be2cd3 CreateWindowExW * 2 ShowWindow * 2
                            APIs
                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00BE2C91
                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00BE2CB2
                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00BE1CAD,?), ref: 00BE2CC6
                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00BE1CAD,?), ref: 00BE2CCF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$CreateShow
                            • String ID: AutoIt v3$edit
                            • API String ID: 1584632944-3779509399
                            • Opcode ID: c9c967a5b261ece003ec898ccb4cc16c91507a22a07f94992cdf1e0d9b1b1196
                            • Instruction ID: f910134bcf29052d0909fa78b246cd7d970a86e6919dc7bf633e13f582641acb
                            • Opcode Fuzzy Hash: c9c967a5b261ece003ec898ccb4cc16c91507a22a07f94992cdf1e0d9b1b1196
                            • Instruction Fuzzy Hash: 98F03A755402907AEB301B23AC58F7B2EBDD7C6F51F58411EFE04A21B0E6614840DBB0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 954 be3b1c-be3b27 955 be3b99-be3b9b 954->955 956 be3b29-be3b2e 954->956 957 be3b8c-be3b8f 955->957 956->955 958 be3b30-be3b48 RegOpenKeyExW 956->958 958->955 959 be3b4a-be3b69 RegQueryValueExW 958->959 960 be3b6b-be3b76 959->960 961 be3b80-be3b8b RegCloseKey 959->961 962 be3b78-be3b7a 960->962 963 be3b90-be3b97 960->963 961->957 964 be3b7e 962->964 963->964 964->961
                            APIs
                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00BE3B0F,SwapMouseButtons,00000004,?), ref: 00BE3B40
                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00BE3B0F,SwapMouseButtons,00000004,?), ref: 00BE3B61
                            • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00BE3B0F,SwapMouseButtons,00000004,?), ref: 00BE3B83
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: Control Panel\Mouse
                            • API String ID: 3677997916-824357125
                            • Opcode ID: 8cef95d95e79b9ecb082af71cecf4ec17990ae1af179a6cc98b0f34d82be278c
                            • Instruction ID: aec8a74383dd3589fd4164130e081e40dc2d59cdcfab254bc2c11298c0445ede
                            • Opcode Fuzzy Hash: 8cef95d95e79b9ecb082af71cecf4ec17990ae1af179a6cc98b0f34d82be278c
                            • Instruction Fuzzy Hash: A8112AB5510248FFDB208FA6DC88AAEB7F8EF44B84B108599E806D7110D3319E4097A0
                            APIs
                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00C233A2
                              • Part of subcall function 00BE6B57: _wcslen.LIBCMT ref: 00BE6B6A
                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00BE3A04
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: IconLoadNotifyShell_String_wcslen
                            • String ID: Line:
                            • API String ID: 2289894680-1585850449
                            • Opcode ID: 9939dac31121ce3b5d3371a6290580d44494bed46adf5c77ce24b4290c42aa42
                            • Instruction ID: 4d8c75b7a0d4b704bbfbacaf46f2eae05b9904640988cb18f5378664555efd46
                            • Opcode Fuzzy Hash: 9939dac31121ce3b5d3371a6290580d44494bed46adf5c77ce24b4290c42aa42
                            • Instruction Fuzzy Hash: CB31D471408384AAC725EB21DC59BEFB7D8AF40B10F14466EF599830E1EB749B49C7C6
                            APIs
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00C00668
                              • Part of subcall function 00C032A4: RaiseException.KERNEL32(?,?,?,00C0068A,?,00CB1444,?,?,?,?,?,?,00C0068A,00BE1129,00CA8738,00BE1129), ref: 00C03304
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00C00685
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Exception@8Throw$ExceptionRaise
                            • String ID: Unknown exception
                            • API String ID: 3476068407-410509341
                            • Opcode ID: b468bd9c9db186ac10a49346b75d5e6ab24b1bf27842086725f600ee4990360f
                            • Instruction ID: eec95436b15205833f7189803c8f7516c78810c6f0ca447cbc1aad3f2eedc79f
                            • Opcode Fuzzy Hash: b468bd9c9db186ac10a49346b75d5e6ab24b1bf27842086725f600ee4990360f
                            • Instruction Fuzzy Hash: 48F0C23890060EB7CB00BA65DC46EAE7BADAE00350F704571BA24D65D2EF72EB69D590
                            APIs
                              • Part of subcall function 00BE1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00BE1BF4
                              • Part of subcall function 00BE1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00BE1BFC
                              • Part of subcall function 00BE1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00BE1C07
                              • Part of subcall function 00BE1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00BE1C12
                              • Part of subcall function 00BE1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00BE1C1A
                              • Part of subcall function 00BE1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00BE1C22
                              • Part of subcall function 00BE1B4A: RegisterWindowMessageW.USER32(00000004,?,00BE12C4), ref: 00BE1BA2
                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00BE136A
                            • OleInitialize.OLE32 ref: 00BE1388
                            • CloseHandle.KERNEL32(00000000,00000000), ref: 00C224AB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                            • String ID:
                            • API String ID: 1986988660-0
                            • Opcode ID: 02429eef9f1864f34a80cf52127c90f33dc5c7d88c095ee54e59c5bacf34e7ee
                            • Instruction ID: 938c1836aaa7e2e7ab412ef0346b057127176f0374e0f447237a8e934414348f
                            • Opcode Fuzzy Hash: 02429eef9f1864f34a80cf52127c90f33dc5c7d88c095ee54e59c5bacf34e7ee
                            • Instruction Fuzzy Hash: 6271B0B49112418EC7A4DF7AA86579D3BE4FB88340BED876EDC0AD72A1EB305449CF50
                            APIs
                            • CloseHandle.KERNELBASE(00000000,00000000,?,?,00C185CC,?,00CA8CC8,0000000C), ref: 00C18704
                            • GetLastError.KERNEL32(?,00C185CC,?,00CA8CC8,0000000C), ref: 00C1870E
                            • __dosmaperr.LIBCMT ref: 00C18739
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CloseErrorHandleLast__dosmaperr
                            • String ID:
                            • API String ID: 2583163307-0
                            • Opcode ID: a7b6dbd6844299bed4f127acb203a8c70cdd94d1ed552aecca4eced110bcd2e2
                            • Instruction ID: ae1eacfb8ba756e1badb303f7f7d7f03f9b069b9078111068396f8b7ad82030b
                            • Opcode Fuzzy Hash: a7b6dbd6844299bed4f127acb203a8c70cdd94d1ed552aecca4eced110bcd2e2
                            • Instruction Fuzzy Hash: F5014932A0D62066D664A334A885BFE67494BC3774F39025EF8389B1E2DEA0CDC5B190
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 00BF17F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Init_thread_footer
                            • String ID: CALL
                            • API String ID: 1385522511-4196123274
                            • Opcode ID: fa712e0dd8b4bbe40ae53b8468ed0a27133c756495118def02d1b3f5c93cb6d0
                            • Instruction ID: 50b1732d6e0365a358a9c638740dfc3cb7bdff9769b5d21a75430dd1825eb6bc
                            • Opcode Fuzzy Hash: fa712e0dd8b4bbe40ae53b8468ed0a27133c756495118def02d1b3f5c93cb6d0
                            • Instruction Fuzzy Hash: 9C227970608245EFC714DF18C480A3ABBF1AF95354F248DADF69A8B361D731E949CB92
                            APIs
                            • GetOpenFileNameW.COMDLG32(?), ref: 00C22C8C
                              • Part of subcall function 00BE3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BE3A97,?,?,00BE2E7F,?,?,?,00000000), ref: 00BE3AC2
                              • Part of subcall function 00BE2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00BE2DC4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Name$Path$FileFullLongOpen
                            • String ID: X
                            • API String ID: 779396738-3081909835
                            • Opcode ID: aac4da5f9061142edfab8a0c3f8bea34bacaf8f75bc2bad07060c1ce5a9d228c
                            • Instruction ID: 5676a0b1d74e256cd45db0dd4d607e272d43bbf598afa99172d59626fc61d551
                            • Opcode Fuzzy Hash: aac4da5f9061142edfab8a0c3f8bea34bacaf8f75bc2bad07060c1ce5a9d228c
                            • Instruction Fuzzy Hash: 2321D570A00298AFDF01DF95C849BEE7BFCAF49304F048059E515A7241DBB45A898FA1
                            APIs
                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00BE3908
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: IconNotifyShell_
                            • String ID:
                            • API String ID: 1144537725-0
                            • Opcode ID: dc9060948475392caf0f2bd91b089c883cefaf24f2bf458f30717da4c7adfaa0
                            • Instruction ID: b78ba7e1d720bc75385c58a631e0a3fe83cf3d6177ea229f95ff56198deaf971
                            • Opcode Fuzzy Hash: dc9060948475392caf0f2bd91b089c883cefaf24f2bf458f30717da4c7adfaa0
                            • Instruction Fuzzy Hash: 5F31A2705043419FD720DF25D8997ABBBF8FB49708F04096EFA9A83290E771AA44CB52
                            APIs
                              • Part of subcall function 00C14CDA: DeleteCriticalSection.KERNEL32(?,?,?,?,?,00CA8BE8,00000010,00C0914E), ref: 00C14D3C
                              • Part of subcall function 00C14CDA: _free.LIBCMT ref: 00C14D4A
                              • Part of subcall function 00C14D7A: _free.LIBCMT ref: 00C14D9C
                            • DeleteCriticalSection.KERNEL32(-00000020), ref: 00C0916A
                            • _free.LIBCMT ref: 00C0917E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free$CriticalDeleteSection
                            • String ID:
                            • API String ID: 1906768660-0
                            • Opcode ID: a839cfdde4198af004f2cf2ee7c10bbc0f8525f9b466698ad681a15c5b258438
                            • Instruction ID: 21e651c4247adaf2384e0c0d002b32482e203f4b20dabcd41f32fa50a881178d
                            • Opcode Fuzzy Hash: a839cfdde4198af004f2cf2ee7c10bbc0f8525f9b466698ad681a15c5b258438
                            • Instruction Fuzzy Hash: ADE0DF32920520CBCB217BACFC55B9E33A4FB5A32AF21110AF40593161CB21EC92EA84
                            APIs
                              • Part of subcall function 00BE4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00BE4EDD,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4E9C
                              • Part of subcall function 00BE4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00BE4EAE
                              • Part of subcall function 00BE4E90: FreeLibrary.KERNEL32(00000000,?,?,00BE4EDD,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4EC0
                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4EFD
                              • Part of subcall function 00BE4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C23CDE,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4E62
                              • Part of subcall function 00BE4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00BE4E74
                              • Part of subcall function 00BE4E59: FreeLibrary.KERNEL32(00000000,?,?,00C23CDE,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4E87
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Library$Load$AddressFreeProc
                            • String ID:
                            • API String ID: 2632591731-0
                            • Opcode ID: 0ee6bef91fb3060c508d78474c6a4acba794779f4f484153924befc31b508680
                            • Instruction ID: 1d0f69e1fe4c89b9ff552ee3ca3512c0380f825a27434c8bb0ddb4290d695a00
                            • Opcode Fuzzy Hash: 0ee6bef91fb3060c508d78474c6a4acba794779f4f484153924befc31b508680
                            • Instruction Fuzzy Hash: 0D11E332600345AACB24BB66DC42FED77E5AF40B11F20886DF546A61C2EF749A459790
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: __wsopen_s
                            • String ID:
                            • API String ID: 3347428461-0
                            • Opcode ID: 2c082c948b042b59b2aa9a2000f13cdaad35b430195e820d4d376013a70ccc72
                            • Instruction ID: fb35436efea6fff28b9e5ca110eed4c3ed2d679afb731cca5829b933fd14e962
                            • Opcode Fuzzy Hash: 2c082c948b042b59b2aa9a2000f13cdaad35b430195e820d4d376013a70ccc72
                            • Instruction Fuzzy Hash: 6911487190810AAFCB05DF58E940ADE7BF5EF49300F104059F808AB312DA30DA25DBA4
                            APIs
                              • Part of subcall function 00C14C7D: RtlAllocateHeap.NTDLL(00000008,00BE1129,00000000,?,00C12E29,00000001,00000364,?,?,?,00C0F2DE,00C13863,00CB1444,?,00BFFDF5,?), ref: 00C14CBE
                            • _free.LIBCMT ref: 00C1506C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap_free
                            • String ID:
                            • API String ID: 614378929-0
                            • Opcode ID: 655a31e7387c1f28a70501aabde92791eb52eb4d5a70654cf98b1306b346947d
                            • Instruction ID: 14b0be41705ea20163abe889ecb3cd747a43da9050fdcbb616fb3847b51210d7
                            • Opcode Fuzzy Hash: 655a31e7387c1f28a70501aabde92791eb52eb4d5a70654cf98b1306b346947d
                            • Instruction Fuzzy Hash: 48012B722047049BE3218E5598819DAFBE8FBCA370F25051DE194832C0E630A946D6B4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b6648c02b6181a3054024c9e46e369ee253c9ce1af06010b8a4fd45ee0b60682
                            • Instruction ID: df9bbdbd990614f5e01e5072d2eff8af9082a073959f8c81a3f16ca58b12996b
                            • Opcode Fuzzy Hash: b6648c02b6181a3054024c9e46e369ee253c9ce1af06010b8a4fd45ee0b60682
                            • Instruction Fuzzy Hash: 19F0F432510A1896DA313A6AAC05B9A339C9F53335F100B19F421931D2CF719946E6A5
                            APIs
                            • RtlAllocateHeap.NTDLL(00000008,00BE1129,00000000,?,00C12E29,00000001,00000364,?,?,?,00C0F2DE,00C13863,00CB1444,?,00BFFDF5,?), ref: 00C14CBE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 213ba7cbc4c5fdd554fbf1f9972a20f3d3b294debdabf28444f28ab438fd78a9
                            • Instruction ID: 8020acc6da25493ed26eb66e9b1545884957a2dab6b646979d1d186721241738
                            • Opcode Fuzzy Hash: 213ba7cbc4c5fdd554fbf1f9972a20f3d3b294debdabf28444f28ab438fd78a9
                            • Instruction Fuzzy Hash: 40F0E93160222467DB295F7A9C29BDB3788BF537E0B144125BC29A62D0CA30D991B6E0
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,?,00CB1444,?,00BFFDF5,?,?,00BEA976,00000010,00CB1440,00BE13FC,?,00BE13C6,?,00BE1129), ref: 00C13852
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 13acefb5307cad99c59863e5d35f9fe28083ef7ef5948c595af1fb9e9df07650
                            • Instruction ID: 93c7a6a62f0beccc0c0b603c59dbdaac3be309d78eedbbcb543570e9979f81bd
                            • Opcode Fuzzy Hash: 13acefb5307cad99c59863e5d35f9fe28083ef7ef5948c595af1fb9e9df07650
                            • Instruction Fuzzy Hash: BCE0E5311002A596F73127779C04BDB3748AB437B8F054126BD28968D0DB10DF81B1F0
                            APIs
                            • FreeLibrary.KERNEL32(?,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4F6D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID:
                            • API String ID: 3664257935-0
                            • Opcode ID: 47bc6fc5ba4a3a6b2d00896a66718221658e7b4669c0c68ffddc8ee51d0cccd2
                            • Instruction ID: e7239d9a1081e7ab70f7a6ce0ca6249139f80420495405a8ecb96d425d29901f
                            • Opcode Fuzzy Hash: 47bc6fc5ba4a3a6b2d00896a66718221658e7b4669c0c68ffddc8ee51d0cccd2
                            • Instruction Fuzzy Hash: 38F01C71105792CFDB349F66D494916BBE4EF1471931089BEE1DE82511C7359C44DB90
                            APIs
                            • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00BE314E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: IconNotifyShell_
                            • String ID:
                            • API String ID: 1144537725-0
                            • Opcode ID: ce663518d8facb270059a901a4078065a9e34b58f54e6baa277ae7850f1b85e1
                            • Instruction ID: 290a8c7e43104af4399855607d11a959a97b9cefa29089a1b6bb656369d8b34c
                            • Opcode Fuzzy Hash: ce663518d8facb270059a901a4078065a9e34b58f54e6baa277ae7850f1b85e1
                            • Instruction Fuzzy Hash: 56F037709143549FE7529B24DC4A7D97BFCA701708F1401E9A64897191E7745788CF51
                            APIs
                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00BE2DC4
                              • Part of subcall function 00BE6B57: _wcslen.LIBCMT ref: 00BE6B6A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: LongNamePath_wcslen
                            • String ID:
                            • API String ID: 541455249-0
                            • Opcode ID: 2afa22851543c2e744b5628ac5f8e661f336be56f495d71c758b502ac675aa1f
                            • Instruction ID: f27cbf9d005855e0b82467eab7af315f4d95ed2036b006513c4063fbc74b241e
                            • Opcode Fuzzy Hash: 2afa22851543c2e744b5628ac5f8e661f336be56f495d71c758b502ac675aa1f
                            • Instruction Fuzzy Hash: 5CE0CD726001245BC710D6989C06FDA77DDDFC87D0F0400B5FD09D7258DA60ADC08550
                            APIs
                              • Part of subcall function 00BE3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00BE3908
                              • Part of subcall function 00BED730: GetInputState.USER32 ref: 00BED807
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00BE2B6B
                              • Part of subcall function 00BE30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00BE314E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: IconNotifyShell_$CurrentDirectoryInputState
                            • String ID:
                            • API String ID: 3667716007-0
                            • Opcode ID: 09be2a5bc91738bfb40a396b620b6501583fa5eb2765504a8af81ea6a812a98e
                            • Instruction ID: 91d25e3f3649e3d93c5d019b638105e5f16142c6db8e9df5229aa42a235c4f6a
                            • Opcode Fuzzy Hash: 09be2a5bc91738bfb40a396b620b6501583fa5eb2765504a8af81ea6a812a98e
                            • Instruction Fuzzy Hash: BAE026213002C407CB04BB32A86A6ADB3C98BD1751F8009BEF14243163CF2149894311
                            APIs
                            • CreateFileW.KERNELBASE(00000000,00000000,?,00C20704,?,?,00000000,?,00C20704,00000000,0000000C), ref: 00C203B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CreateFile
                            • String ID:
                            • API String ID: 823142352-0
                            • Opcode ID: 8300e53e612b69c89513623bd6c810cc65c3484a55dc1f406292d4614088ba34
                            • Instruction ID: 7542d89a31d85abe2e91900ef203b88eda21c91e21f8c11b0be5175b67a4ba4f
                            • Opcode Fuzzy Hash: 8300e53e612b69c89513623bd6c810cc65c3484a55dc1f406292d4614088ba34
                            • Instruction Fuzzy Hash: 2ED06C3204010DBBDF028F84DD46EDE3BAAFB48714F014050BE1856020C732E861AB90
                            APIs
                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00BE1CBC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: InfoParametersSystem
                            • String ID:
                            • API String ID: 3098949447-0
                            • Opcode ID: 7ddc16c500c3ccf158fbbf024b50df97373d168c31dfece912c821813b4f2bad
                            • Instruction ID: 7da9a6e0d591f53b1bd04ecf708d212e14e5e181c4e9acda415510150e626028
                            • Opcode Fuzzy Hash: 7ddc16c500c3ccf158fbbf024b50df97373d168c31dfece912c821813b4f2bad
                            • Instruction Fuzzy Hash: 75C09236280305AFF3248B80BC9AF2877A4A348B00F488101FA0DA95F3D3A22860FB50
                            APIs
                              • Part of subcall function 00BF9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BF9BB2
                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00C7961A
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00C7965B
                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00C7969F
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C796C9
                            • SendMessageW.USER32 ref: 00C796F2
                            • GetKeyState.USER32(00000011), ref: 00C7978B
                            • GetKeyState.USER32(00000009), ref: 00C79798
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00C797AE
                            • GetKeyState.USER32(00000010), ref: 00C797B8
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C797E9
                            • SendMessageW.USER32 ref: 00C79810
                            • SendMessageW.USER32(?,00001030,?,00C77E95), ref: 00C79918
                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00C7992E
                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00C79941
                            • SetCapture.USER32(?), ref: 00C7994A
                            • ClientToScreen.USER32(?,?), ref: 00C799AF
                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00C799BC
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00C799D6
                            • ReleaseCapture.USER32 ref: 00C799E1
                            • GetCursorPos.USER32(?), ref: 00C79A19
                            • ScreenToClient.USER32(?,?), ref: 00C79A26
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00C79A80
                            • SendMessageW.USER32 ref: 00C79AAE
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00C79AEB
                            • SendMessageW.USER32 ref: 00C79B1A
                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00C79B3B
                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00C79B4A
                            • GetCursorPos.USER32(?), ref: 00C79B68
                            • ScreenToClient.USER32(?,?), ref: 00C79B75
                            • GetParent.USER32(?), ref: 00C79B93
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00C79BFA
                            • SendMessageW.USER32 ref: 00C79C2B
                            • ClientToScreen.USER32(?,?), ref: 00C79C84
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00C79CB4
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00C79CDE
                            • SendMessageW.USER32 ref: 00C79D01
                            • ClientToScreen.USER32(?,?), ref: 00C79D4E
                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00C79D82
                              • Part of subcall function 00BF9944: GetWindowLongW.USER32(?,000000EB), ref: 00BF9952
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C79E05
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                            • String ID: @GUI_DRAGID$F
                            • API String ID: 3429851547-4164748364
                            • Opcode ID: 4d34751e87b3484a4aa8156e54b0c7191c33e079154214ce24f63d4365bae5d4
                            • Instruction ID: c094e2197551288da6fb69309137e5859f84e3475d6296878b4f096e7f0aded4
                            • Opcode Fuzzy Hash: 4d34751e87b3484a4aa8156e54b0c7191c33e079154214ce24f63d4365bae5d4
                            • Instruction Fuzzy Hash: AA428B74604641AFDB24CF28CC84BAABBF5FF49360F14861DFAAD872A1D731A950CB51
                            APIs
                            • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00C748F3
                            • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00C74908
                            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00C74927
                            • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00C7494B
                            • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00C7495C
                            • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00C7497B
                            • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00C749AE
                            • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00C749D4
                            • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00C74A0F
                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00C74A56
                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00C74A7E
                            • IsMenu.USER32(?), ref: 00C74A97
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C74AF2
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C74B20
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C74B94
                            • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00C74BE3
                            • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00C74C82
                            • wsprintfW.USER32 ref: 00C74CAE
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C74CC9
                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00C74CF1
                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00C74D13
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C74D33
                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00C74D5A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                            • String ID: %d/%02d/%02d
                            • API String ID: 4054740463-328681919
                            • Opcode ID: 2fd6a3ea44034109fff65faa8765d0c444853a6dedd4277eca853d98cffb5820
                            • Instruction ID: 611ea1e60d451e6ee38b277d68c079b6b1418dec8f03e3d9a1c4de9546f94222
                            • Opcode Fuzzy Hash: 2fd6a3ea44034109fff65faa8765d0c444853a6dedd4277eca853d98cffb5820
                            • Instruction Fuzzy Hash: 2C12D071600219ABEB298F69CC89FBE7BF8EF45710F108169F52ADB1E1D7749A40CB50
                            APIs
                            • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00BFF998
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C3F474
                            • IsIconic.USER32(00000000), ref: 00C3F47D
                            • ShowWindow.USER32(00000000,00000009), ref: 00C3F48A
                            • SetForegroundWindow.USER32(00000000), ref: 00C3F494
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C3F4AA
                            • GetCurrentThreadId.KERNEL32 ref: 00C3F4B1
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C3F4BD
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00C3F4CE
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00C3F4D6
                            • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00C3F4DE
                            • SetForegroundWindow.USER32(00000000), ref: 00C3F4E1
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C3F4F6
                            • keybd_event.USER32(00000012,00000000), ref: 00C3F501
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C3F50B
                            • keybd_event.USER32(00000012,00000000), ref: 00C3F510
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C3F519
                            • keybd_event.USER32(00000012,00000000), ref: 00C3F51E
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C3F528
                            • keybd_event.USER32(00000012,00000000), ref: 00C3F52D
                            • SetForegroundWindow.USER32(00000000), ref: 00C3F530
                            • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00C3F557
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                            • String ID: Shell_TrayWnd
                            • API String ID: 4125248594-2988720461
                            • Opcode ID: c666e778a43b9562c983e5ddd71e4d884e46fd90e6600bf9df96a696fca9b940
                            • Instruction ID: 423c5959e3d92d88c80796138b8d7770929d945398852b3c071c7d340d08ee12
                            • Opcode Fuzzy Hash: c666e778a43b9562c983e5ddd71e4d884e46fd90e6600bf9df96a696fca9b940
                            • Instruction Fuzzy Hash: F0317271E50219BBEB206BB55C8AFBF7E6CEB44B50F10046DFA04EA1D1C6B15D41AA60
                            APIs
                              • Part of subcall function 00C416C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C4170D
                              • Part of subcall function 00C416C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C4173A
                              • Part of subcall function 00C416C3: GetLastError.KERNEL32 ref: 00C4174A
                            • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00C41286
                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00C412A8
                            • CloseHandle.KERNEL32(?), ref: 00C412B9
                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00C412D1
                            • GetProcessWindowStation.USER32 ref: 00C412EA
                            • SetProcessWindowStation.USER32(00000000), ref: 00C412F4
                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00C41310
                              • Part of subcall function 00C410BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C411FC), ref: 00C410D4
                              • Part of subcall function 00C410BF: CloseHandle.KERNEL32(?,?,00C411FC), ref: 00C410E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                            • String ID: $default$winsta0
                            • API String ID: 22674027-1027155976
                            • Opcode ID: 9d6a349fdc836fd7fbd5f3fcff2b80a3da89ecad82087980e7ad070c667aa8ba
                            • Instruction ID: ab8f00d7f5c84fdbd7d3b1dad98f3f7c26df85aaba0e26410201481b0f891ffb
                            • Opcode Fuzzy Hash: 9d6a349fdc836fd7fbd5f3fcff2b80a3da89ecad82087980e7ad070c667aa8ba
                            • Instruction Fuzzy Hash: 95818C71900209AFDF219FA4DC89FEE7BB9FF04704F184129FE64A61A0D7749A84CB60
                            APIs
                              • Part of subcall function 00C410F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C41114
                              • Part of subcall function 00C410F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C41120
                              • Part of subcall function 00C410F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C4112F
                              • Part of subcall function 00C410F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C41136
                              • Part of subcall function 00C410F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C4114D
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C40BCC
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C40C00
                            • GetLengthSid.ADVAPI32(?), ref: 00C40C17
                            • GetAce.ADVAPI32(?,00000000,?), ref: 00C40C51
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C40C6D
                            • GetLengthSid.ADVAPI32(?), ref: 00C40C84
                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00C40C8C
                            • HeapAlloc.KERNEL32(00000000), ref: 00C40C93
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C40CB4
                            • CopySid.ADVAPI32(00000000), ref: 00C40CBB
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C40CEA
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C40D0C
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C40D1E
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C40D45
                            • HeapFree.KERNEL32(00000000), ref: 00C40D4C
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C40D55
                            • HeapFree.KERNEL32(00000000), ref: 00C40D5C
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C40D65
                            • HeapFree.KERNEL32(00000000), ref: 00C40D6C
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00C40D78
                            • HeapFree.KERNEL32(00000000), ref: 00C40D7F
                              • Part of subcall function 00C41193: GetProcessHeap.KERNEL32(00000008,00C40BB1,?,00000000,?,00C40BB1,?), ref: 00C411A1
                              • Part of subcall function 00C41193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00C40BB1,?), ref: 00C411A8
                              • Part of subcall function 00C41193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00C40BB1,?), ref: 00C411B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                            • String ID:
                            • API String ID: 4175595110-0
                            • Opcode ID: 0d0025cd1e01c2573cc122a6020e0b5d07d03e30b84d7f7a230efcd3a52c989e
                            • Instruction ID: 2d8e1980813b57ad8b3380462653f9bf09df90dedb498589d44eb531c9a1ed5a
                            • Opcode Fuzzy Hash: 0d0025cd1e01c2573cc122a6020e0b5d07d03e30b84d7f7a230efcd3a52c989e
                            • Instruction Fuzzy Hash: 9C714F7294020AABDF10DFE4DC84FAEBBB8BF44310F144529EA19A6191D775AA45CBA0
                            APIs
                            • OpenClipboard.USER32(00C7CC08), ref: 00C5EB29
                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00C5EB37
                            • GetClipboardData.USER32(0000000D), ref: 00C5EB43
                            • CloseClipboard.USER32 ref: 00C5EB4F
                            • GlobalLock.KERNEL32(00000000), ref: 00C5EB87
                            • CloseClipboard.USER32 ref: 00C5EB91
                            • GlobalUnlock.KERNEL32(00000000), ref: 00C5EBBC
                            • IsClipboardFormatAvailable.USER32(00000001), ref: 00C5EBC9
                            • GetClipboardData.USER32(00000001), ref: 00C5EBD1
                            • GlobalLock.KERNEL32(00000000), ref: 00C5EBE2
                            • GlobalUnlock.KERNEL32(00000000), ref: 00C5EC22
                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 00C5EC38
                            • GetClipboardData.USER32(0000000F), ref: 00C5EC44
                            • GlobalLock.KERNEL32(00000000), ref: 00C5EC55
                            • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00C5EC77
                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00C5EC94
                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00C5ECD2
                            • GlobalUnlock.KERNEL32(00000000), ref: 00C5ECF3
                            • CountClipboardFormats.USER32 ref: 00C5ED14
                            • CloseClipboard.USER32 ref: 00C5ED59
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                            • String ID:
                            • API String ID: 420908878-0
                            • Opcode ID: 8dba75339432f137f7412765b71866ffef8d415a721d3eb46b0213a8a2a3289c
                            • Instruction ID: bc3fa917f66220126f325e0477e7e8f993e9acce1e9ed00b15d0016f131eff7b
                            • Opcode Fuzzy Hash: 8dba75339432f137f7412765b71866ffef8d415a721d3eb46b0213a8a2a3289c
                            • Instruction Fuzzy Hash: AF61D1382042429FD314EF25C889F2E77E8EF84745F14455DF85A972A2CB31DE89CBA6
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 00C569BE
                            • FindClose.KERNEL32(00000000), ref: 00C56A12
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C56A4E
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C56A75
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C56AB2
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C56ADF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                            • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                            • API String ID: 3830820486-3289030164
                            • Opcode ID: 9b04db9a04b7a8c229c3fac5d34ec0693e96fcf2bf81bc692a2bac0f5d637da2
                            • Instruction ID: dd62d2db4785a420271f9e28ad3dea6c5c65c8131e5288fabfe2f921127e37e0
                            • Opcode Fuzzy Hash: 9b04db9a04b7a8c229c3fac5d34ec0693e96fcf2bf81bc692a2bac0f5d637da2
                            • Instruction Fuzzy Hash: 91D16271508340AFC310EB65C881EAFB7ECAF98704F44495DF999C7192EB74DA49C762
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00C59663
                            • GetFileAttributesW.KERNEL32(?), ref: 00C596A1
                            • SetFileAttributesW.KERNEL32(?,?), ref: 00C596BB
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00C596D3
                            • FindClose.KERNEL32(00000000), ref: 00C596DE
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00C596FA
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00C5974A
                            • SetCurrentDirectoryW.KERNEL32(00CA6B7C), ref: 00C59768
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C59772
                            • FindClose.KERNEL32(00000000), ref: 00C5977F
                            • FindClose.KERNEL32(00000000), ref: 00C5978F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                            • String ID: *.*
                            • API String ID: 1409584000-438819550
                            • Opcode ID: df35ae86bbdb47210607518c695244c908cdadc000cc33c507250d025f2fbfe2
                            • Instruction ID: c36cd4a84e3e8be2a13a768f203b79367da11874fab13338d56e3ef8e4b9ab4d
                            • Opcode Fuzzy Hash: df35ae86bbdb47210607518c695244c908cdadc000cc33c507250d025f2fbfe2
                            • Instruction Fuzzy Hash: F231A73554161AAFDB149FB4DC49BDE77ACDF09361F1441A6F819E20A0DB34DAC88E14
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00C597BE
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00C59819
                            • FindClose.KERNEL32(00000000), ref: 00C59824
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00C59840
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00C59890
                            • SetCurrentDirectoryW.KERNEL32(00CA6B7C), ref: 00C598AE
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C598B8
                            • FindClose.KERNEL32(00000000), ref: 00C598C5
                            • FindClose.KERNEL32(00000000), ref: 00C598D5
                              • Part of subcall function 00C4DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00C4DB00
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                            • String ID: *.*
                            • API String ID: 2640511053-438819550
                            • Opcode ID: 8ada48ab97a7194165d50efa6846d43f5eabbda64875f6b7f7cd3131a03b6230
                            • Instruction ID: 400ee5f98c56b3db60d49cd125a28480823ab040467bd287155a294dd9c480c1
                            • Opcode Fuzzy Hash: 8ada48ab97a7194165d50efa6846d43f5eabbda64875f6b7f7cd3131a03b6230
                            • Instruction Fuzzy Hash: C731C73550121AABDB14AFB4EC48BDE77ACDF06325F1441A5E824A21E1DB30DAC8DB24
                            APIs
                              • Part of subcall function 00C6C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C6B6AE,?,?), ref: 00C6C9B5
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6C9F1
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6CA68
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6CA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C6BF3E
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00C6BFA9
                            • RegCloseKey.ADVAPI32(00000000), ref: 00C6BFCD
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00C6C02C
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00C6C0E7
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00C6C154
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00C6C1E9
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00C6C23A
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00C6C2E3
                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00C6C382
                            • RegCloseKey.ADVAPI32(00000000), ref: 00C6C38F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                            • String ID:
                            • API String ID: 3102970594-0
                            • Opcode ID: b56310f1b5d2126138ca574b6e54bcf6171893b8ef3ed265394dd51efc23d270
                            • Instruction ID: dae0c5571f14e571d3f5d45cb71dc582a8ce79c8a133f1a096799c4ff71bc3e0
                            • Opcode Fuzzy Hash: b56310f1b5d2126138ca574b6e54bcf6171893b8ef3ed265394dd51efc23d270
                            • Instruction Fuzzy Hash: 01023C716042409FC724DF29C8D5E2ABBE5EF49304F1884ADF89ACB2A2DB31ED45CB51
                            APIs
                            • GetLocalTime.KERNEL32(?), ref: 00C58257
                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C58267
                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C58273
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C58310
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00C58324
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00C58356
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C5838C
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00C58395
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CurrentDirectoryTime$File$Local$System
                            • String ID: *.*
                            • API String ID: 1464919966-438819550
                            • Opcode ID: 3ffdbc6a5d9fb50dec2791771befddae0c98685b67c86848390386009e0320e4
                            • Instruction ID: 8d6e54ef769226442ad078330e45ce7339cd39e12f76d45211573b6d1ea31a17
                            • Opcode Fuzzy Hash: 3ffdbc6a5d9fb50dec2791771befddae0c98685b67c86848390386009e0320e4
                            • Instruction Fuzzy Hash: 2D617C755043459FC710EF60C880AAFB3E8FF89314F04895DF99997261DB31EA89CB96
                            APIs
                              • Part of subcall function 00BE3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BE3A97,?,?,00BE2E7F,?,?,?,00000000), ref: 00BE3AC2
                              • Part of subcall function 00C4E199: GetFileAttributesW.KERNEL32(?,00C4CF95), ref: 00C4E19A
                            • FindFirstFileW.KERNEL32(?,?), ref: 00C4D122
                            • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00C4D1DD
                            • MoveFileW.KERNEL32(?,?), ref: 00C4D1F0
                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00C4D20D
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C4D237
                              • Part of subcall function 00C4D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00C4D21C,?,?), ref: 00C4D2B2
                            • FindClose.KERNEL32(00000000,?,?,?), ref: 00C4D253
                            • FindClose.KERNEL32(00000000), ref: 00C4D264
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                            • String ID: \*.*
                            • API String ID: 1946585618-1173974218
                            • Opcode ID: 0749821f25df218192f7bde64746816b09c90859c114ae383062138e318d2740
                            • Instruction ID: 35041fccde6ce421b79c70feae81da7a9d40947b5e843c80332e229ef8844ace
                            • Opcode Fuzzy Hash: 0749821f25df218192f7bde64746816b09c90859c114ae383062138e318d2740
                            • Instruction Fuzzy Hash: 19618D3180114DABCF15FBE1CA92AEDB7B9BF55300F2440A9E412771A2EB306F49DB60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                            • String ID:
                            • API String ID: 1737998785-0
                            • Opcode ID: 37ce90ad9d2bdb91a4c04b0ac7df19a587c46ead4631348dc3de22279f03d7d6
                            • Instruction ID: e5b7d8a483c8cf10ab64fc5efdc02cccb5bac41c692a9fa862d2cfb2a8504e4e
                            • Opcode Fuzzy Hash: 37ce90ad9d2bdb91a4c04b0ac7df19a587c46ead4631348dc3de22279f03d7d6
                            • Instruction Fuzzy Hash: A941D039204612AFD724DF15D889F19BBE5FF44319F14C09DE8298B6A2C771EE86CB90
                            APIs
                              • Part of subcall function 00C416C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C4170D
                              • Part of subcall function 00C416C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C4173A
                              • Part of subcall function 00C416C3: GetLastError.KERNEL32 ref: 00C4174A
                            • ExitWindowsEx.USER32(?,00000000), ref: 00C4E932
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                            • String ID: $ $@$SeShutdownPrivilege
                            • API String ID: 2234035333-3163812486
                            • Opcode ID: d26adf9960e9dc706fe08a3ef2789ba9ecf7a17fd941b9df117a80ab898e2140
                            • Instruction ID: 38b8cf0c82b076962a2ca6650b0917db393b5680d06e834ddd53d6bb13e31d6b
                            • Opcode Fuzzy Hash: d26adf9960e9dc706fe08a3ef2789ba9ecf7a17fd941b9df117a80ab898e2140
                            • Instruction Fuzzy Hash: 5101F973610211ABEB6426B59CC6FFF729CB724750F1A4825FC53E21E2D6A15D809290
                            APIs
                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00C61276
                            • WSAGetLastError.WSOCK32 ref: 00C61283
                            • bind.WSOCK32(00000000,?,00000010), ref: 00C612BA
                            • WSAGetLastError.WSOCK32 ref: 00C612C5
                            • closesocket.WSOCK32(00000000), ref: 00C612F4
                            • listen.WSOCK32(00000000,00000005), ref: 00C61303
                            • WSAGetLastError.WSOCK32 ref: 00C6130D
                            • closesocket.WSOCK32(00000000), ref: 00C6133C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$closesocket$bindlistensocket
                            • String ID:
                            • API String ID: 540024437-0
                            • Opcode ID: bc54bcfd2718ed80a7cfb839d9bda8200acdae8fa5381c9b2e8bc790cc382fad
                            • Instruction ID: 7ebc39fefe9c27f0c585f2ece6ed6ab2a86169ca8ad0d20db26b0df16117edb0
                            • Opcode Fuzzy Hash: bc54bcfd2718ed80a7cfb839d9bda8200acdae8fa5381c9b2e8bc790cc382fad
                            • Instruction Fuzzy Hash: 90417F316001419FD720DF25C4D4B2ABBE5AF46319F1C819CD86A8F2E6C771ED85CBA1
                            APIs
                              • Part of subcall function 00BE3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BE3A97,?,?,00BE2E7F,?,?,?,00000000), ref: 00BE3AC2
                              • Part of subcall function 00C4E199: GetFileAttributesW.KERNEL32(?,00C4CF95), ref: 00C4E19A
                            • FindFirstFileW.KERNEL32(?,?), ref: 00C4D420
                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00C4D470
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C4D481
                            • FindClose.KERNEL32(00000000), ref: 00C4D498
                            • FindClose.KERNEL32(00000000), ref: 00C4D4A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                            • String ID: \*.*
                            • API String ID: 2649000838-1173974218
                            • Opcode ID: ecf4564c29d782b7aa75ed02f6511046efd8f8e058ebecf0ca14baf31fc89d1b
                            • Instruction ID: 4c225f0237e6a9a4cdcb01667f649a3b1348ef068773a63537dedb18019dba9d
                            • Opcode Fuzzy Hash: ecf4564c29d782b7aa75ed02f6511046efd8f8e058ebecf0ca14baf31fc89d1b
                            • Instruction Fuzzy Hash: F6318E310083819BC310FF65C8959AFB7E8BE91304F445E5DF4E6931A2EB30AA49CB63
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: __floor_pentium4
                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                            • API String ID: 4168288129-2761157908
                            • Opcode ID: 4830d20b1874a31596b2d3b88426c23b353e25453dc7bf13ae879a7d7f388d35
                            • Instruction ID: f6f0f177893eac4d05b85cc4451ec973729507e038658373a53ffa1af014f8ca
                            • Opcode Fuzzy Hash: 4830d20b1874a31596b2d3b88426c23b353e25453dc7bf13ae879a7d7f388d35
                            • Instruction Fuzzy Hash: E6C23B71E086298FDB25CE28DD447E9B7B5EB4A304F1441EAD85DE7280E774AEC29F40
                            APIs
                            • _wcslen.LIBCMT ref: 00C564DC
                            • CoInitialize.OLE32(00000000), ref: 00C56639
                            • CoCreateInstance.OLE32(00C7FCF8,00000000,00000001,00C7FB68,?), ref: 00C56650
                            • CoUninitialize.OLE32 ref: 00C568D4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 886957087-24824748
                            • Opcode ID: 1b843e6981e1bfbc67093d6860f9dddfbbae8abf9703823ae36608578bee8eda
                            • Instruction ID: e717425afb6dc5407cb7f0c6983c34e178d1389187b1f59da4650a2ae9a6580d
                            • Opcode Fuzzy Hash: 1b843e6981e1bfbc67093d6860f9dddfbbae8abf9703823ae36608578bee8eda
                            • Instruction Fuzzy Hash: F0D15A71508341AFC314EF25C881A6BB7E9FF94704F50496DF5958B2A1EB30EE4ACB92
                            APIs
                            • GetForegroundWindow.USER32(?,?,00000000), ref: 00C622E8
                              • Part of subcall function 00C5E4EC: GetWindowRect.USER32(?,?), ref: 00C5E504
                            • GetDesktopWindow.USER32 ref: 00C62312
                            • GetWindowRect.USER32(00000000), ref: 00C62319
                            • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00C62355
                            • GetCursorPos.USER32(?), ref: 00C62381
                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00C623DF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Rectmouse_event$CursorDesktopForeground
                            • String ID:
                            • API String ID: 2387181109-0
                            • Opcode ID: 9827662ca1adc069d1d6cdaa66a8a54be7f8b8ddd47438e78b0c3e2c77ad179a
                            • Instruction ID: 866d12901bfb8358552594a056430153365c5a320079e9f5f63e589b389b3804
                            • Opcode Fuzzy Hash: 9827662ca1adc069d1d6cdaa66a8a54be7f8b8ddd47438e78b0c3e2c77ad179a
                            • Instruction Fuzzy Hash: 6231CD72505716ABC720DF54D889B9FBBADFF84310F00092DF99997291DB34EA48CB92
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00C59B78
                            • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00C59C8B
                              • Part of subcall function 00C53874: GetInputState.USER32 ref: 00C538CB
                              • Part of subcall function 00C53874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C53966
                            • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00C59BA8
                            • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00C59C75
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                            • String ID: *.*
                            • API String ID: 1972594611-438819550
                            • Opcode ID: 44b7ca8c0d501839487024d211e382e361efd556200eb6576bee94f2c4da650d
                            • Instruction ID: 8a8a1e3e5152a77a3a0b30d1a769b9e2643824ecfcae4727adc58c92bffc037a
                            • Opcode Fuzzy Hash: 44b7ca8c0d501839487024d211e382e361efd556200eb6576bee94f2c4da650d
                            • Instruction Fuzzy Hash: 2A41507590424ADFDF14DF64C889AEEBBF8EF05311F244199E815A2191EB30AF88CF64
                            APIs
                              • Part of subcall function 00BF9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BF9BB2
                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00BF9A4E
                            • GetSysColor.USER32(0000000F), ref: 00BF9B23
                            • SetBkColor.GDI32(?,00000000), ref: 00BF9B36
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Color$LongProcWindow
                            • String ID:
                            • API String ID: 3131106179-0
                            • Opcode ID: 90b4d1477d65da775a7b8dd47279a3e9b815fe336676ab3a005b4d4682b82b74
                            • Instruction ID: d1efc213f57165ffa63cbb4774c805a6f4e94a7fa526e7d020c9d8fb29e8ac18
                            • Opcode Fuzzy Hash: 90b4d1477d65da775a7b8dd47279a3e9b815fe336676ab3a005b4d4682b82b74
                            • Instruction Fuzzy Hash: F1A12BB0118448BEE739AA3D8CD9F7F26DDDB82340F15434AF722D7592CA259E09D271
                            APIs
                              • Part of subcall function 00C6304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C6307A
                              • Part of subcall function 00C6304E: _wcslen.LIBCMT ref: 00C6309B
                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00C6185D
                            • WSAGetLastError.WSOCK32 ref: 00C61884
                            • bind.WSOCK32(00000000,?,00000010), ref: 00C618DB
                            • WSAGetLastError.WSOCK32 ref: 00C618E6
                            • closesocket.WSOCK32(00000000), ref: 00C61915
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                            • String ID:
                            • API String ID: 1601658205-0
                            • Opcode ID: 6026855a3c62744b31d8bbe73eb2c05ca78332f59fd597c15229b6e467f55ed1
                            • Instruction ID: 3e657ca7206ec9d5ac160557f69c3975ffaffb3d1a86df79a22d89dba427866d
                            • Opcode Fuzzy Hash: 6026855a3c62744b31d8bbe73eb2c05ca78332f59fd597c15229b6e467f55ed1
                            • Instruction Fuzzy Hash: 10519371A002109FD720AF25C8C6F6A77E5AF48718F18849CF9199F3D3D771AD418BA1
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                            • String ID:
                            • API String ID: 292994002-0
                            • Opcode ID: 6b781e17f52a1602fd329199e6d8382979dca0cc3bfb89e39f517596c9bf2d96
                            • Instruction ID: ec7cab6e00de3e406713f86682589f95553a75098078eaf6fbdeec74511d7da1
                            • Opcode Fuzzy Hash: 6b781e17f52a1602fd329199e6d8382979dca0cc3bfb89e39f517596c9bf2d96
                            • Instruction Fuzzy Hash: 3621BF317402115FD7228F6EC884B2A7BE5EF95324B1DC06CE85E8B251CB71EE42CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                            • API String ID: 0-1546025612
                            • Opcode ID: d99cc5cb024f5112ea64940133d4f573404b556d62fef46839e90823c082084d
                            • Instruction ID: 15a08707881ab4706395176d46b9800076b59bcbbf276a66ef03286b77c51292
                            • Opcode Fuzzy Hash: d99cc5cb024f5112ea64940133d4f573404b556d62fef46839e90823c082084d
                            • Instruction Fuzzy Hash: 29A28170E0066ACBDF24CF59D9807AEB7F1FF54310F2481A9D829A7684DB749E81DB50
                            APIs
                            • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00C4AAAC
                            • SetKeyboardState.USER32(00000080), ref: 00C4AAC8
                            • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00C4AB36
                            • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00C4AB88
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: cb26ca37a65bf1fe1bb1664bd3e82fd5feae4b73dd12ba56489d1294e6a7322c
                            • Instruction ID: 9735b9ea4545f1014da6323043176547aad9d8e44c5fb16585089d195eab4ff1
                            • Opcode Fuzzy Hash: cb26ca37a65bf1fe1bb1664bd3e82fd5feae4b73dd12ba56489d1294e6a7322c
                            • Instruction Fuzzy Hash: 8D311470AC0218AFFB35CA658C45BFA7BA6FB44320F04421AF5A5961D0D3758A81D762
                            APIs
                            • _free.LIBCMT ref: 00C1BB7F
                              • Part of subcall function 00C129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000), ref: 00C129DE
                              • Part of subcall function 00C129C8: GetLastError.KERNEL32(00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000,00000000), ref: 00C129F0
                            • GetTimeZoneInformation.KERNEL32 ref: 00C1BB91
                            • WideCharToMultiByte.KERNEL32(00000000,?,00CB121C,000000FF,?,0000003F,?,?), ref: 00C1BC09
                            • WideCharToMultiByte.KERNEL32(00000000,?,00CB1270,000000FF,?,0000003F,?,?,?,00CB121C,000000FF,?,0000003F,?,?), ref: 00C1BC36
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                            • String ID:
                            • API String ID: 806657224-0
                            • Opcode ID: 077f27a100202f129a672d320e4de6a2e824fbf03870a0000ad6e0d812a969be
                            • Instruction ID: f80f92982b6739f41fc541a223466c2838d8afa68a9465574f6cabd9ec3a9b91
                            • Opcode Fuzzy Hash: 077f27a100202f129a672d320e4de6a2e824fbf03870a0000ad6e0d812a969be
                            • Instruction Fuzzy Hash: C431D471904205DFCB10DF69CC906ADBBB8FF46310B5842AAE424D72B1D7309E90EF91
                            APIs
                            • InternetReadFile.WININET(?,?,00000400,?), ref: 00C5CE89
                            • GetLastError.KERNEL32(?,00000000), ref: 00C5CEEA
                            • SetEvent.KERNEL32(?,?,00000000), ref: 00C5CEFE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorEventFileInternetLastRead
                            • String ID:
                            • API String ID: 234945975-0
                            • Opcode ID: 76f05929411fd134cc3a2a2c40514516b02354cab87c19518f9fdd139b934362
                            • Instruction ID: 4bde1e45fbb0e4f84cd895b211c274fd26540c6e1e868d8936b314c1491bb41a
                            • Opcode Fuzzy Hash: 76f05929411fd134cc3a2a2c40514516b02354cab87c19518f9fdd139b934362
                            • Instruction Fuzzy Hash: A121C1755003059FD720CFA5C98ABAB77FCEB10315F10441EE956E2151E7B0EE88DB58
                            APIs
                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00C482AA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: lstrlen
                            • String ID: ($|
                            • API String ID: 1659193697-1631851259
                            • Opcode ID: a25428378bf1290aae56eaba0a25e2780ee26a4e4a90cf3e724f7fd42e19b7ad
                            • Instruction ID: 4231feacaf76b8b0bef5ade7c5575991aff5d0c480a415cfea98bdcd6162ff7c
                            • Opcode Fuzzy Hash: a25428378bf1290aae56eaba0a25e2780ee26a4e4a90cf3e724f7fd42e19b7ad
                            • Instruction Fuzzy Hash: DF322675A007059FCB28CF59C481A6AB7F0FF48710B15C56EE5AADB3A1EB70E981CB44
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 00C55CC1
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00C55D17
                            • FindClose.KERNEL32(?), ref: 00C55D5F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Find$File$CloseFirstNext
                            • String ID:
                            • API String ID: 3541575487-0
                            • Opcode ID: f36bb8467ff2f81c322cdba14331600ea92468044c04afc683d81d5b329b238c
                            • Instruction ID: cb36c4d7149bad818d4fbce29a9f0095553d9a0b6551014b363b7af39a851ce8
                            • Opcode Fuzzy Hash: f36bb8467ff2f81c322cdba14331600ea92468044c04afc683d81d5b329b238c
                            • Instruction Fuzzy Hash: 20517A79604A019FC714CF28C4A4A9AB7F4FF49314F14855DE96A8B3A2CB30FD89CB91
                            APIs
                            • IsDebuggerPresent.KERNEL32 ref: 00C1271A
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00C12724
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00C12731
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID:
                            • API String ID: 3906539128-0
                            • Opcode ID: fb2f159f6d24f5f5e2070d1bf5cc67eb2e4f521a9af5f9f7b2f8580475b050b1
                            • Instruction ID: bda8a3f995f435fcc19760aa57915696dc02d8b0b919bf271a8d8ea19f6c276f
                            • Opcode Fuzzy Hash: fb2f159f6d24f5f5e2070d1bf5cc67eb2e4f521a9af5f9f7b2f8580475b050b1
                            • Instruction Fuzzy Hash: 4531B5749112189BCB21DF68DC897DDB7B8AF08310F5041EAE41CA72A1E7349F819F45
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 00C551DA
                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00C55238
                            • SetErrorMode.KERNEL32(00000000), ref: 00C552A1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$DiskFreeSpace
                            • String ID:
                            • API String ID: 1682464887-0
                            • Opcode ID: e2393effa97cd45215e9076a405c9fb11776698d8d1179abae87a872ee76aea8
                            • Instruction ID: 58b1886ec838b2998168203746dadc0a48fae197e999ed732a47c469c07ea65b
                            • Opcode Fuzzy Hash: e2393effa97cd45215e9076a405c9fb11776698d8d1179abae87a872ee76aea8
                            • Instruction Fuzzy Hash: 2D314B75A005199FDB00DF55D894FADBBF4FF49314F048099E809AB3A2DB31E99ACB90
                            APIs
                              • Part of subcall function 00BFFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00C00668
                              • Part of subcall function 00BFFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00C00685
                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C4170D
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C4173A
                            • GetLastError.KERNEL32 ref: 00C4174A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                            • String ID:
                            • API String ID: 577356006-0
                            • Opcode ID: 87c0671e711cfdc0e0faaa0ef5209f8dd39bc665fcf4c70be369975d658d300f
                            • Instruction ID: 04c8af72c0321d611505cc97ebe6d9684dba67c5d012b11f5faa6a70c89410f1
                            • Opcode Fuzzy Hash: 87c0671e711cfdc0e0faaa0ef5209f8dd39bc665fcf4c70be369975d658d300f
                            • Instruction Fuzzy Hash: 6E11BFB2400209AFD7189F54DCC6E7EB7F9FF04714B24852EE49653251EB70BC818A60
                            APIs
                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C4D608
                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00C4D645
                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C4D650
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CloseControlCreateDeviceFileHandle
                            • String ID:
                            • API String ID: 33631002-0
                            • Opcode ID: b45f01209babf6b3cc3a39109c2d47f2130bde8257a37cb83b55c4449ffb1880
                            • Instruction ID: 1e4370cdd3984fc2f406d067df030999b9904ee73ef99fc3ce7bad1fbc4c25d7
                            • Opcode Fuzzy Hash: b45f01209babf6b3cc3a39109c2d47f2130bde8257a37cb83b55c4449ffb1880
                            • Instruction Fuzzy Hash: C1118E71E01228BFDB108F99DC85FEFBBBCEB45B60F108125F918E7290C2704A018BA1
                            APIs
                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00C4168C
                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00C416A1
                            • FreeSid.ADVAPI32(?), ref: 00C416B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AllocateCheckFreeInitializeMembershipToken
                            • String ID:
                            • API String ID: 3429775523-0
                            • Opcode ID: f76c3a407e2bbf6c4e50e861cec537a27e4d84e857420cd12f0e03fcf6a29d34
                            • Instruction ID: 8f6346bb8eacea4fe0caf236c39dc05e5dd5d2bd88b0bb6faada45172f5a0ebf
                            • Opcode Fuzzy Hash: f76c3a407e2bbf6c4e50e861cec537a27e4d84e857420cd12f0e03fcf6a29d34
                            • Instruction Fuzzy Hash: E5F0F471950309FBDB00DFE4DC89EAEBBBCFB08604F504565E901E2181E774AA848BA0
                            APIs
                            • GetUserNameW.ADVAPI32(?,?), ref: 00C3D28C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: NameUser
                            • String ID: X64
                            • API String ID: 2645101109-893830106
                            • Opcode ID: 4e24794bf645d0f1d5ca4cd83400f2719caf8091cc32141875f34f680227607a
                            • Instruction ID: 991cf90f7ead468b09ea7e14a26ee29f73ed1c931bc209de020e7ea08f324eeb
                            • Opcode Fuzzy Hash: 4e24794bf645d0f1d5ca4cd83400f2719caf8091cc32141875f34f680227607a
                            • Instruction Fuzzy Hash: 15D0C9B481111DEACF90CBA0ECC8EDEB7BCBB04305F100195F506A2000DB3095488F10
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                            • Instruction ID: edeff0d68a9f2f7b9864ece8539eb9dada001a3a8827fc7cd4d897b56893594c
                            • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                            • Instruction Fuzzy Hash: 4B020C71E002199BDF14CFA9D8C06ADFBF5EF48314F25826AD929E7384D731AA41CB94
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 00C56918
                            • FindClose.KERNEL32(00000000), ref: 00C56961
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: 3292ac4b70f0ed5c9843c6f61be9147e65189c819b8600688c1f36968020d133
                            • Instruction ID: 649263030775894b4195484c4a72980ac425e630a67656ba5373dda789524aec
                            • Opcode Fuzzy Hash: 3292ac4b70f0ed5c9843c6f61be9147e65189c819b8600688c1f36968020d133
                            • Instruction Fuzzy Hash: CC11D3356042019FC710CF2AD484A16BBE0FF84329F44C69DE8698F3A2CB30EC49CB91
                            APIs
                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00C64891,?,?,00000035,?), ref: 00C537E4
                            • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00C64891,?,?,00000035,?), ref: 00C537F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorFormatLastMessage
                            • String ID:
                            • API String ID: 3479602957-0
                            • Opcode ID: 63e2cddf4906f48706de56ee0e1355138cfa041878c31f68ae5e25761c518b4a
                            • Instruction ID: dce6b63b70f57bc3974d5847042408846eaff7032ae22236de096763762c471c
                            • Opcode Fuzzy Hash: 63e2cddf4906f48706de56ee0e1355138cfa041878c31f68ae5e25761c518b4a
                            • Instruction Fuzzy Hash: B5F0EC746042256AE71057765D8DFDB369DDFC47A1F000165F919D22D1D9605984C7B0
                            APIs
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00C4B25D
                            • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00C4B270
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: InputSendkeybd_event
                            • String ID:
                            • API String ID: 3536248340-0
                            • Opcode ID: b0a5463e4cd15af27267ae057936dd7e59020e7d01a8eb57cbc0338eb4941d5a
                            • Instruction ID: 181373e455960b7d2876569c2110cd782bcfcbc593fb95bc3b4fd1e07ac38471
                            • Opcode Fuzzy Hash: b0a5463e4cd15af27267ae057936dd7e59020e7d01a8eb57cbc0338eb4941d5a
                            • Instruction Fuzzy Hash: 1FF01D7180424EABDB159FA1C805BAE7BB4FF04305F008009F965A5192D779C6519F94
                            APIs
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C411FC), ref: 00C410D4
                            • CloseHandle.KERNEL32(?,?,00C411FC), ref: 00C410E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AdjustCloseHandlePrivilegesToken
                            • String ID:
                            • API String ID: 81990902-0
                            • Opcode ID: 7fef7b694fc0365200b6f169806b3f9b97013f915ba99a609be634dbc16a6a0f
                            • Instruction ID: 10590a129cb3f05744931d88d8fc10588f7e89ab81604177ddb58bb6f13ce0b2
                            • Opcode Fuzzy Hash: 7fef7b694fc0365200b6f169806b3f9b97013f915ba99a609be634dbc16a6a0f
                            • Instruction Fuzzy Hash: C5E0BF72014611AEF7252B51FC45F7777E9FF04320B14886DF5A5814B1DB626CD4DB50
                            Strings
                            • Variable is not of type 'Object'., xrefs: 00C30C40
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: Variable is not of type 'Object'.
                            • API String ID: 0-1840281001
                            • Opcode ID: ae152f52f7222e78ba63c20fc2208a0cbc52c9d26948c3f0bc0dacf4150cac1e
                            • Instruction ID: 3ae74b063fdcd07ebd5f3fc03c21fc964047d885781bd7864dd4f19b018a8487
                            • Opcode Fuzzy Hash: ae152f52f7222e78ba63c20fc2208a0cbc52c9d26948c3f0bc0dacf4150cac1e
                            • Instruction Fuzzy Hash: 76328B71910258DFCF14DF91D891AEDBBF5FF04304F2080A9E816AB292D735AE4ACB61
                            APIs
                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00C16766,?,?,00000008,?,?,00C1FEFE,00000000), ref: 00C16998
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ExceptionRaise
                            • String ID:
                            • API String ID: 3997070919-0
                            • Opcode ID: 655e46fead92986dfaf1e846f0e4bd25116a7500c3eb0f75c7095c6323f71781
                            • Instruction ID: a22164a08ce084b32a2e76484fec16ec2fd92fad89556758319e130cdc17e536
                            • Opcode Fuzzy Hash: 655e46fead92986dfaf1e846f0e4bd25116a7500c3eb0f75c7095c6323f71781
                            • Instruction Fuzzy Hash: 2CB12B31510609DFE715CF28C486BA57BE0FF46364F298658E8A9CF2E2C735DA91DB40
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID: 0-3916222277
                            • Opcode ID: b44dbcb073718065c28a22d9de16fa4cb2ac76c07a399ba47d39ab794a7f7354
                            • Instruction ID: 0427d0ec519f261cd9dfa56e7e8338d846150f41986560999f4461eccfcd4929
                            • Opcode Fuzzy Hash: b44dbcb073718065c28a22d9de16fa4cb2ac76c07a399ba47d39ab794a7f7354
                            • Instruction Fuzzy Hash: BA125E719102299BDB54CF58C980AFEB7F5FF48710F14819AE949EB251EB309E89CF90
                            APIs
                            • BlockInput.USER32(00000001), ref: 00C5EABD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: BlockInput
                            • String ID:
                            • API String ID: 3456056419-0
                            • Opcode ID: ff772216678a84b7a0207f2e42fd4f514fa8e28e4b09cadc0684603a02c650c8
                            • Instruction ID: e617c144dd8235608afcbeb355a255285ff23e308d1cda5334e39d3f8d7c24f9
                            • Opcode Fuzzy Hash: ff772216678a84b7a0207f2e42fd4f514fa8e28e4b09cadc0684603a02c650c8
                            • Instruction Fuzzy Hash: 16E04F352102049FC710EF6AD844E9AFBEDBF98760F00845AFD4AC7351DB70E9858B90
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00C003EE), ref: 00C009DA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 218e8337a0b869191a286323416d63245c6b3e90b3a479204d18acf19e8681ff
                            • Instruction ID: 02e8b7bcbf5f407775b8133321c59f2dd7af74ba5387a93ca32bc0d1ad6273da
                            • Opcode Fuzzy Hash: 218e8337a0b869191a286323416d63245c6b3e90b3a479204d18acf19e8681ff
                            • Instruction Fuzzy Hash:
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                            • Instruction ID: 8d8ecaf23c03ada1e37b4e8651dca51d9181ffd3ce86910e9bc556c6e1554561
                            • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                            • Instruction Fuzzy Hash: 40518C71F0C7455BDF3C8669895D7BE23899B42300F188709D8A6E72C2C615FF45E362
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 046a34c57ac39b82582f980a585e4c8540a63f6633883ca1e0cea789c81cb849
                            • Instruction ID: 4dba00b5c23bfacae5045b4251a812a45159d5c042d6e724c34710a6b952d97c
                            • Opcode Fuzzy Hash: 046a34c57ac39b82582f980a585e4c8540a63f6633883ca1e0cea789c81cb849
                            • Instruction Fuzzy Hash: 5B323432D29F014DD7239634CC26339A699AFB73C5F15C737E82AB5AA5EB28C5C35204
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d66ac9e54ea8b58b547f701a783e40b09156521bd773f37f3afcfe1b5ccc4961
                            • Instruction ID: 21b1aefcbb264c1efa29fc192f41bf93e789cca6f0cd8bffc5115ba4c5ffd2d6
                            • Opcode Fuzzy Hash: d66ac9e54ea8b58b547f701a783e40b09156521bd773f37f3afcfe1b5ccc4961
                            • Instruction Fuzzy Hash: F7324B31A1015D8BCF28CF29C5D467DBBE1EF45304F28856AE969EB292D330DE85DB41
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 98fabe75da94e67fdcd19d47d855d07b97dbe0ed93595ca5ed8968786fbcc046
                            • Instruction ID: 4f11398b7cd35b4113b8900965a0c2d5d558efecd4797e2eece5d1cae111ab68
                            • Opcode Fuzzy Hash: 98fabe75da94e67fdcd19d47d855d07b97dbe0ed93595ca5ed8968786fbcc046
                            • Instruction Fuzzy Hash: D422E470A0465ADFDF14CF65D881AAEB3F5FF44300F204669E812E76A1EB36AE15CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2ceb137c1cf831d03da34b22f2d57f5cfe76370efaebb088621fa00420eacac8
                            • Instruction ID: 4bb99df9beeacccd9b73553d3bc8c597e4d62ae7fbcc8a2e09f623879025d9db
                            • Opcode Fuzzy Hash: 2ceb137c1cf831d03da34b22f2d57f5cfe76370efaebb088621fa00420eacac8
                            • Instruction Fuzzy Hash: 2B02D7B0E0011AEBDF04DF55D881BAEB7F1FF44300F1081A9E916AB291EB31AE55DB95
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cab8a43438c477b0f102f0d75ff568f4e75aa1bb8fd7e90d6194dec623f482b2
                            • Instruction ID: 321d0caf178d92a08f957c4e23e9bdb525d51867642b225df23e257d675f1d10
                            • Opcode Fuzzy Hash: cab8a43438c477b0f102f0d75ff568f4e75aa1bb8fd7e90d6194dec623f482b2
                            • Instruction Fuzzy Hash: 72B1D230D2AF814DD2239639883133AB65C6FBB6D5F91E71BFC2674D62EB2185834244
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                            • Instruction ID: ef11f6e14bf3d579bca23a54dc8238cc3c6d97fa88ac6c9d8c0b4ee81a6ef14d
                            • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                            • Instruction Fuzzy Hash: EF9158726081A34ADB2A463E857407EFFE15A923A171E079DDCF2CA1C5FE14DA54D620
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                            • Instruction ID: 938c863323c3e1bea0bb1d5ed05fb6027f7e490e5d64c1831a40dabed2fac83d
                            • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                            • Instruction Fuzzy Hash: 3C9157722091A349DB6D477A857803EFFE15A923A131E079ED8F2CB1C5EE24CB54E620
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                            • Instruction ID: aa15e9e830b3dc49d5b5cde504039063023b21d7217c5d8205c311bdd308c12e
                            • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                            • Instruction Fuzzy Hash: 779124722090E34EDB6D467A857403EFFE15A923A271E079ED8F2CA1C5FE24D754E620
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dcfe012c5a29bc00f4e08fe5f30b1c2679c647aa1f1b4800afcc0dc158b0d177
                            • Instruction ID: 512ade1f528523e015924a226a95fdde68a402f7c711fd631043a02042edfafa
                            • Opcode Fuzzy Hash: dcfe012c5a29bc00f4e08fe5f30b1c2679c647aa1f1b4800afcc0dc158b0d177
                            • Instruction Fuzzy Hash: 95616631F0874967EE3C9A2888A5BBE3394DF41700F105B1AE893CB2C1DA51BF42E765
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a2f3c6608c6c655118c0daecf270d3b07dfd66e449139b3ee47e8fbff32be7b3
                            • Instruction ID: f46a5e90d156cf0b2b53d159f33caf8bb0e65173a647df49604586cd0e8cf229
                            • Opcode Fuzzy Hash: a2f3c6608c6c655118c0daecf270d3b07dfd66e449139b3ee47e8fbff32be7b3
                            • Instruction Fuzzy Hash: 94617A71E087096ADE3C4A288895BBF2398EF42700F104B59E9A3DB6C1DA12FF46D355
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                            • Instruction ID: 51e7fbe5a6ebde81c1f5324556ab50f9b6c24794f80b4d14f2f572deea0e4e62
                            • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                            • Instruction Fuzzy Hash: 3A8175326090A34EDB6D467E857443EFFE15A923A131E479DD8F2CB1C1EE24C754E620
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 22960d7805f1879f8434e3e99e4612a322a0eed74900141a1abc300075900319
                            • Instruction ID: 33521f4e22c52982da86f3901b4ba7f7e2227b6946b113026334f088053e04c0
                            • Opcode Fuzzy Hash: 22960d7805f1879f8434e3e99e4612a322a0eed74900141a1abc300075900319
                            • Instruction Fuzzy Hash: 7621B7326216118BDB28CF79C82377E73E5A794310F158A2EE4A7C77D0DE35A944CB84
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 00C62B30
                            • DeleteObject.GDI32(00000000), ref: 00C62B43
                            • DestroyWindow.USER32 ref: 00C62B52
                            • GetDesktopWindow.USER32 ref: 00C62B6D
                            • GetWindowRect.USER32(00000000), ref: 00C62B74
                            • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00C62CA3
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00C62CB1
                            • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C62CF8
                            • GetClientRect.USER32(00000000,?), ref: 00C62D04
                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00C62D40
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C62D62
                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C62D75
                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C62D80
                            • GlobalLock.KERNEL32(00000000), ref: 00C62D89
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C62D98
                            • GlobalUnlock.KERNEL32(00000000), ref: 00C62DA1
                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C62DA8
                            • GlobalFree.KERNEL32(00000000), ref: 00C62DB3
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C62DC5
                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00C7FC38,00000000), ref: 00C62DDB
                            • GlobalFree.KERNEL32(00000000), ref: 00C62DEB
                            • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00C62E11
                            • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00C62E30
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C62E52
                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C6303F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                            • String ID: $AutoIt v3$DISPLAY$static
                            • API String ID: 2211948467-2373415609
                            • Opcode ID: 7de0f9b0b9d9d8f272341ed103bd95d9262eb934ef7fda1a2861ca714a54d536
                            • Instruction ID: 73e58752dd50592fa079597b4817d7b2156bfe89bc387d57732a1ec3d9bd8cd0
                            • Opcode Fuzzy Hash: 7de0f9b0b9d9d8f272341ed103bd95d9262eb934ef7fda1a2861ca714a54d536
                            • Instruction Fuzzy Hash: D2024971900215AFDB24DFA4CC89FAE7BB9EF48711F048158F919AB2A1DB74AD41CB60
                            APIs
                            • SetTextColor.GDI32(?,00000000), ref: 00C7712F
                            • GetSysColorBrush.USER32(0000000F), ref: 00C77160
                            • GetSysColor.USER32(0000000F), ref: 00C7716C
                            • SetBkColor.GDI32(?,000000FF), ref: 00C77186
                            • SelectObject.GDI32(?,?), ref: 00C77195
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00C771C0
                            • GetSysColor.USER32(00000010), ref: 00C771C8
                            • CreateSolidBrush.GDI32(00000000), ref: 00C771CF
                            • FrameRect.USER32(?,?,00000000), ref: 00C771DE
                            • DeleteObject.GDI32(00000000), ref: 00C771E5
                            • InflateRect.USER32(?,000000FE,000000FE), ref: 00C77230
                            • FillRect.USER32(?,?,?), ref: 00C77262
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C77284
                              • Part of subcall function 00C773E8: GetSysColor.USER32(00000012), ref: 00C77421
                              • Part of subcall function 00C773E8: SetTextColor.GDI32(?,?), ref: 00C77425
                              • Part of subcall function 00C773E8: GetSysColorBrush.USER32(0000000F), ref: 00C7743B
                              • Part of subcall function 00C773E8: GetSysColor.USER32(0000000F), ref: 00C77446
                              • Part of subcall function 00C773E8: GetSysColor.USER32(00000011), ref: 00C77463
                              • Part of subcall function 00C773E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C77471
                              • Part of subcall function 00C773E8: SelectObject.GDI32(?,00000000), ref: 00C77482
                              • Part of subcall function 00C773E8: SetBkColor.GDI32(?,00000000), ref: 00C7748B
                              • Part of subcall function 00C773E8: SelectObject.GDI32(?,?), ref: 00C77498
                              • Part of subcall function 00C773E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00C774B7
                              • Part of subcall function 00C773E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C774CE
                              • Part of subcall function 00C773E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00C774DB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                            • String ID:
                            • API String ID: 4124339563-0
                            • Opcode ID: 8f90e778437ace055bed464a6ac619c23a3593ca8b894717725d151d7c1bd4ba
                            • Instruction ID: c87331ba099d5920108bb90dc568df295bf78768c8c1e2e9d87b198952704420
                            • Opcode Fuzzy Hash: 8f90e778437ace055bed464a6ac619c23a3593ca8b894717725d151d7c1bd4ba
                            • Instruction Fuzzy Hash: 53A18F72008306EFD7109F60DC88B6E7BA9FB49321F108B1DF96A961A1D771E984DB51
                            APIs
                            • DestroyWindow.USER32(?,?), ref: 00BF8E14
                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 00C36AC5
                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00C36AFE
                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00C36F43
                              • Part of subcall function 00BF8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BF8BE8,?,00000000,?,?,?,?,00BF8BBA,00000000,?), ref: 00BF8FC5
                            • SendMessageW.USER32(?,00001053), ref: 00C36F7F
                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00C36F96
                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00C36FAC
                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00C36FB7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                            • String ID: 0
                            • API String ID: 2760611726-4108050209
                            • Opcode ID: 5c50e7603476dd2d6fb7b17fb374a40ac796acfa4f070780d3ea500cf0e56fc2
                            • Instruction ID: 932f9a3ba038faed1212fc90a71d2a7d4582792454e5e4b5011ca304a7ba2b2a
                            • Opcode Fuzzy Hash: 5c50e7603476dd2d6fb7b17fb374a40ac796acfa4f070780d3ea500cf0e56fc2
                            • Instruction Fuzzy Hash: 5112CE30610241EFDB25CF24D894BBAB7E1FB48300F5885A9F5A98B261CB31ED95DF91
                            APIs
                            • DestroyWindow.USER32(00000000), ref: 00C6273E
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00C6286A
                            • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00C628A9
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00C628B9
                            • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00C62900
                            • GetClientRect.USER32(00000000,?), ref: 00C6290C
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00C62955
                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00C62964
                            • GetStockObject.GDI32(00000011), ref: 00C62974
                            • SelectObject.GDI32(00000000,00000000), ref: 00C62978
                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00C62988
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C62991
                            • DeleteDC.GDI32(00000000), ref: 00C6299A
                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00C629C6
                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00C629DD
                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00C62A1D
                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00C62A31
                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00C62A42
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00C62A77
                            • GetStockObject.GDI32(00000011), ref: 00C62A82
                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00C62A8D
                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00C62A97
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                            • API String ID: 2910397461-517079104
                            • Opcode ID: 349a1e5ec1357549c4cc0d7b3aefdbd2213589880ae1fb3dff0a60dc4c45b204
                            • Instruction ID: 3778bc278b3c13ca1d317ecd31ec97a254eea80adce7f9a46bf392baa34c8108
                            • Opcode Fuzzy Hash: 349a1e5ec1357549c4cc0d7b3aefdbd2213589880ae1fb3dff0a60dc4c45b204
                            • Instruction Fuzzy Hash: 62B16D71A00605AFEB24DF69DC89FAE7BF9EB08710F148158F915E72A0DB74AD40CB90
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 00C54AED
                            • GetDriveTypeW.KERNEL32(?,00C7CB68,?,\\.\,00C7CC08), ref: 00C54BCA
                            • SetErrorMode.KERNEL32(00000000,00C7CB68,?,\\.\,00C7CC08), ref: 00C54D36
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$DriveType
                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                            • API String ID: 2907320926-4222207086
                            • Opcode ID: 4677bfb710b2f24c5bdf538e143cfc5a5fe0017c20a4b2a069629b9cfab52799
                            • Instruction ID: 84043586baae8e4b3182ee419bae269892fa5ff24af75ebef4a9a41a687c773a
                            • Opcode Fuzzy Hash: 4677bfb710b2f24c5bdf538e143cfc5a5fe0017c20a4b2a069629b9cfab52799
                            • Instruction Fuzzy Hash: 7961E538605106EBCB0CDF25C981D6C77B1EB8534EB288065FC16AB291DB31EEC9DB49
                            APIs
                            • GetSysColor.USER32(00000012), ref: 00C77421
                            • SetTextColor.GDI32(?,?), ref: 00C77425
                            • GetSysColorBrush.USER32(0000000F), ref: 00C7743B
                            • GetSysColor.USER32(0000000F), ref: 00C77446
                            • CreateSolidBrush.GDI32(?), ref: 00C7744B
                            • GetSysColor.USER32(00000011), ref: 00C77463
                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C77471
                            • SelectObject.GDI32(?,00000000), ref: 00C77482
                            • SetBkColor.GDI32(?,00000000), ref: 00C7748B
                            • SelectObject.GDI32(?,?), ref: 00C77498
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00C774B7
                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C774CE
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00C774DB
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C7752A
                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00C77554
                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00C77572
                            • DrawFocusRect.USER32(?,?), ref: 00C7757D
                            • GetSysColor.USER32(00000011), ref: 00C7758E
                            • SetTextColor.GDI32(?,00000000), ref: 00C77596
                            • DrawTextW.USER32(?,00C770F5,000000FF,?,00000000), ref: 00C775A8
                            • SelectObject.GDI32(?,?), ref: 00C775BF
                            • DeleteObject.GDI32(?), ref: 00C775CA
                            • SelectObject.GDI32(?,?), ref: 00C775D0
                            • DeleteObject.GDI32(?), ref: 00C775D5
                            • SetTextColor.GDI32(?,?), ref: 00C775DB
                            • SetBkColor.GDI32(?,?), ref: 00C775E5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                            • String ID:
                            • API String ID: 1996641542-0
                            • Opcode ID: 262e9923228cc318482b8960878410ede2d5dda53d5752ef8198b863d75ed60b
                            • Instruction ID: 8100e8b38d14b8348e760b687120dbe75b01cf809d990a32525554ff797026d4
                            • Opcode Fuzzy Hash: 262e9923228cc318482b8960878410ede2d5dda53d5752ef8198b863d75ed60b
                            • Instruction Fuzzy Hash: D7615272900219AFDF019FA4DC89BAE7F79EB08320F118225F919A72A1D7719980DF90
                            APIs
                            • GetCursorPos.USER32(?), ref: 00C71128
                            • GetDesktopWindow.USER32 ref: 00C7113D
                            • GetWindowRect.USER32(00000000), ref: 00C71144
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C71199
                            • DestroyWindow.USER32(?), ref: 00C711B9
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00C711ED
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C7120B
                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00C7121D
                            • SendMessageW.USER32(00000000,00000421,?,?), ref: 00C71232
                            • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00C71245
                            • IsWindowVisible.USER32(00000000), ref: 00C712A1
                            • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00C712BC
                            • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00C712D0
                            • GetWindowRect.USER32(00000000,?), ref: 00C712E8
                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00C7130E
                            • GetMonitorInfoW.USER32(00000000,?), ref: 00C71328
                            • CopyRect.USER32(?,?), ref: 00C7133F
                            • SendMessageW.USER32(00000000,00000412,00000000), ref: 00C713AA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                            • String ID: ($0$tooltips_class32
                            • API String ID: 698492251-4156429822
                            • Opcode ID: ec1b458cb8bd291326a63258846777ae5778dd2780f5b829a4aec997883bbd0f
                            • Instruction ID: 2ccd3146011b3cdfe46d9ebfde02f8c6dfaeb5b9bcfd108b7b54421cd29872a4
                            • Opcode Fuzzy Hash: ec1b458cb8bd291326a63258846777ae5778dd2780f5b829a4aec997883bbd0f
                            • Instruction Fuzzy Hash: BBB16871608341AFD714DF69C884B6EBBE4FF88350F04895CF9999B2A1CB31E945CB92
                            APIs
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BF8968
                            • GetSystemMetrics.USER32(00000007), ref: 00BF8970
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BF899B
                            • GetSystemMetrics.USER32(00000008), ref: 00BF89A3
                            • GetSystemMetrics.USER32(00000004), ref: 00BF89C8
                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00BF89E5
                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00BF89F5
                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00BF8A28
                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00BF8A3C
                            • GetClientRect.USER32(00000000,000000FF), ref: 00BF8A5A
                            • GetStockObject.GDI32(00000011), ref: 00BF8A76
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BF8A81
                              • Part of subcall function 00BF912D: GetCursorPos.USER32(?), ref: 00BF9141
                              • Part of subcall function 00BF912D: ScreenToClient.USER32(00000000,?), ref: 00BF915E
                              • Part of subcall function 00BF912D: GetAsyncKeyState.USER32(00000001), ref: 00BF9183
                              • Part of subcall function 00BF912D: GetAsyncKeyState.USER32(00000002), ref: 00BF919D
                            • SetTimer.USER32(00000000,00000000,00000028,00BF90FC), ref: 00BF8AA8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                            • String ID: AutoIt v3 GUI
                            • API String ID: 1458621304-248962490
                            • Opcode ID: 913302e58f5bebd440c24a25de615e0f28786fc53e519ffe7d7b498314f95356
                            • Instruction ID: f75e16c9d805e678df324e8824d50ac25dc851265a03ef7c1157db57ed3d4ead
                            • Opcode Fuzzy Hash: 913302e58f5bebd440c24a25de615e0f28786fc53e519ffe7d7b498314f95356
                            • Instruction Fuzzy Hash: B4B16071A0020AAFDF14DFA8CC95BAE7BB5FB48314F148269FA15A7290DB74E940CB51
                            APIs
                              • Part of subcall function 00C410F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C41114
                              • Part of subcall function 00C410F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C41120
                              • Part of subcall function 00C410F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C4112F
                              • Part of subcall function 00C410F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C41136
                              • Part of subcall function 00C410F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C4114D
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C40DF5
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C40E29
                            • GetLengthSid.ADVAPI32(?), ref: 00C40E40
                            • GetAce.ADVAPI32(?,00000000,?), ref: 00C40E7A
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C40E96
                            • GetLengthSid.ADVAPI32(?), ref: 00C40EAD
                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00C40EB5
                            • HeapAlloc.KERNEL32(00000000), ref: 00C40EBC
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C40EDD
                            • CopySid.ADVAPI32(00000000), ref: 00C40EE4
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C40F13
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C40F35
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C40F47
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C40F6E
                            • HeapFree.KERNEL32(00000000), ref: 00C40F75
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C40F7E
                            • HeapFree.KERNEL32(00000000), ref: 00C40F85
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C40F8E
                            • HeapFree.KERNEL32(00000000), ref: 00C40F95
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00C40FA1
                            • HeapFree.KERNEL32(00000000), ref: 00C40FA8
                              • Part of subcall function 00C41193: GetProcessHeap.KERNEL32(00000008,00C40BB1,?,00000000,?,00C40BB1,?), ref: 00C411A1
                              • Part of subcall function 00C41193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00C40BB1,?), ref: 00C411A8
                              • Part of subcall function 00C41193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00C40BB1,?), ref: 00C411B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                            • String ID:
                            • API String ID: 4175595110-0
                            • Opcode ID: 15f34ff149c3d9ce7b03f6ad9d9e880c0f5c4e9995e15493179df05b962efe6d
                            • Instruction ID: 0d468593343c8a292373b9bbda120b649295396766083a817210f9753c406010
                            • Opcode Fuzzy Hash: 15f34ff149c3d9ce7b03f6ad9d9e880c0f5c4e9995e15493179df05b962efe6d
                            • Instruction Fuzzy Hash: 69716F7190020AABDF20DFA4DC45FAEBBB8BF05310F144129FA69E7191D7359A55CBA0
                            APIs
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C6C4BD
                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00C7CC08,00000000,?,00000000,?,?), ref: 00C6C544
                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00C6C5A4
                            • _wcslen.LIBCMT ref: 00C6C5F4
                            • _wcslen.LIBCMT ref: 00C6C66F
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00C6C6B2
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00C6C7C1
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00C6C84D
                            • RegCloseKey.ADVAPI32(?), ref: 00C6C881
                            • RegCloseKey.ADVAPI32(00000000), ref: 00C6C88E
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00C6C960
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                            • API String ID: 9721498-966354055
                            • Opcode ID: ef8f0afdf95a42926cfac8626129017bf6a65c51b73fa44d4b48f13bb232563b
                            • Instruction ID: ec69a854f4046097a67b5d59f0c072fd607ecfcf5a0f1f4c5021852d99a11eda
                            • Opcode Fuzzy Hash: ef8f0afdf95a42926cfac8626129017bf6a65c51b73fa44d4b48f13bb232563b
                            • Instruction Fuzzy Hash: 4E1257356042019FD724DF29C891A2AB7E5FF88714F04889CF99A9B3A2DB31ED41CB81
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 00C709C6
                            • _wcslen.LIBCMT ref: 00C70A01
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00C70A54
                            • _wcslen.LIBCMT ref: 00C70A8A
                            • _wcslen.LIBCMT ref: 00C70B06
                            • _wcslen.LIBCMT ref: 00C70B81
                              • Part of subcall function 00BFF9F2: _wcslen.LIBCMT ref: 00BFF9FD
                              • Part of subcall function 00C42BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C42BFA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$MessageSend$BuffCharUpper
                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                            • API String ID: 1103490817-4258414348
                            • Opcode ID: 5dca95fce3a342e003097e731ef7311404f12dcf2fd64a0b583f1f1dbd2f5baf
                            • Instruction ID: 702859c626099be967732b5c3a5a451268aa06deb6bd5f678645d5fc1b8d13d0
                            • Opcode Fuzzy Hash: 5dca95fce3a342e003097e731ef7311404f12dcf2fd64a0b583f1f1dbd2f5baf
                            • Instruction Fuzzy Hash: 03E17D75208742DFC714DF25C45192AB7E1BF98318F24899DF8AA9B3A2D730EE45CB81
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                            • API String ID: 1256254125-909552448
                            • Opcode ID: ff87f36fd63c7d2c0a940c3557e909ee208986f2035fb136073d560e9fe433f2
                            • Instruction ID: 4c8f587cf43815d9942f798f1cc7c347f5de2d7c9c5f7387010fc3ecde73ccf6
                            • Opcode Fuzzy Hash: ff87f36fd63c7d2c0a940c3557e909ee208986f2035fb136073d560e9fe433f2
                            • Instruction Fuzzy Hash: F071027260016B8BCB30DEA9CCC16BF3395AFA1754B250228FCA697285E635CE45D3A0
                            APIs
                            • _wcslen.LIBCMT ref: 00C7835A
                            • _wcslen.LIBCMT ref: 00C7836E
                            • _wcslen.LIBCMT ref: 00C78391
                            • _wcslen.LIBCMT ref: 00C783B4
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00C783F2
                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00C7361A,?), ref: 00C7844E
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00C78487
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00C784CA
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00C78501
                            • FreeLibrary.KERNEL32(?), ref: 00C7850D
                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00C7851D
                            • DestroyIcon.USER32(?), ref: 00C7852C
                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00C78549
                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00C78555
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                            • String ID: .dll$.exe$.icl
                            • API String ID: 799131459-1154884017
                            • Opcode ID: 713bdb9f17421f2d7f6104fe29733ff023db58febd0b9435497229baa49eca87
                            • Instruction ID: cf8877046d5945b06e685dda54e02f715b87d044f2b6859c74dfe610123d1ac8
                            • Opcode Fuzzy Hash: 713bdb9f17421f2d7f6104fe29733ff023db58febd0b9435497229baa49eca87
                            • Instruction Fuzzy Hash: 5361C271540216BEEB14DF64CC89BBF77ACBB04711F108619FA29D60D1DBB49A84D7A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                            • API String ID: 0-1645009161
                            • Opcode ID: 913538e28e6748dba3f261c2fdbc946263002ac803c13dede96db83318620cea
                            • Instruction ID: 3b0e45dd33da9d641734ba6d9fcaed6ae49e70f10a07f3227247a695a66dd89f
                            • Opcode Fuzzy Hash: 913538e28e6748dba3f261c2fdbc946263002ac803c13dede96db83318620cea
                            • Instruction Fuzzy Hash: BC81C171684215BBDB21AF61DC82FBF37E8AF15300F0480A4F919AB192EB70DE55D7A1
                            APIs
                            • CharLowerBuffW.USER32(?,?), ref: 00C53EF8
                            • _wcslen.LIBCMT ref: 00C53F03
                            • _wcslen.LIBCMT ref: 00C53F5A
                            • _wcslen.LIBCMT ref: 00C53F98
                            • GetDriveTypeW.KERNEL32(?), ref: 00C53FD6
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C5401E
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C54059
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C54087
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: SendString_wcslen$BuffCharDriveLowerType
                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                            • API String ID: 1839972693-4113822522
                            • Opcode ID: eba855e6e85b69b21d4e42ca86740abc5825f64ef4cc5fc474742b31522d6d54
                            • Instruction ID: 9034bbb84e599f066b09cbd34fe3a1bc5c205e698ccf2564f51ee4df72380912
                            • Opcode Fuzzy Hash: eba855e6e85b69b21d4e42ca86740abc5825f64ef4cc5fc474742b31522d6d54
                            • Instruction Fuzzy Hash: 3E7114725042029FC710EF25C88186FB7F4EF947A8F104A6DF9A597291EB30DE89CB91
                            APIs
                            • LoadIconW.USER32(00000063), ref: 00C45A2E
                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00C45A40
                            • SetWindowTextW.USER32(?,?), ref: 00C45A57
                            • GetDlgItem.USER32(?,000003EA), ref: 00C45A6C
                            • SetWindowTextW.USER32(00000000,?), ref: 00C45A72
                            • GetDlgItem.USER32(?,000003E9), ref: 00C45A82
                            • SetWindowTextW.USER32(00000000,?), ref: 00C45A88
                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00C45AA9
                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00C45AC3
                            • GetWindowRect.USER32(?,?), ref: 00C45ACC
                            • _wcslen.LIBCMT ref: 00C45B33
                            • SetWindowTextW.USER32(?,?), ref: 00C45B6F
                            • GetDesktopWindow.USER32 ref: 00C45B75
                            • GetWindowRect.USER32(00000000), ref: 00C45B7C
                            • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00C45BD3
                            • GetClientRect.USER32(?,?), ref: 00C45BE0
                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 00C45C05
                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00C45C2F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                            • String ID:
                            • API String ID: 895679908-0
                            • Opcode ID: a40951b594b3ce3023ecc5714eaecdeaaf034efa184aac47403b120c9cd200b0
                            • Instruction ID: 0197cb146744f8bf136d8ca80a08cc97e0ee0546f7c0c6daf23c724a240aa1e2
                            • Opcode Fuzzy Hash: a40951b594b3ce3023ecc5714eaecdeaaf034efa184aac47403b120c9cd200b0
                            • Instruction Fuzzy Hash: B7718D31900B0AAFDB20DFA8CE85BAEBBF5FF48704F10451CE556A25A1D775EA40CB50
                            APIs
                            • LoadCursorW.USER32(00000000,00007F89), ref: 00C5FE27
                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00C5FE32
                            • LoadCursorW.USER32(00000000,00007F00), ref: 00C5FE3D
                            • LoadCursorW.USER32(00000000,00007F03), ref: 00C5FE48
                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00C5FE53
                            • LoadCursorW.USER32(00000000,00007F01), ref: 00C5FE5E
                            • LoadCursorW.USER32(00000000,00007F81), ref: 00C5FE69
                            • LoadCursorW.USER32(00000000,00007F88), ref: 00C5FE74
                            • LoadCursorW.USER32(00000000,00007F80), ref: 00C5FE7F
                            • LoadCursorW.USER32(00000000,00007F86), ref: 00C5FE8A
                            • LoadCursorW.USER32(00000000,00007F83), ref: 00C5FE95
                            • LoadCursorW.USER32(00000000,00007F85), ref: 00C5FEA0
                            • LoadCursorW.USER32(00000000,00007F82), ref: 00C5FEAB
                            • LoadCursorW.USER32(00000000,00007F84), ref: 00C5FEB6
                            • LoadCursorW.USER32(00000000,00007F04), ref: 00C5FEC1
                            • LoadCursorW.USER32(00000000,00007F02), ref: 00C5FECC
                            • GetCursorInfo.USER32(?), ref: 00C5FEDC
                            • GetLastError.KERNEL32 ref: 00C5FF1E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Cursor$Load$ErrorInfoLast
                            • String ID:
                            • API String ID: 3215588206-0
                            • Opcode ID: 1a8824691088082fedbb6f0b93d398518d6b1f50c58aceee048a6f4f4db04d5d
                            • Instruction ID: 479db877854ee87cbf8ebd77b1d58ecbedc6f001773c9cb818a5f8bfad4b25fa
                            • Opcode Fuzzy Hash: 1a8824691088082fedbb6f0b93d398518d6b1f50c58aceee048a6f4f4db04d5d
                            • Instruction Fuzzy Hash: 9D4172B0D043196ADB10DFBA8C8985EBFE8FF04354B50462AF51DE7281DB78A941CF94
                            APIs
                            • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00C000C6
                              • Part of subcall function 00C000ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00CB070C,00000FA0,C10A2713,?,?,?,?,00C223B3,000000FF), ref: 00C0011C
                              • Part of subcall function 00C000ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00C223B3,000000FF), ref: 00C00127
                              • Part of subcall function 00C000ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00C223B3,000000FF), ref: 00C00138
                              • Part of subcall function 00C000ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00C0014E
                              • Part of subcall function 00C000ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00C0015C
                              • Part of subcall function 00C000ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00C0016A
                              • Part of subcall function 00C000ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00C00195
                              • Part of subcall function 00C000ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00C001A0
                            • ___scrt_fastfail.LIBCMT ref: 00C000E7
                              • Part of subcall function 00C000A3: __onexit.LIBCMT ref: 00C000A9
                            Strings
                            • kernel32.dll, xrefs: 00C00133
                            • InitializeConditionVariable, xrefs: 00C00148
                            • SleepConditionVariableCS, xrefs: 00C00154
                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00C00122
                            • WakeAllConditionVariable, xrefs: 00C00162
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                            • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                            • API String ID: 66158676-1714406822
                            • Opcode ID: 459c6ce54af5935904cc353c194a458c4d0c4355ee9b22637e5532a64006fef7
                            • Instruction ID: b4cc03a14af15cb7bb765787e80aa297935dc4a938e156683631838bd7a0b3bb
                            • Opcode Fuzzy Hash: 459c6ce54af5935904cc353c194a458c4d0c4355ee9b22637e5532a64006fef7
                            • Instruction Fuzzy Hash: 1B21F633A447126BE7205F74AC8AB6E77D4EB05B51F22413EF909A36D1DF709840CA90
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                            • API String ID: 176396367-1603158881
                            • Opcode ID: b49c778461b078ca66a3b733cf1d3cfa3a32a88834b668fa7a61f214866e1c11
                            • Instruction ID: 2616b3fc7f313f09a6012ed6c9e9078e425d8ccc1db5ac17b7d71f5e603ebca0
                            • Opcode Fuzzy Hash: b49c778461b078ca66a3b733cf1d3cfa3a32a88834b668fa7a61f214866e1c11
                            • Instruction Fuzzy Hash: 30E1E632A00556ABCF189FB4C8417EEBBB4BF94710F548129E466E7290DB70AF85D7A0
                            APIs
                            • CharLowerBuffW.USER32(00000000,00000000,00C7CC08), ref: 00C54527
                            • _wcslen.LIBCMT ref: 00C5453B
                            • _wcslen.LIBCMT ref: 00C54599
                            • _wcslen.LIBCMT ref: 00C545F4
                            • _wcslen.LIBCMT ref: 00C5463F
                            • _wcslen.LIBCMT ref: 00C546A7
                              • Part of subcall function 00BFF9F2: _wcslen.LIBCMT ref: 00BFF9FD
                            • GetDriveTypeW.KERNEL32(?,00CA6BF0,00000061), ref: 00C54743
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharDriveLowerType
                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                            • API String ID: 2055661098-1000479233
                            • Opcode ID: eccbb3dd0fa358b5329b329d74eb0a2f92b1eea03e4a5ea5bb12cfdd81167be7
                            • Instruction ID: 27fc36b4312b8968cabdf3818bc3cbcbac9c2b53f00499ec73f190082896f16f
                            • Opcode Fuzzy Hash: eccbb3dd0fa358b5329b329d74eb0a2f92b1eea03e4a5ea5bb12cfdd81167be7
                            • Instruction Fuzzy Hash: 7FB136756083029FC718DF28C890A6EB7E4AFA5759F50491DF8A6C3291EB30D9C8CB52
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00C7CC08), ref: 00C640BB
                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00C640CD
                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00C7CC08), ref: 00C640F2
                            • FreeLibrary.KERNEL32(00000000,?,00C7CC08), ref: 00C6413E
                            • StringFromGUID2.OLE32(?,?,00000028,?,00C7CC08), ref: 00C641A8
                            • SysFreeString.OLEAUT32(00000009), ref: 00C64262
                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00C642C8
                            • SysFreeString.OLEAUT32(?), ref: 00C642F2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                            • String ID: GetModuleHandleExW$kernel32.dll
                            • API String ID: 354098117-199464113
                            • Opcode ID: ea5bd846b25cd8dd2d539e4e057080e63636cc7c4f952e9f39dc2aa3fea25c15
                            • Instruction ID: 6c86a87966dec93b116741aaaba83ee85ae05e899f9f598a3bf4057dde8ca9d0
                            • Opcode Fuzzy Hash: ea5bd846b25cd8dd2d539e4e057080e63636cc7c4f952e9f39dc2aa3fea25c15
                            • Instruction Fuzzy Hash: 7D122B75A00115EFDB28DF54C8C4EAEBBB5FF45314F248098E9169B251DB31EE86CBA0
                            APIs
                            • GetMenuItemCount.USER32(00CB1990), ref: 00C22F8D
                            • GetMenuItemCount.USER32(00CB1990), ref: 00C2303D
                            • GetCursorPos.USER32(?), ref: 00C23081
                            • SetForegroundWindow.USER32(00000000), ref: 00C2308A
                            • TrackPopupMenuEx.USER32(00CB1990,00000000,?,00000000,00000000,00000000), ref: 00C2309D
                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00C230A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                            • String ID: 0
                            • API String ID: 36266755-4108050209
                            • Opcode ID: 788c1d9ed64e645e0932076c3f331c2caf3a542bbe62203b711177e2dbfab891
                            • Instruction ID: 67fb7bc3f2a7be11257d61a8171f7cf5104348da898cec2a6fea882938db72a6
                            • Opcode Fuzzy Hash: 788c1d9ed64e645e0932076c3f331c2caf3a542bbe62203b711177e2dbfab891
                            • Instruction Fuzzy Hash: 34712A30644266BEEB218F65DDC9F9ABFB4FF04724F204216F6246A1E0C7B5AE50D750
                            APIs
                            • DestroyWindow.USER32(00000000,?), ref: 00C76DEB
                              • Part of subcall function 00BE6B57: _wcslen.LIBCMT ref: 00BE6B6A
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00C76E5F
                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00C76E81
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C76E94
                            • DestroyWindow.USER32(?), ref: 00C76EB5
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00BE0000,00000000), ref: 00C76EE4
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C76EFD
                            • GetDesktopWindow.USER32 ref: 00C76F16
                            • GetWindowRect.USER32(00000000), ref: 00C76F1D
                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00C76F35
                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00C76F4D
                              • Part of subcall function 00BF9944: GetWindowLongW.USER32(?,000000EB), ref: 00BF9952
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                            • String ID: 0$tooltips_class32
                            • API String ID: 2429346358-3619404913
                            • Opcode ID: d5178c4e5ee79e328f3350c0b113a7da05c172a53af423f88d81a0cb05619176
                            • Instruction ID: a386a09c2ac8f480b2b0e3924a3f852c911ecb173e69261825564feb471b3998
                            • Opcode Fuzzy Hash: d5178c4e5ee79e328f3350c0b113a7da05c172a53af423f88d81a0cb05619176
                            • Instruction Fuzzy Hash: 53719770504241AFDB21DF28DC98FBABBF9FB89304F54851DF9A987261C770AA49CB11
                            APIs
                              • Part of subcall function 00BF9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BF9BB2
                            • DragQueryPoint.SHELL32(?,?), ref: 00C79147
                              • Part of subcall function 00C77674: ClientToScreen.USER32(?,?), ref: 00C7769A
                              • Part of subcall function 00C77674: GetWindowRect.USER32(?,?), ref: 00C77710
                              • Part of subcall function 00C77674: PtInRect.USER32(?,?,00C78B89), ref: 00C77720
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00C791B0
                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00C791BB
                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00C791DE
                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00C79225
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00C7923E
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00C79255
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00C79277
                            • DragFinish.SHELL32(?), ref: 00C7927E
                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00C79371
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                            • API String ID: 221274066-3440237614
                            • Opcode ID: 6ffe5348c87c94bf4cb7a1c7a70066694b5ffaac6194f43812ab0a563bc1f208
                            • Instruction ID: 89ee5ee50408c1f8a368cea2e26129a07ce143f22c757f6e4ef2d7007e464f89
                            • Opcode Fuzzy Hash: 6ffe5348c87c94bf4cb7a1c7a70066694b5ffaac6194f43812ab0a563bc1f208
                            • Instruction Fuzzy Hash: 3B618B71108341AFC701EF65DC85EAFBBE8FF89750F404A2DF599921A1DB309A49CB92
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C5C4B0
                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00C5C4C3
                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00C5C4D7
                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00C5C4F0
                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00C5C533
                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00C5C549
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C5C554
                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C5C584
                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00C5C5DC
                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00C5C5F0
                            • InternetCloseHandle.WININET(00000000), ref: 00C5C5FB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                            • String ID:
                            • API String ID: 3800310941-3916222277
                            • Opcode ID: f62b39ebb850b4faca975abd2a5eb6f8a33a56bc3c168748a9d52b91ad1b4a12
                            • Instruction ID: 0da2cb779677f4340390d500e8d1fe5ba620aa40b380a8110f68d435a83a058e
                            • Opcode Fuzzy Hash: f62b39ebb850b4faca975abd2a5eb6f8a33a56bc3c168748a9d52b91ad1b4a12
                            • Instruction Fuzzy Hash: B9515DB4500305BFDB218FA5C9C8BAB7BBCFB04745F40441DF956D6250EB34EA88AB64
                            APIs
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00C78592
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00C785A2
                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00C785AD
                            • CloseHandle.KERNEL32(00000000), ref: 00C785BA
                            • GlobalLock.KERNEL32(00000000), ref: 00C785C8
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00C785D7
                            • GlobalUnlock.KERNEL32(00000000), ref: 00C785E0
                            • CloseHandle.KERNEL32(00000000), ref: 00C785E7
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00C785F8
                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00C7FC38,?), ref: 00C78611
                            • GlobalFree.KERNEL32(00000000), ref: 00C78621
                            • GetObjectW.GDI32(?,00000018,000000FF), ref: 00C78641
                            • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00C78671
                            • DeleteObject.GDI32(00000000), ref: 00C78699
                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00C786AF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                            • String ID:
                            • API String ID: 3840717409-0
                            • Opcode ID: 022e6f1161279d319aa4466416293045f55b09bd093caea314dc1a2be91fa299
                            • Instruction ID: a37e082c170c48c7c7072d2300f390a63fbfc94127a76c7ed17d0c5177ac74bf
                            • Opcode Fuzzy Hash: 022e6f1161279d319aa4466416293045f55b09bd093caea314dc1a2be91fa299
                            • Instruction Fuzzy Hash: 2841F775640205BFDB119FA5CC8CFAE7BB8EB89B11F108059F919E7260DB309A45CB60
                            APIs
                            • VariantInit.OLEAUT32(00000000), ref: 00C51502
                            • VariantCopy.OLEAUT32(?,?), ref: 00C5150B
                            • VariantClear.OLEAUT32(?), ref: 00C51517
                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00C515FB
                            • VarR8FromDec.OLEAUT32(?,?), ref: 00C51657
                            • VariantInit.OLEAUT32(?), ref: 00C51708
                            • SysFreeString.OLEAUT32(?), ref: 00C5178C
                            • VariantClear.OLEAUT32(?), ref: 00C517D8
                            • VariantClear.OLEAUT32(?), ref: 00C517E7
                            • VariantInit.OLEAUT32(00000000), ref: 00C51823
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                            • API String ID: 1234038744-3931177956
                            • Opcode ID: 81ad96e47b109724d60b034bbc4f20ab268aa16a5ece9ec47d43c57e86a9cbbf
                            • Instruction ID: cf2e534556956d417a39240db4151453822a3ab631bce4c99e4d3e1208b1140b
                            • Opcode Fuzzy Hash: 81ad96e47b109724d60b034bbc4f20ab268aa16a5ece9ec47d43c57e86a9cbbf
                            • Instruction Fuzzy Hash: 59D10235A00109DBCB00AF66D889B7DB7F5BF44701F5880AAFC16AB180EB34DD89DB65
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C6C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C6B6AE,?,?), ref: 00C6C9B5
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6C9F1
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6CA68
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6CA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C6B6F4
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C6B772
                            • RegDeleteValueW.ADVAPI32(?,?), ref: 00C6B80A
                            • RegCloseKey.ADVAPI32(?), ref: 00C6B87E
                            • RegCloseKey.ADVAPI32(?), ref: 00C6B89C
                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00C6B8F2
                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C6B904
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00C6B922
                            • FreeLibrary.KERNEL32(00000000), ref: 00C6B983
                            • RegCloseKey.ADVAPI32(00000000), ref: 00C6B994
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 146587525-4033151799
                            • Opcode ID: 56ad63563f4917bf2113e83d20f4fd93a8d314ef4b8c1b1ebf67e783826221a5
                            • Instruction ID: f006fdfe055dd3d5c6fca3684d5db2676aac0fbf76dedd8f87788db8c3529976
                            • Opcode Fuzzy Hash: 56ad63563f4917bf2113e83d20f4fd93a8d314ef4b8c1b1ebf67e783826221a5
                            • Instruction Fuzzy Hash: 5DC17D35208241AFD724DF15C4D5F2ABBE5BF84318F14859CF5AA8B2A2CB31ED85CB91
                            APIs
                            • GetDC.USER32(00000000), ref: 00C625D8
                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00C625E8
                            • CreateCompatibleDC.GDI32(?), ref: 00C625F4
                            • SelectObject.GDI32(00000000,?), ref: 00C62601
                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00C6266D
                            • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00C626AC
                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00C626D0
                            • SelectObject.GDI32(?,?), ref: 00C626D8
                            • DeleteObject.GDI32(?), ref: 00C626E1
                            • DeleteDC.GDI32(?), ref: 00C626E8
                            • ReleaseDC.USER32(00000000,?), ref: 00C626F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                            • String ID: (
                            • API String ID: 2598888154-3887548279
                            • Opcode ID: 84237eb5e202bdecb7a589f1556ff2f41df3365aef44248bf7a1ac59c0e4f1e8
                            • Instruction ID: 8e6a58ea51b1c8c6fe40a47c21574ff5f6ef848fbd2562ce03cd6567dfc10ceb
                            • Opcode Fuzzy Hash: 84237eb5e202bdecb7a589f1556ff2f41df3365aef44248bf7a1ac59c0e4f1e8
                            • Instruction Fuzzy Hash: 4761D275D0061AEFCF14CFA8D884AAEBBB5FF48310F208529E95AA7250D774A941DF90
                            APIs
                            • ___free_lconv_mon.LIBCMT ref: 00C1DAA1
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D659
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D66B
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D67D
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D68F
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D6A1
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D6B3
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D6C5
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D6D7
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D6E9
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D6FB
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D70D
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D71F
                              • Part of subcall function 00C1D63C: _free.LIBCMT ref: 00C1D731
                            • _free.LIBCMT ref: 00C1DA96
                              • Part of subcall function 00C129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000), ref: 00C129DE
                              • Part of subcall function 00C129C8: GetLastError.KERNEL32(00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000,00000000), ref: 00C129F0
                            • _free.LIBCMT ref: 00C1DAB8
                            • _free.LIBCMT ref: 00C1DACD
                            • _free.LIBCMT ref: 00C1DAD8
                            • _free.LIBCMT ref: 00C1DAFA
                            • _free.LIBCMT ref: 00C1DB0D
                            • _free.LIBCMT ref: 00C1DB1B
                            • _free.LIBCMT ref: 00C1DB26
                            • _free.LIBCMT ref: 00C1DB5E
                            • _free.LIBCMT ref: 00C1DB65
                            • _free.LIBCMT ref: 00C1DB82
                            • _free.LIBCMT ref: 00C1DB9A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                            • String ID:
                            • API String ID: 161543041-0
                            • Opcode ID: c16007b75366f4c4687cffe5f5bc4edcd25644de175a3ac676b840d0153d6e91
                            • Instruction ID: 576b823d194342dfde67fad7995079383f47682d209a9e295595611b2dff9cce
                            • Opcode Fuzzy Hash: c16007b75366f4c4687cffe5f5bc4edcd25644de175a3ac676b840d0153d6e91
                            • Instruction Fuzzy Hash: AF316D326047059FEB21AA39E845BDA77E8FF02320F114419F46ADB191DF34ADE0B720
                            APIs
                            • GetClassNameW.USER32(?,?,00000100), ref: 00C4369C
                            • _wcslen.LIBCMT ref: 00C436A7
                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00C43797
                            • GetClassNameW.USER32(?,?,00000400), ref: 00C4380C
                            • GetDlgCtrlID.USER32(?), ref: 00C4385D
                            • GetWindowRect.USER32(?,?), ref: 00C43882
                            • GetParent.USER32(?), ref: 00C438A0
                            • ScreenToClient.USER32(00000000), ref: 00C438A7
                            • GetClassNameW.USER32(?,?,00000100), ref: 00C43921
                            • GetWindowTextW.USER32(?,?,00000400), ref: 00C4395D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                            • String ID: %s%u
                            • API String ID: 4010501982-679674701
                            • Opcode ID: 267cdadacc7e0981ffecd021a5c67f1593023e4c1761dfffefeee97d74302377
                            • Instruction ID: b5f60784c760800fd1ff45734d7d4ed4911a66b9bf3d62072d836b228f7200a6
                            • Opcode Fuzzy Hash: 267cdadacc7e0981ffecd021a5c67f1593023e4c1761dfffefeee97d74302377
                            • Instruction Fuzzy Hash: 6491BF71204646AFD719DF24C885BAAF7E8FF94350F108629FAA9C2190DB30EB55CB91
                            APIs
                            • GetClassNameW.USER32(?,?,00000400), ref: 00C44994
                            • GetWindowTextW.USER32(?,?,00000400), ref: 00C449DA
                            • _wcslen.LIBCMT ref: 00C449EB
                            • CharUpperBuffW.USER32(?,00000000), ref: 00C449F7
                            • _wcsstr.LIBVCRUNTIME ref: 00C44A2C
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00C44A64
                            • GetWindowTextW.USER32(?,?,00000400), ref: 00C44A9D
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00C44AE6
                            • GetClassNameW.USER32(?,?,00000400), ref: 00C44B20
                            • GetWindowRect.USER32(?,?), ref: 00C44B8B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                            • String ID: ThumbnailClass
                            • API String ID: 1311036022-1241985126
                            • Opcode ID: 5d6529b0867d2a28ba1606c6a9d3dd72618b3f451742d13978e3f5f369ea465d
                            • Instruction ID: 5d74d85cc37a02692168383b1f3b55dda5e2f78e84b2c1d6cf2e8c2bbcae24c9
                            • Opcode Fuzzy Hash: 5d6529b0867d2a28ba1606c6a9d3dd72618b3f451742d13978e3f5f369ea465d
                            • Instruction Fuzzy Hash: E391C0710082069FDB08DF14C9C5FAA77E8FF84714F248469FD999A196DB30EE45CBA1
                            APIs
                            • GetMenuItemInfoW.USER32(00CB1990,000000FF,00000000,00000030), ref: 00C4BFAC
                            • SetMenuItemInfoW.USER32(00CB1990,00000004,00000000,00000030), ref: 00C4BFE1
                            • Sleep.KERNEL32(000001F4), ref: 00C4BFF3
                            • GetMenuItemCount.USER32(?), ref: 00C4C039
                            • GetMenuItemID.USER32(?,00000000), ref: 00C4C056
                            • GetMenuItemID.USER32(?,-00000001), ref: 00C4C082
                            • GetMenuItemID.USER32(?,?), ref: 00C4C0C9
                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C4C10F
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C4C124
                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C4C145
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$CheckCountRadioSleep
                            • String ID: 0
                            • API String ID: 1460738036-4108050209
                            • Opcode ID: 31dcaa0f475451dc30022f726d3e9b63222109f1ccfa98b4c294729e5a914292
                            • Instruction ID: 64af64ad3e7e5eac93f2a716f30adeddb8f9694c61e0746bc86e3a4b05200b29
                            • Opcode Fuzzy Hash: 31dcaa0f475451dc30022f726d3e9b63222109f1ccfa98b4c294729e5a914292
                            • Instruction Fuzzy Hash: ED619EB090124AAFEF51CF64CDC8BEE7BB8FB05354F040159E825A32A1D735AE45DB60
                            APIs
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00C6CC64
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00C6CC8D
                            • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00C6CD48
                              • Part of subcall function 00C6CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00C6CCAA
                              • Part of subcall function 00C6CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00C6CCBD
                              • Part of subcall function 00C6CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C6CCCF
                              • Part of subcall function 00C6CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00C6CD05
                              • Part of subcall function 00C6CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00C6CD28
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00C6CCF3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 2734957052-4033151799
                            • Opcode ID: 4480ae1eee3e2dbf829556da7127c00bdf9a3068a481cb7d26b4e6dcf9417bcf
                            • Instruction ID: a35b9e9a2320a94e88bbf7c95841a88a91786191676cda7e8eda8c8eb3728a84
                            • Opcode Fuzzy Hash: 4480ae1eee3e2dbf829556da7127c00bdf9a3068a481cb7d26b4e6dcf9417bcf
                            • Instruction Fuzzy Hash: 89315C71A01129BBDB309B55DCC8FFFBB7CEF46750F000169E95AE2240DB349A859AE0
                            APIs
                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C53D40
                            • _wcslen.LIBCMT ref: 00C53D6D
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C53D9D
                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00C53DBE
                            • RemoveDirectoryW.KERNEL32(?), ref: 00C53DCE
                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00C53E55
                            • CloseHandle.KERNEL32(00000000), ref: 00C53E60
                            • CloseHandle.KERNEL32(00000000), ref: 00C53E6B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                            • String ID: :$\$\??\%s
                            • API String ID: 1149970189-3457252023
                            • Opcode ID: ab619d6950f6bcdf270fe31b57bc4a2e6184a731854d975e0ac2df2c85328acb
                            • Instruction ID: df9b0e584f0d6f6f01151436f5ee7e7fe8e24080817fab32dfbb9d654f11963a
                            • Opcode Fuzzy Hash: ab619d6950f6bcdf270fe31b57bc4a2e6184a731854d975e0ac2df2c85328acb
                            • Instruction Fuzzy Hash: 5531A57651014AABDB219BA0DC89FEF37BCEF88741F1040B9F919D6061E77497888B24
                            APIs
                            • timeGetTime.WINMM ref: 00C4E6B4
                              • Part of subcall function 00BFE551: timeGetTime.WINMM(?,?,00C4E6D4), ref: 00BFE555
                            • Sleep.KERNEL32(0000000A), ref: 00C4E6E1
                            • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00C4E705
                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00C4E727
                            • SetActiveWindow.USER32 ref: 00C4E746
                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00C4E754
                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00C4E773
                            • Sleep.KERNEL32(000000FA), ref: 00C4E77E
                            • IsWindow.USER32 ref: 00C4E78A
                            • EndDialog.USER32(00000000), ref: 00C4E79B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                            • String ID: BUTTON
                            • API String ID: 1194449130-3405671355
                            • Opcode ID: 2f839a104b272234f85dad8d096fab7292ec8d963ef81c83e2ca35df53ade1cd
                            • Instruction ID: ec921cf886b0ea107fdad5db2308994a9a7e87285bab8fadac40f623356db315
                            • Opcode Fuzzy Hash: 2f839a104b272234f85dad8d096fab7292ec8d963ef81c83e2ca35df53ade1cd
                            • Instruction Fuzzy Hash: F621A2B0640606AFEB005F70ECCAF2E3B69F754399F161529F91AC21B1DB71AC409B24
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00C4EA5D
                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00C4EA73
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C4EA84
                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00C4EA96
                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00C4EAA7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: SendString$_wcslen
                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                            • API String ID: 2420728520-1007645807
                            • Opcode ID: a5722002af5e5df5cbe32f4655613be1b66a65b06f1ec92efc9be86b1df0141c
                            • Instruction ID: e75e6da5ac5d3a840037f269fcf9832b366b17a469f0deeea21e9c3ac63b7453
                            • Opcode Fuzzy Hash: a5722002af5e5df5cbe32f4655613be1b66a65b06f1ec92efc9be86b1df0141c
                            • Instruction Fuzzy Hash: CB112131A5026A79D720A7B2DC4AEFF6ABCFBD2F44F4504797811A20D1EFB05A45C5B0
                            APIs
                            • GetKeyboardState.USER32(?), ref: 00C4A012
                            • SetKeyboardState.USER32(?), ref: 00C4A07D
                            • GetAsyncKeyState.USER32(000000A0), ref: 00C4A09D
                            • GetKeyState.USER32(000000A0), ref: 00C4A0B4
                            • GetAsyncKeyState.USER32(000000A1), ref: 00C4A0E3
                            • GetKeyState.USER32(000000A1), ref: 00C4A0F4
                            • GetAsyncKeyState.USER32(00000011), ref: 00C4A120
                            • GetKeyState.USER32(00000011), ref: 00C4A12E
                            • GetAsyncKeyState.USER32(00000012), ref: 00C4A157
                            • GetKeyState.USER32(00000012), ref: 00C4A165
                            • GetAsyncKeyState.USER32(0000005B), ref: 00C4A18E
                            • GetKeyState.USER32(0000005B), ref: 00C4A19C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: e80ca6a9ecd0dee398bb526a6e54881d5f4b3417fb158ff112ea58be5f182caa
                            • Instruction ID: fd2af060b3f923d31a105702c01a2d2328b1f568ffe7b0071a8feab476adfce6
                            • Opcode Fuzzy Hash: e80ca6a9ecd0dee398bb526a6e54881d5f4b3417fb158ff112ea58be5f182caa
                            • Instruction Fuzzy Hash: 1351FA309447986AFB35DBA088507EFBFB5BF12380F08459DD5D2571C2DA64AB8CC762
                            APIs
                            • GetDlgItem.USER32(?,00000001), ref: 00C45CE2
                            • GetWindowRect.USER32(00000000,?), ref: 00C45CFB
                            • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00C45D59
                            • GetDlgItem.USER32(?,00000002), ref: 00C45D69
                            • GetWindowRect.USER32(00000000,?), ref: 00C45D7B
                            • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00C45DCF
                            • GetDlgItem.USER32(?,000003E9), ref: 00C45DDD
                            • GetWindowRect.USER32(00000000,?), ref: 00C45DEF
                            • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00C45E31
                            • GetDlgItem.USER32(?,000003EA), ref: 00C45E44
                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00C45E5A
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00C45E67
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$ItemMoveRect$Invalidate
                            • String ID:
                            • API String ID: 3096461208-0
                            • Opcode ID: f4967614e750084bb2fbf88bc64e7069d841d76c14f55e9479a9cfb1aafcf7f4
                            • Instruction ID: f4539f1f30f70162f436b44f656efe42e846d2b23adaa438f55d43312499784e
                            • Opcode Fuzzy Hash: f4967614e750084bb2fbf88bc64e7069d841d76c14f55e9479a9cfb1aafcf7f4
                            • Instruction Fuzzy Hash: C051FDB1A00616AFDB18CF68DD89BAEBBB5FF48300F548129F919E6291D7709E44CB50
                            APIs
                              • Part of subcall function 00BF8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BF8BE8,?,00000000,?,?,?,?,00BF8BBA,00000000,?), ref: 00BF8FC5
                            • DestroyWindow.USER32(?), ref: 00BF8C81
                            • KillTimer.USER32(00000000,?,?,?,?,00BF8BBA,00000000,?), ref: 00BF8D1B
                            • DestroyAcceleratorTable.USER32(00000000), ref: 00C36973
                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00BF8BBA,00000000,?), ref: 00C369A1
                            • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00BF8BBA,00000000,?), ref: 00C369B8
                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00BF8BBA,00000000), ref: 00C369D4
                            • DeleteObject.GDI32(00000000), ref: 00C369E6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                            • String ID:
                            • API String ID: 641708696-0
                            • Opcode ID: 71c44438e95ace4c1f4543c6430331a4270fd44ccef031756dfbbbf1ce36f052
                            • Instruction ID: 10c4bea1942d15118c07b93bea38272f2306924e62e04128eebb04a774005942
                            • Opcode Fuzzy Hash: 71c44438e95ace4c1f4543c6430331a4270fd44ccef031756dfbbbf1ce36f052
                            • Instruction Fuzzy Hash: 6261CC30412708EFCB259F14D998B3977F1FB40312F18866CE6569B9A0CB31AA94DF90
                            APIs
                              • Part of subcall function 00BF9944: GetWindowLongW.USER32(?,000000EB), ref: 00BF9952
                            • GetSysColor.USER32(0000000F), ref: 00BF9862
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ColorLongWindow
                            • String ID:
                            • API String ID: 259745315-0
                            • Opcode ID: 80e537e1ff8f6f213920129cc220b28b3ac1b16e20c7f0d5c6a2a692c65f90f4
                            • Instruction ID: 8744789309d89f434ea5f1d79cc5223475ef88dbca925345b12123d4ce265c9f
                            • Opcode Fuzzy Hash: 80e537e1ff8f6f213920129cc220b28b3ac1b16e20c7f0d5c6a2a692c65f90f4
                            • Instruction Fuzzy Hash: 6A41AD31104648AFDB305F389C88BBD3BA5EB463B0F544699FAB68B1E1C7719D86DB10
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00C2F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00C49717
                            • LoadStringW.USER32(00000000,?,00C2F7F8,00000001), ref: 00C49720
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00C2F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00C49742
                            • LoadStringW.USER32(00000000,?,00C2F7F8,00000001), ref: 00C49745
                            • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00C49866
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message_wcslen
                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                            • API String ID: 747408836-2268648507
                            • Opcode ID: bc0a66edf8bf41a4084392d4b06a9004c2eca50df988e0c674861c9c8003c478
                            • Instruction ID: c329c1186419736c986fef0653114564a4b8f80d31c318c50a7635f48f41d802
                            • Opcode Fuzzy Hash: bc0a66edf8bf41a4084392d4b06a9004c2eca50df988e0c674861c9c8003c478
                            • Instruction Fuzzy Hash: 83415172800259AACF14FBE1CD86EEE77B8EF55740F6400A5F60572092EB356F49CB61
                            APIs
                              • Part of subcall function 00BE6B57: _wcslen.LIBCMT ref: 00BE6B6A
                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00C407A2
                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00C407BE
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00C407DA
                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00C40804
                            • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00C4082C
                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C40837
                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C4083C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                            • API String ID: 323675364-22481851
                            • Opcode ID: 0754d288792f798c72b54aca9d03ddeb809a9d0b9a501a5494e84a9728ff4f5b
                            • Instruction ID: 079b1c69be856c95499699a1536592524c93dbf0129b844ad809ce49cb1a3a84
                            • Opcode Fuzzy Hash: 0754d288792f798c72b54aca9d03ddeb809a9d0b9a501a5494e84a9728ff4f5b
                            • Instruction Fuzzy Hash: F6413B72C10229ABCF11EFA4DC85DEEB7B8FF44750F144169E915A71A1EB30AE44CBA0
                            APIs
                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00C7403B
                            • CreateCompatibleDC.GDI32(00000000), ref: 00C74042
                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00C74055
                            • SelectObject.GDI32(00000000,00000000), ref: 00C7405D
                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 00C74068
                            • DeleteDC.GDI32(00000000), ref: 00C74072
                            • GetWindowLongW.USER32(?,000000EC), ref: 00C7407C
                            • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00C74092
                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00C7409E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                            • String ID: static
                            • API String ID: 2559357485-2160076837
                            • Opcode ID: ee78f95478f5b9e599829477f88ba1926bc8036008320200e556b9b26025ca74
                            • Instruction ID: fa5e2dd04dee76e876092ce6bd4a2b7e1b0091cb450f4c7e56dbf41488a9c447
                            • Opcode Fuzzy Hash: ee78f95478f5b9e599829477f88ba1926bc8036008320200e556b9b26025ca74
                            • Instruction Fuzzy Hash: D2316C32501216ABDF219FA4DC89FDE3BA8FF0D760F114215FA29A61A0C775D950DB90
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 00C63C5C
                            • CoInitialize.OLE32(00000000), ref: 00C63C8A
                            • CoUninitialize.OLE32 ref: 00C63C94
                            • _wcslen.LIBCMT ref: 00C63D2D
                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00C63DB1
                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00C63ED5
                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00C63F0E
                            • CoGetObject.OLE32(?,00000000,00C7FB98,?), ref: 00C63F2D
                            • SetErrorMode.KERNEL32(00000000), ref: 00C63F40
                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00C63FC4
                            • VariantClear.OLEAUT32(?), ref: 00C63FD8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                            • String ID:
                            • API String ID: 429561992-0
                            • Opcode ID: c3022a433f57fe6fc0337e75593c4cb9274f58a256e0aa21361e834a800a48b2
                            • Instruction ID: 9b4b8c0fb7c69c56f08f7dbbee9f3133f19be21102dd0223c619cbe2de7da5dc
                            • Opcode Fuzzy Hash: c3022a433f57fe6fc0337e75593c4cb9274f58a256e0aa21361e834a800a48b2
                            • Instruction Fuzzy Hash: 04C14371608241AFC710DF69C8C492BBBE9FF89744F10495DF98A9B250DB31EE45CB62
                            APIs
                            • CoInitialize.OLE32(00000000), ref: 00C57AF3
                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00C57B8F
                            • SHGetDesktopFolder.SHELL32(?), ref: 00C57BA3
                            • CoCreateInstance.OLE32(00C7FD08,00000000,00000001,00CA6E6C,?), ref: 00C57BEF
                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00C57C74
                            • CoTaskMemFree.OLE32(?,?), ref: 00C57CCC
                            • SHBrowseForFolderW.SHELL32(?), ref: 00C57D57
                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00C57D7A
                            • CoTaskMemFree.OLE32(00000000), ref: 00C57D81
                            • CoTaskMemFree.OLE32(00000000), ref: 00C57DD6
                            • CoUninitialize.OLE32 ref: 00C57DDC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                            • String ID:
                            • API String ID: 2762341140-0
                            • Opcode ID: 4a4ae47032ec7b31027688712f233f4150e0bed1cea51c4cfad9509676556432
                            • Instruction ID: f1efb2038e7b7a96a3b5d38ff62edc9a162453ec402a095b8d4e428beacadf5f
                            • Opcode Fuzzy Hash: 4a4ae47032ec7b31027688712f233f4150e0bed1cea51c4cfad9509676556432
                            • Instruction Fuzzy Hash: AAC12C75A04109AFCB14DFA4D888DAEBBF9FF48305B148598F8199B361D730EE85CB90
                            APIs
                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00C75504
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C75515
                            • CharNextW.USER32(00000158), ref: 00C75544
                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00C75585
                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00C7559B
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C755AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CharNext
                            • String ID:
                            • API String ID: 1350042424-0
                            • Opcode ID: 6335ecb0308ffa3105b3e16d96ed351684ecf918d808bb219ee3c014ef6339eb
                            • Instruction ID: 7c34bb2b1f39062136d870c7be004a2bd1577f751cbc886dff9e398ef7563672
                            • Opcode Fuzzy Hash: 6335ecb0308ffa3105b3e16d96ed351684ecf918d808bb219ee3c014ef6339eb
                            • Instruction Fuzzy Hash: 85617E70904609EFDF109F95CC85AFE7BB9EB09760F10C149FA29A7290D7B49A81DB60
                            APIs
                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00C3FAAF
                            • SafeArrayAllocData.OLEAUT32(?), ref: 00C3FB08
                            • VariantInit.OLEAUT32(?), ref: 00C3FB1A
                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00C3FB3A
                            • VariantCopy.OLEAUT32(?,?), ref: 00C3FB8D
                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00C3FBA1
                            • VariantClear.OLEAUT32(?), ref: 00C3FBB6
                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00C3FBC3
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C3FBCC
                            • VariantClear.OLEAUT32(?), ref: 00C3FBDE
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C3FBE9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                            • String ID:
                            • API String ID: 2706829360-0
                            • Opcode ID: 5b1e600d6c252e099bcbd9a694332d9d4c584d425ecec0f1c5d23cc029bb23d0
                            • Instruction ID: 1733b21800395f014d36eef0e5ce9eb48ef7262c0fcf8fd7f6d27637c3d742e5
                            • Opcode Fuzzy Hash: 5b1e600d6c252e099bcbd9a694332d9d4c584d425ecec0f1c5d23cc029bb23d0
                            • Instruction Fuzzy Hash: A9414275E102199FCB00DF64D898ABEBBB9EF48344F008469E959A7261D734AA46CF90
                            APIs
                            • GetKeyboardState.USER32(?), ref: 00C49CA1
                            • GetAsyncKeyState.USER32(000000A0), ref: 00C49D22
                            • GetKeyState.USER32(000000A0), ref: 00C49D3D
                            • GetAsyncKeyState.USER32(000000A1), ref: 00C49D57
                            • GetKeyState.USER32(000000A1), ref: 00C49D6C
                            • GetAsyncKeyState.USER32(00000011), ref: 00C49D84
                            • GetKeyState.USER32(00000011), ref: 00C49D96
                            • GetAsyncKeyState.USER32(00000012), ref: 00C49DAE
                            • GetKeyState.USER32(00000012), ref: 00C49DC0
                            • GetAsyncKeyState.USER32(0000005B), ref: 00C49DD8
                            • GetKeyState.USER32(0000005B), ref: 00C49DEA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: b875b26966ce653a0fa4532db0c71ce472a3fbfc6896c0b277a3982adb50cbe3
                            • Instruction ID: 8ae20c0dcdc209ffe54ca4f9bc6b85df6b66f27e196ae22033238354c492063a
                            • Opcode Fuzzy Hash: b875b26966ce653a0fa4532db0c71ce472a3fbfc6896c0b277a3982adb50cbe3
                            • Instruction Fuzzy Hash: 7D41D5349047EA6DFF308A6488447B7BEA0FB11344F04805EDAD6565C2DBB59BC8C7A2
                            APIs
                            • WSAStartup.WSOCK32(00000101,?), ref: 00C605BC
                            • inet_addr.WSOCK32(?), ref: 00C6061C
                            • gethostbyname.WSOCK32(?), ref: 00C60628
                            • IcmpCreateFile.IPHLPAPI ref: 00C60636
                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00C606C6
                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00C606E5
                            • IcmpCloseHandle.IPHLPAPI(?), ref: 00C607B9
                            • WSACleanup.WSOCK32 ref: 00C607BF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                            • String ID: Ping
                            • API String ID: 1028309954-2246546115
                            • Opcode ID: 79ec0e0d149b67a790ad292530fb157a018c493f9fdd3ee3981e2533a40285db
                            • Instruction ID: 66d3eb8021fdac66a8dd881447cf20b2694b5de08a49c98e62abdd7e7f1845b2
                            • Opcode Fuzzy Hash: 79ec0e0d149b67a790ad292530fb157a018c493f9fdd3ee3981e2533a40285db
                            • Instruction Fuzzy Hash: 63917C756082419FD720DF15D8C9F1BBBE0AF44318F2485A9F46AAB6A2C730ED85CF91
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharLower
                            • String ID: cdecl$none$stdcall$winapi
                            • API String ID: 707087890-567219261
                            • Opcode ID: 805b176f3bf27aa8e35d2d89f3038238718aa504be8cde3fcc792c313f30f5a2
                            • Instruction ID: da43f3b4bd5de26cd5c6184737b33e19423357665dfff2050beb5b70b474f230
                            • Opcode Fuzzy Hash: 805b176f3bf27aa8e35d2d89f3038238718aa504be8cde3fcc792c313f30f5a2
                            • Instruction Fuzzy Hash: D051BF75A001179BCF24DF68C8909BEB3E5BF65724B204329E926E72C0DB31DE48C790
                            APIs
                            • CoInitialize.OLE32 ref: 00C63774
                            • CoUninitialize.OLE32 ref: 00C6377F
                            • CoCreateInstance.OLE32(?,00000000,00000017,00C7FB78,?), ref: 00C637D9
                            • IIDFromString.OLE32(?,?), ref: 00C6384C
                            • VariantInit.OLEAUT32(?), ref: 00C638E4
                            • VariantClear.OLEAUT32(?), ref: 00C63936
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                            • API String ID: 636576611-1287834457
                            • Opcode ID: 1d2bce6901b1eadea08dffb82069eeabce9e2f7ebf9d2a29a5a38db21433eaba
                            • Instruction ID: 6576fffded3d3df7bc9e59b0d1e276a2c893a380faca0231e64846f1c4ebc1e4
                            • Opcode Fuzzy Hash: 1d2bce6901b1eadea08dffb82069eeabce9e2f7ebf9d2a29a5a38db21433eaba
                            • Instruction Fuzzy Hash: 7561A3706083419FD320DF65C889BAAB7E4EF49714F10095EF9959B291D770EE48CB92
                            APIs
                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C533CF
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00C533F0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: LoadString$_wcslen
                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                            • API String ID: 4099089115-3080491070
                            • Opcode ID: 177bfb4452b58cc4138f321d45e7fb104145472def4f0f8b37657f78ab9ab8ca
                            • Instruction ID: e01b95c734aafa7b9fabc76f4889f5e3447a1c0fef0df20bc127af0665d28d66
                            • Opcode Fuzzy Hash: 177bfb4452b58cc4138f321d45e7fb104145472def4f0f8b37657f78ab9ab8ca
                            • Instruction Fuzzy Hash: 8D51B13190024AAADF15EBE1CD46EEEB7F8EF14740F6441A5F90572062EB312F98DB60
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                            • API String ID: 1256254125-769500911
                            • Opcode ID: e6ac6354099e8db8793e4c3f2ccfb2b2930ddb5571d356d06f103007d0585e53
                            • Instruction ID: 30ddebf781b5dbb85c3d24e9948bc05d2b12a2be0296e701e33776487fc71786
                            • Opcode Fuzzy Hash: e6ac6354099e8db8793e4c3f2ccfb2b2930ddb5571d356d06f103007d0585e53
                            • Instruction Fuzzy Hash: 7D41E532A000279ACB249F7DC8905FEB7B5BFA1758B264129F935DB284E731CE81C790
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 00C553A0
                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00C55416
                            • GetLastError.KERNEL32 ref: 00C55420
                            • SetErrorMode.KERNEL32(00000000,READY), ref: 00C554A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Error$Mode$DiskFreeLastSpace
                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                            • API String ID: 4194297153-14809454
                            • Opcode ID: 429b20b579d54585a7bb6e3358be21f9141b0cb121e64a9828802e311891d3b5
                            • Instruction ID: e7e384585c9476487a0867483baefa483fd77e61f2381b7ac6f57f4e048ff557
                            • Opcode Fuzzy Hash: 429b20b579d54585a7bb6e3358be21f9141b0cb121e64a9828802e311891d3b5
                            • Instruction Fuzzy Hash: 0F31A279A005059FDB10DF69C494BAD7BF4EF0530AF188069E815CB292D731DECACB90
                            APIs
                            • CreateMenu.USER32 ref: 00C73C79
                            • SetMenu.USER32(?,00000000), ref: 00C73C88
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C73D10
                            • IsMenu.USER32(?), ref: 00C73D24
                            • CreatePopupMenu.USER32 ref: 00C73D2E
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C73D5B
                            • DrawMenuBar.USER32 ref: 00C73D63
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                            • String ID: 0$F
                            • API String ID: 161812096-3044882817
                            • Opcode ID: 7f58d84ddc75dab347d83c20de89c42e7f8940165d7552898bfbb66e1f7fccd5
                            • Instruction ID: a9f26a2b18e8125892e64363e24f3d85256f3a99d0b7e5b1dadc337c17f62421
                            • Opcode Fuzzy Hash: 7f58d84ddc75dab347d83c20de89c42e7f8940165d7552898bfbb66e1f7fccd5
                            • Instruction Fuzzy Hash: 60418C74A0120AAFDB24CF64D888B9E7BB5FF49350F14402CE95AA7360D771AA10DB90
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C43CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C43CCA
                            • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00C41F64
                            • GetDlgCtrlID.USER32 ref: 00C41F6F
                            • GetParent.USER32 ref: 00C41F8B
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C41F8E
                            • GetDlgCtrlID.USER32(?), ref: 00C41F97
                            • GetParent.USER32(?), ref: 00C41FAB
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C41FAE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 711023334-1403004172
                            • Opcode ID: 76cccec2da7e996954c6347421a643c13866298f4e9b6600df9b1e2550c339a5
                            • Instruction ID: d5848a62fb8c903eda199115b50f3432f90692225f20a2773981a66c223bf7d0
                            • Opcode Fuzzy Hash: 76cccec2da7e996954c6347421a643c13866298f4e9b6600df9b1e2550c339a5
                            • Instruction Fuzzy Hash: 3521BE70900214BBDF04AFA1DCC5AEEBBB8FF06350B104159B9A5A72A1DB355A899B60
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C43CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C43CCA
                            • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00C42043
                            • GetDlgCtrlID.USER32 ref: 00C4204E
                            • GetParent.USER32 ref: 00C4206A
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C4206D
                            • GetDlgCtrlID.USER32(?), ref: 00C42076
                            • GetParent.USER32(?), ref: 00C4208A
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C4208D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 711023334-1403004172
                            • Opcode ID: b710fd33f71a629366190ef402d63bdad1fa0dd282fa1c887c5981dd4347ee3e
                            • Instruction ID: dc1ddfce09fc550fc85c9f622cf32d13bd8fb836aa3dbd034f17e3fcb0d19ebc
                            • Opcode Fuzzy Hash: b710fd33f71a629366190ef402d63bdad1fa0dd282fa1c887c5981dd4347ee3e
                            • Instruction Fuzzy Hash: 4B21BE71900214BBCB10AFA0DCC5BEEBBB8FB05340F104459B955A72A1DB758958DB60
                            APIs
                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00C73A9D
                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00C73AA0
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C73AC7
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00C73AEA
                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00C73B62
                            • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00C73BAC
                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00C73BC7
                            • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00C73BE2
                            • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00C73BF6
                            • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00C73C13
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$LongWindow
                            • String ID:
                            • API String ID: 312131281-0
                            • Opcode ID: a6a97e11bb7b397c6c1bbf94fd024bbec81336b945b9568659f3545c29ec96f6
                            • Instruction ID: f0248e1bb406eb559be882a0424daada7ac17a6b0984eeefcee9640c315d8914
                            • Opcode Fuzzy Hash: a6a97e11bb7b397c6c1bbf94fd024bbec81336b945b9568659f3545c29ec96f6
                            • Instruction Fuzzy Hash: 55617B75900288AFDB11DFA8CC81FEE77F8EB09710F144199FA19A72A1D770AE41EB50
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 00C4B151
                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00C4A1E1,?,00000001), ref: 00C4B165
                            • GetWindowThreadProcessId.USER32(00000000), ref: 00C4B16C
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C4A1E1,?,00000001), ref: 00C4B17B
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C4B18D
                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00C4A1E1,?,00000001), ref: 00C4B1A6
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C4A1E1,?,00000001), ref: 00C4B1B8
                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00C4A1E1,?,00000001), ref: 00C4B1FD
                            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00C4A1E1,?,00000001), ref: 00C4B212
                            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00C4A1E1,?,00000001), ref: 00C4B21D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                            • String ID:
                            • API String ID: 2156557900-0
                            • Opcode ID: 59dfc8d5bb6a2d1933a21ed2af85002a29b5cd14ed941cfbef54e541dfb7c97f
                            • Instruction ID: 8051984b16a18f2e9527d5fb36dee1bd2994044e86af5fa3daf3f15a085b2e66
                            • Opcode Fuzzy Hash: 59dfc8d5bb6a2d1933a21ed2af85002a29b5cd14ed941cfbef54e541dfb7c97f
                            • Instruction Fuzzy Hash: D1318B75540209BFDB20AF64EC98BAE7BADBF51311F104119FA29D6190D7B8DE808F60
                            APIs
                            • _free.LIBCMT ref: 00C12C94
                              • Part of subcall function 00C129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000), ref: 00C129DE
                              • Part of subcall function 00C129C8: GetLastError.KERNEL32(00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000,00000000), ref: 00C129F0
                            • _free.LIBCMT ref: 00C12CA0
                            • _free.LIBCMT ref: 00C12CAB
                            • _free.LIBCMT ref: 00C12CB6
                            • _free.LIBCMT ref: 00C12CC1
                            • _free.LIBCMT ref: 00C12CCC
                            • _free.LIBCMT ref: 00C12CD7
                            • _free.LIBCMT ref: 00C12CE2
                            • _free.LIBCMT ref: 00C12CED
                            • _free.LIBCMT ref: 00C12CFB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: f266728cbfaa473e92e51dfedb24979979c02ce697f5dd1a7e7866df9837862c
                            • Instruction ID: 4c9b611f93b7a807d6a5a116c26d2198b51f80b88023efd88ab111ca6ea01e4b
                            • Opcode Fuzzy Hash: f266728cbfaa473e92e51dfedb24979979c02ce697f5dd1a7e7866df9837862c
                            • Instruction Fuzzy Hash: 8B11477A510108AFCB02EF58D942CDD3BA5FF06360F5145A5FA495F222D631EEB0BB90
                            APIs
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C57FAD
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00C57FC1
                            • GetFileAttributesW.KERNEL32(?), ref: 00C57FEB
                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00C58005
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00C58017
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00C58060
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C580B0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CurrentDirectory$AttributesFile
                            • String ID: *.*
                            • API String ID: 769691225-438819550
                            • Opcode ID: 983b63ecd545cd02ce9f338e0f0d718c096c4f0e18125a8e32ce324abe556f44
                            • Instruction ID: 5a2c4233c6c6bb664dca4bfa7146dc6ceefd382fa2816c63d2aad39a8bb2aa4e
                            • Opcode Fuzzy Hash: 983b63ecd545cd02ce9f338e0f0d718c096c4f0e18125a8e32ce324abe556f44
                            • Instruction Fuzzy Hash: 2E81DE755083419FCB20EE15C881AAEB3E8AB88311F14495EFC99D7250EB74DECD8B96
                            APIs
                            • SetWindowLongW.USER32(?,000000EB), ref: 00BE5C7A
                              • Part of subcall function 00BE5D0A: GetClientRect.USER32(?,?), ref: 00BE5D30
                              • Part of subcall function 00BE5D0A: GetWindowRect.USER32(?,?), ref: 00BE5D71
                              • Part of subcall function 00BE5D0A: ScreenToClient.USER32(?,?), ref: 00BE5D99
                            • GetDC.USER32 ref: 00C246F5
                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00C24708
                            • SelectObject.GDI32(00000000,00000000), ref: 00C24716
                            • SelectObject.GDI32(00000000,00000000), ref: 00C2472B
                            • ReleaseDC.USER32(?,00000000), ref: 00C24733
                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00C247C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                            • String ID: U
                            • API String ID: 4009187628-3372436214
                            • Opcode ID: 5e11ece0e35d633eb47e00fac6546a5eba78053d576482253086b7b6bc697ede
                            • Instruction ID: 63d15af2aa0c6a2c7c34ccbe12e2361f7f22e93e8c237dc6b044fdb4463a6568
                            • Opcode Fuzzy Hash: 5e11ece0e35d633eb47e00fac6546a5eba78053d576482253086b7b6bc697ede
                            • Instruction Fuzzy Hash: C6710F30500205DFCF298F64D984ABE3BB1FF4A324F2842A9FD665A2A6C3319981DF50
                            APIs
                            • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00C535E4
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • LoadStringW.USER32(00CB2390,?,00000FFF,?), ref: 00C5360A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: LoadString$_wcslen
                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                            • API String ID: 4099089115-2391861430
                            • Opcode ID: d76ba2139ab05a71506d890505e8a10ae95ed132825714c509302bcc7ad17aaa
                            • Instruction ID: 9aca0757e011f3ae5a3f686c8cbb8c4563669d1fdca419ceec7b70f538c4e893
                            • Opcode Fuzzy Hash: d76ba2139ab05a71506d890505e8a10ae95ed132825714c509302bcc7ad17aaa
                            • Instruction Fuzzy Hash: C1518F71C0028AABCF15EBA1CC42EEEBBB8EF14381F584165F505721A1EB301BD9DB64
                            APIs
                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C5C272
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C5C29A
                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C5C2CA
                            • GetLastError.KERNEL32 ref: 00C5C322
                            • SetEvent.KERNEL32(?), ref: 00C5C336
                            • InternetCloseHandle.WININET(00000000), ref: 00C5C341
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                            • String ID:
                            • API String ID: 3113390036-3916222277
                            • Opcode ID: 2851cf2a2620d468978266dc52febff02c445d626807e838679b163764d18f93
                            • Instruction ID: 81a0dc7d3cd46d18c56d9382ea912417be3d611a19130f7da04063e8d3dcef77
                            • Opcode Fuzzy Hash: 2851cf2a2620d468978266dc52febff02c445d626807e838679b163764d18f93
                            • Instruction Fuzzy Hash: CD318DB5500308AFD7219F658CC8BAF7AFCEB49741F10851DF85AD2210DB34DD889B64
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00C23AAF,?,?,Bad directive syntax error,00C7CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00C498BC
                            • LoadStringW.USER32(00000000,?,00C23AAF,?), ref: 00C498C3
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00C49987
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: HandleLoadMessageModuleString_wcslen
                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                            • API String ID: 858772685-4153970271
                            • Opcode ID: d509bf8e2a7d777b522a6e9c887e127f89ea9b59509c5ddfce58e37ee99d8708
                            • Instruction ID: 2731ddb15a0d565ce0ae7ada245fcaa6db2eb50767aa04820ece3aea0f2a5f9a
                            • Opcode Fuzzy Hash: d509bf8e2a7d777b522a6e9c887e127f89ea9b59509c5ddfce58e37ee99d8708
                            • Instruction Fuzzy Hash: 3A21913180025EEBCF15EF90CC4AEEE77B5FF18704F0844A9F519660A2EB719A58DB20
                            APIs
                            • GetParent.USER32 ref: 00C420AB
                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00C420C0
                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00C4214D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameParentSend
                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                            • API String ID: 1290815626-3381328864
                            • Opcode ID: f8b888dee3e6feb94cb289e8f3c415fa1987db9ef8b900a02438cb162a1e8a9c
                            • Instruction ID: 49dac21fb24b0de678f926c74e47aa32e87ab9ad028ee957a8dff61d68a52cf8
                            • Opcode Fuzzy Hash: f8b888dee3e6feb94cb289e8f3c415fa1987db9ef8b900a02438cb162a1e8a9c
                            • Instruction Fuzzy Hash: 7E112C76688707BAF7053225EC07EEF379CEF05725B60402AF705A50D1FE655D416624
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4924ed1b5774f1e8a94ccbaae6b4ede739aa9819379f945a747dd490bac3eabd
                            • Instruction ID: f2490b25de28689caae62feb649c8bfa12e28b42cc0be75fbf672b7a2674ee8a
                            • Opcode Fuzzy Hash: 4924ed1b5774f1e8a94ccbaae6b4ede739aa9819379f945a747dd490bac3eabd
                            • Instruction Fuzzy Hash: 47C1C474A042499FDF21DFA8D851BEDBBB0AF0E310F144199E425A7392C7349AC2EB61
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                            • String ID:
                            • API String ID: 1282221369-0
                            • Opcode ID: fb752b755832eb5b2973decf3353644c516c48bb9520fd036e5282c5d4a304ac
                            • Instruction ID: 6349fed8b4186d10f160e4f646126b5bf3521415551969e642a919997ae0b9c4
                            • Opcode Fuzzy Hash: fb752b755832eb5b2973decf3353644c516c48bb9520fd036e5282c5d4a304ac
                            • Instruction Fuzzy Hash: 1E611571A44300AFDB21AFF498C1BEE7BA5AF07320F14426DF95597281D6319AC2F790
                            APIs
                            • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00C75186
                            • ShowWindow.USER32(?,00000000), ref: 00C751C7
                            • ShowWindow.USER32(?,00000005,?,00000000), ref: 00C751CD
                            • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00C751D1
                              • Part of subcall function 00C76FBA: DeleteObject.GDI32(00000000), ref: 00C76FE6
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C7520D
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C7521A
                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00C7524D
                            • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00C75287
                            • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00C75296
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                            • String ID:
                            • API String ID: 3210457359-0
                            • Opcode ID: a27df89d8886ff862f8232194e0ce7d136bc4ecf5c3d086cb84f86fe44ede097
                            • Instruction ID: 8cc73d71e0af2bf39b5ca0499658cf1b1ac799cc63d9533d6dee8ce62456a862
                            • Opcode Fuzzy Hash: a27df89d8886ff862f8232194e0ce7d136bc4ecf5c3d086cb84f86fe44ede097
                            • Instruction Fuzzy Hash: 47518230A40A09BFEF249F25CC49BDD3BA5FB05362F54C115FA2D962E1C7B5AA90DB40
                            APIs
                            • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00C36890
                            • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00C368A9
                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00C368B9
                            • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00C368D1
                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00C368F2
                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00BF8874,00000000,00000000,00000000,000000FF,00000000), ref: 00C36901
                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00C3691E
                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00BF8874,00000000,00000000,00000000,000000FF,00000000), ref: 00C3692D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                            • String ID:
                            • API String ID: 1268354404-0
                            • Opcode ID: 380e1facffca45cb1603a36b82344eb9b01fd072bd43fdedcb3b9518485d4677
                            • Instruction ID: 1157ae548cb27c6fa66fa3cb9bdf24f04f24a1585561bb0d3ed1803d790d1634
                            • Opcode Fuzzy Hash: 380e1facffca45cb1603a36b82344eb9b01fd072bd43fdedcb3b9518485d4677
                            • Instruction Fuzzy Hash: 5A517870A00209AFDB20CF25CC95BAA7BF5FB48760F104558FA56972A0DB71EA94DB50
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C5C182
                            • GetLastError.KERNEL32 ref: 00C5C195
                            • SetEvent.KERNEL32(?), ref: 00C5C1A9
                              • Part of subcall function 00C5C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C5C272
                              • Part of subcall function 00C5C253: GetLastError.KERNEL32 ref: 00C5C322
                              • Part of subcall function 00C5C253: SetEvent.KERNEL32(?), ref: 00C5C336
                              • Part of subcall function 00C5C253: InternetCloseHandle.WININET(00000000), ref: 00C5C341
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                            • String ID:
                            • API String ID: 337547030-0
                            • Opcode ID: 8ec0e7e42df509f6448a236aeceebfc774d6f137b871f59124f3c8b050395f37
                            • Instruction ID: 2449406cb9f6f3d2a2ff7ae063104ffac56e76d5d4ba50b5c709b654c1ae28f4
                            • Opcode Fuzzy Hash: 8ec0e7e42df509f6448a236aeceebfc774d6f137b871f59124f3c8b050395f37
                            • Instruction Fuzzy Hash: 9A317E79100701AFDB259FA5DC84B6BBBE9FF18302F00441DF96A86611DB30E9989BA4
                            APIs
                              • Part of subcall function 00C43A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C43A57
                              • Part of subcall function 00C43A3D: GetCurrentThreadId.KERNEL32 ref: 00C43A5E
                              • Part of subcall function 00C43A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00C425B3), ref: 00C43A65
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C425BD
                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00C425DB
                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00C425DF
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C425E9
                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00C42601
                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00C42605
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C4260F
                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00C42623
                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00C42627
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                            • String ID:
                            • API String ID: 2014098862-0
                            • Opcode ID: 26358d320fc22cbe3b0054a5cb4902b19f19186bdb4e35bf65dbdd97870a0148
                            • Instruction ID: d7982d046d3b420e65f0bce4fe848433aa83c2140cad11630cb80a9058641d11
                            • Opcode Fuzzy Hash: 26358d320fc22cbe3b0054a5cb4902b19f19186bdb4e35bf65dbdd97870a0148
                            • Instruction Fuzzy Hash: 8601D430390610BBFB2067699CCAF5D3F59EF8EB22F500019F318AE0D1C9E22484DA69
                            APIs
                            • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00C41449,?,?,00000000), ref: 00C4180C
                            • HeapAlloc.KERNEL32(00000000,?,00C41449,?,?,00000000), ref: 00C41813
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C41449,?,?,00000000), ref: 00C41828
                            • GetCurrentProcess.KERNEL32(?,00000000,?,00C41449,?,?,00000000), ref: 00C41830
                            • DuplicateHandle.KERNEL32(00000000,?,00C41449,?,?,00000000), ref: 00C41833
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C41449,?,?,00000000), ref: 00C41843
                            • GetCurrentProcess.KERNEL32(00C41449,00000000,?,00C41449,?,?,00000000), ref: 00C4184B
                            • DuplicateHandle.KERNEL32(00000000,?,00C41449,?,?,00000000), ref: 00C4184E
                            • CreateThread.KERNEL32(00000000,00000000,00C41874,00000000,00000000,00000000), ref: 00C41868
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                            • String ID:
                            • API String ID: 1957940570-0
                            • Opcode ID: dffed33b2f3bc96a54378d8693ec961f7a3b9447172d2b59fb0a83734d118f0f
                            • Instruction ID: e838d5e88bce3c82335bd9fd9e20e67c5a1d50eb75f461ee15c226c2bb06ed2e
                            • Opcode Fuzzy Hash: dffed33b2f3bc96a54378d8693ec961f7a3b9447172d2b59fb0a83734d118f0f
                            • Instruction Fuzzy Hash: FC01BBB5640309BFE710ABB5DC8DF6F3BACEB89B11F414425FA09DB1A1CA709850CB20
                            APIs
                              • Part of subcall function 00C4D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00C4D501
                              • Part of subcall function 00C4D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00C4D50F
                              • Part of subcall function 00C4D4DC: CloseHandle.KERNELBASE(00000000), ref: 00C4D5DC
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C6A16D
                            • GetLastError.KERNEL32 ref: 00C6A180
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C6A1B3
                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00C6A268
                            • GetLastError.KERNEL32(00000000), ref: 00C6A273
                            • CloseHandle.KERNEL32(00000000), ref: 00C6A2C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                            • String ID: SeDebugPrivilege
                            • API String ID: 2533919879-2896544425
                            • Opcode ID: 754b246347fbf203cf77a1be2f96edb05ec49b390b6e948c0285db26101fdb6a
                            • Instruction ID: 7f164f569af676504c732468704c34e480be52743caf91af1c682dce0ced78b3
                            • Opcode Fuzzy Hash: 754b246347fbf203cf77a1be2f96edb05ec49b390b6e948c0285db26101fdb6a
                            • Instruction Fuzzy Hash: 59618E702042429FD720DF19C4D4F1ABBE1AF54318F54849CE46A9B7A3C772ED89CB92
                            APIs
                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00C73925
                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00C7393A
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00C73954
                            • _wcslen.LIBCMT ref: 00C73999
                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00C739C6
                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00C739F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$Window_wcslen
                            • String ID: SysListView32
                            • API String ID: 2147712094-78025650
                            • Opcode ID: 0da12f98bf7239c223464f6db63b40a58b8cb662175e1985650ae732fbb9b539
                            • Instruction ID: 157c679d9866f67f5a50f5c980c063fd814d4d109bcda20d7e37639eede0104c
                            • Opcode Fuzzy Hash: 0da12f98bf7239c223464f6db63b40a58b8cb662175e1985650ae732fbb9b539
                            • Instruction Fuzzy Hash: D041A371A00259ABDF219F64CC89BEE7BA9FF08354F10452AF958E72C1D7719A80DB90
                            APIs
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C4BCFD
                            • IsMenu.USER32(00000000), ref: 00C4BD1D
                            • CreatePopupMenu.USER32 ref: 00C4BD53
                            • GetMenuItemCount.USER32(015F5C28), ref: 00C4BDA4
                            • InsertMenuItemW.USER32(015F5C28,?,00000001,00000030), ref: 00C4BDCC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                            • String ID: 0$2
                            • API String ID: 93392585-3793063076
                            • Opcode ID: 5c6500747f7506e12e3e67c9170d24199ff977aaa0b8adc8b65b4cc8f603acaa
                            • Instruction ID: ba9c9f5724250da0b604b1acda2951d61fc1cd6dfc973474917457737ef58f0a
                            • Opcode Fuzzy Hash: 5c6500747f7506e12e3e67c9170d24199ff977aaa0b8adc8b65b4cc8f603acaa
                            • Instruction Fuzzy Hash: E151AD70E002059BDF20CFA9D8C4BAEBBF8BF55314F144199E42597298D770EE45CB61
                            APIs
                            • LoadIconW.USER32(00000000,00007F03), ref: 00C4C913
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: IconLoad
                            • String ID: blank$info$question$stop$warning
                            • API String ID: 2457776203-404129466
                            • Opcode ID: 344c8cf5aa194c6dea0864443e2379d94f9d2c13a2dab5aeab02ae4165d698a0
                            • Instruction ID: a589e6ef41d989b0c139364fcd1782d22c7976550a8f1dcbf160f00f636f6449
                            • Opcode Fuzzy Hash: 344c8cf5aa194c6dea0864443e2379d94f9d2c13a2dab5aeab02ae4165d698a0
                            • Instruction Fuzzy Hash: 7C110D3278A307BAE7056B559CC3DAF779CEF25358B14003EF610E61E2EB745E406264
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                            • String ID: 0.0.0.0
                            • API String ID: 642191829-3771769585
                            • Opcode ID: 1d96f05bd41f2cadfd5f3bdea09848025a88bb0f42ab09f76f3ff77ed619fff6
                            • Instruction ID: 214816a2e7bf7d750712ffd92164b5f9e99361cc310f7b309680fc3afd1ee61c
                            • Opcode Fuzzy Hash: 1d96f05bd41f2cadfd5f3bdea09848025a88bb0f42ab09f76f3ff77ed619fff6
                            • Instruction Fuzzy Hash: DB11A271904116ABCB24BB60DC4AFEE77ACEB11711F0101ADF55AAA0D1EF718A81DA51
                            APIs
                              • Part of subcall function 00BF9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BF9BB2
                            • GetSystemMetrics.USER32(0000000F), ref: 00C79FC7
                            • GetSystemMetrics.USER32(0000000F), ref: 00C79FE7
                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00C7A224
                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00C7A242
                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00C7A263
                            • ShowWindow.USER32(00000003,00000000), ref: 00C7A282
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00C7A2A7
                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00C7A2CA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                            • String ID:
                            • API String ID: 1211466189-0
                            • Opcode ID: 9956531acaee281b9a8000922324b734af10a62bb8d311de3cad586c872d230b
                            • Instruction ID: 17d9931f5793017622e02b1e72cedb0deb878f9b2689db1f12eb5c75114f9733
                            • Opcode Fuzzy Hash: 9956531acaee281b9a8000922324b734af10a62bb8d311de3cad586c872d230b
                            • Instruction Fuzzy Hash: F1B16831600215EFDF14CF69C9C57AE7BB2BF84711F09C069EC59AB296DB31AA80CB51
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$LocalTime
                            • String ID:
                            • API String ID: 952045576-0
                            • Opcode ID: f97a35a5a6dbbd0129870baf287089de46608951de4350d6356bdaf267625cdd
                            • Instruction ID: 4b430d6963700cdf1513ff397ba8bec465baa64fa5b4399d1097f3d07b2d9600
                            • Opcode Fuzzy Hash: f97a35a5a6dbbd0129870baf287089de46608951de4350d6356bdaf267625cdd
                            • Instruction Fuzzy Hash: 0F41A365C1021875CB11EBF4CC8AACFB7ACBF45710F508462E918E3162FB34E655C3A5
                            APIs
                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00C3682C,00000004,00000000,00000000), ref: 00BFF953
                            • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00C3682C,00000004,00000000,00000000), ref: 00C3F3D1
                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00C3682C,00000004,00000000,00000000), ref: 00C3F454
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ShowWindow
                            • String ID:
                            • API String ID: 1268545403-0
                            • Opcode ID: 76ddc93d6c1a08e4eefab3c5c50978d99eec37a377a6349c3efa9c547ed741c7
                            • Instruction ID: 8b0b0145f903cd60a34877e3e6c8ee1dbc5ac4e75e086d4c64826d58417ab652
                            • Opcode Fuzzy Hash: 76ddc93d6c1a08e4eefab3c5c50978d99eec37a377a6349c3efa9c547ed741c7
                            • Instruction Fuzzy Hash: 9C415031A1468ABAC7388B29C8C873E7BD1EF55310F54C4BCE28B53570C6B2D989CB11
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 00C72D1B
                            • GetDC.USER32(00000000), ref: 00C72D23
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C72D2E
                            • ReleaseDC.USER32(00000000,00000000), ref: 00C72D3A
                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00C72D76
                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00C72D87
                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00C75A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00C72DC2
                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00C72DE1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                            • String ID:
                            • API String ID: 3864802216-0
                            • Opcode ID: c6452ac96249d736ee50668278aa411681ca7aa309366478e37acf5b407b068d
                            • Instruction ID: 411cae1501dc86ac2b58bb6c6034dde9ffb2684f907ee900262b487926a36216
                            • Opcode Fuzzy Hash: c6452ac96249d736ee50668278aa411681ca7aa309366478e37acf5b407b068d
                            • Instruction Fuzzy Hash: 07316B72201214BFEB218F508C8AFEB3FADEB19755F048059FE0C9A291D6759C90CBA4
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: 31b4ebc03e54846f218fa281bd39fd59d9ba38ac5815744e6b563181a280496e
                            • Instruction ID: 5149d325bd409a474ef2634cf73cb141f3bdd43c3ddb02a01f009551f5bb8518
                            • Opcode Fuzzy Hash: 31b4ebc03e54846f218fa281bd39fd59d9ba38ac5815744e6b563181a280496e
                            • Instruction Fuzzy Hash: D021C661740A09BBD21556218EC2FFA735CBF21794F594034FD099A7C3F720EE12D5A5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: NULL Pointer assignment$Not an Object type
                            • API String ID: 0-572801152
                            • Opcode ID: a62195fe9bf5bfdd673528603c5c27ea2716034f47b0f6fce7d299fa85f72ab3
                            • Instruction ID: 7b07778b25b3cddc933a4e98c503df41d5bb831bd94f60570912eb757b838332
                            • Opcode Fuzzy Hash: a62195fe9bf5bfdd673528603c5c27ea2716034f47b0f6fce7d299fa85f72ab3
                            • Instruction Fuzzy Hash: F8D1B375A0060AAFDF20CFA8C8C1BAEB7B5FF48344F248469E915AB291D771DE45CB50
                            APIs
                            • GetCPInfo.KERNEL32(?,?), ref: 00C215CE
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00C21651
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C216E4
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00C216FB
                              • Part of subcall function 00C13820: RtlAllocateHeap.NTDLL(00000000,?,00CB1444,?,00BFFDF5,?,?,00BEA976,00000010,00CB1440,00BE13FC,?,00BE13C6,?,00BE1129), ref: 00C13852
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C21777
                            • __freea.LIBCMT ref: 00C217A2
                            • __freea.LIBCMT ref: 00C217AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                            • String ID:
                            • API String ID: 2829977744-0
                            • Opcode ID: aeed0fc0813fdf94a981ba10df859c68f96d0f6da43a276d2f20755e326d6b29
                            • Instruction ID: 061f6b1b2f2793d99fd6430409453bd2f52f2a6908d22983c4bbae1b142e0a48
                            • Opcode Fuzzy Hash: aeed0fc0813fdf94a981ba10df859c68f96d0f6da43a276d2f20755e326d6b29
                            • Instruction Fuzzy Hash: F291C471E002269EDB208E65E881AEE7BF5EFA9710F1C4669EC15E7581DB35CE40C7A0
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearInit
                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                            • API String ID: 2610073882-625585964
                            • Opcode ID: 8a04001928eae11f5a857026ec2c9ee34b12a726a283fb70c42be0695593b3e5
                            • Instruction ID: 5ad051d6e261d4933d1ce96286c1f7f221273486afc9f488a168f2ab39030f68
                            • Opcode Fuzzy Hash: 8a04001928eae11f5a857026ec2c9ee34b12a726a283fb70c42be0695593b3e5
                            • Instruction Fuzzy Hash: 47915171A00219ABDF38CFA5CC84FAEBBB8EF46714F108559F515AB280D7709945CBA0
                            APIs
                            • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00C5125C
                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00C51284
                            • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00C512A8
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C512D8
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C5135F
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C513C4
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00C51430
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ArraySafe$Data$Access$UnaccessVartype
                            • String ID:
                            • API String ID: 2550207440-0
                            • Opcode ID: db0a35c617deb55c6dcad9bc9338fdab44e485a47108a64506369c3b39c843ed
                            • Instruction ID: cef7b909ba1af69c05eb1ccc60f9232436e3cc395d271485418127484447fa14
                            • Opcode Fuzzy Hash: db0a35c617deb55c6dcad9bc9338fdab44e485a47108a64506369c3b39c843ed
                            • Instruction Fuzzy Hash: 1E910379A00219AFDB00DFA4C889BBE77F5FF44312F194029ED10E7291D774A989CB98
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ObjectSelect$BeginCreatePath
                            • String ID:
                            • API String ID: 3225163088-0
                            • Opcode ID: 162f4ee97404c46a10d299c4534f062964497278accde5cc8169f08f91b178f6
                            • Instruction ID: a1010709aa86ae0f6e781c975edcdc1282e059e1cc907301f921b33b4e1f2c26
                            • Opcode Fuzzy Hash: 162f4ee97404c46a10d299c4534f062964497278accde5cc8169f08f91b178f6
                            • Instruction Fuzzy Hash: 33913871D00219EFCB14CFA9CC84AEEBBB8FF49320F148599E615B7251D375AA45CBA0
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 00C6396B
                            • CharUpperBuffW.USER32(?,?), ref: 00C63A7A
                            • _wcslen.LIBCMT ref: 00C63A8A
                            • VariantClear.OLEAUT32(?), ref: 00C63C1F
                              • Part of subcall function 00C50CDF: VariantInit.OLEAUT32(00000000), ref: 00C50D1F
                              • Part of subcall function 00C50CDF: VariantCopy.OLEAUT32(?,?), ref: 00C50D28
                              • Part of subcall function 00C50CDF: VariantClear.OLEAUT32(?), ref: 00C50D34
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                            • API String ID: 4137639002-1221869570
                            • Opcode ID: e0c78f0a3d950d4ce06aaca249d8357008331879cc94fd2adda26baf60f35032
                            • Instruction ID: 45a9718258631fa250be8d0c953b6979b83aa61994753061188c990ab5e331a2
                            • Opcode Fuzzy Hash: e0c78f0a3d950d4ce06aaca249d8357008331879cc94fd2adda26baf60f35032
                            • Instruction Fuzzy Hash: 269188746083859FC714EF64C48092AB7E4FF89314F14896DF89A9B352DB30EE49CB82
                            APIs
                              • Part of subcall function 00C4000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?,?,?,00C4035E), ref: 00C4002B
                              • Part of subcall function 00C4000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?,?), ref: 00C40046
                              • Part of subcall function 00C4000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?,?), ref: 00C40054
                              • Part of subcall function 00C4000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?), ref: 00C40064
                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00C64C51
                            • _wcslen.LIBCMT ref: 00C64D59
                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00C64DCF
                            • CoTaskMemFree.OLE32(?), ref: 00C64DDA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                            • String ID: NULL Pointer assignment
                            • API String ID: 614568839-2785691316
                            • Opcode ID: 1dbb265abfd9ba44857dab4bc61a3b3221b64a15d770abf8e17ebc5ef2fb476e
                            • Instruction ID: 83a2788f4fe2a36d9fee78da0fcf195ec470c6919b2d541545b8e7b227b82ba6
                            • Opcode Fuzzy Hash: 1dbb265abfd9ba44857dab4bc61a3b3221b64a15d770abf8e17ebc5ef2fb476e
                            • Instruction Fuzzy Hash: 7B910771D00219EFDF24DFA5C891AEEB7B9BF08310F108169E915A7291DB35AA45CF60
                            APIs
                            • GetMenu.USER32(?), ref: 00C72183
                            • GetMenuItemCount.USER32(00000000), ref: 00C721B5
                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00C721DD
                            • _wcslen.LIBCMT ref: 00C72213
                            • GetMenuItemID.USER32(?,?), ref: 00C7224D
                            • GetSubMenu.USER32(?,?), ref: 00C7225B
                              • Part of subcall function 00C43A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C43A57
                              • Part of subcall function 00C43A3D: GetCurrentThreadId.KERNEL32 ref: 00C43A5E
                              • Part of subcall function 00C43A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00C425B3), ref: 00C43A65
                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00C722E3
                              • Part of subcall function 00C4E97B: Sleep.KERNEL32 ref: 00C4E9F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                            • String ID:
                            • API String ID: 4196846111-0
                            • Opcode ID: c77f8912dfbd320ab071767219dfec611c151e51531c8da5e4ac8776a87b8ee7
                            • Instruction ID: c9cf4c6b2ca072105d68b403110e3cf7f29c8cc26df323f28043eb75a311ef1e
                            • Opcode Fuzzy Hash: c77f8912dfbd320ab071767219dfec611c151e51531c8da5e4ac8776a87b8ee7
                            • Instruction Fuzzy Hash: 69719275E00205AFCB10DF65C885AAEBBF5FF48320F148499E96AEB351D734EE419B90
                            APIs
                            • IsWindow.USER32(015F5CA0), ref: 00C77F37
                            • IsWindowEnabled.USER32(015F5CA0), ref: 00C77F43
                            • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00C7801E
                            • SendMessageW.USER32(015F5CA0,000000B0,?,?), ref: 00C78051
                            • IsDlgButtonChecked.USER32(?,?), ref: 00C78089
                            • GetWindowLongW.USER32(015F5CA0,000000EC), ref: 00C780AB
                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00C780C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                            • String ID:
                            • API String ID: 4072528602-0
                            • Opcode ID: 5ab8d9736d911598be80850318e8c54762ddbbabbdd67a03bcaf0a464c5cd704
                            • Instruction ID: 84757d335f716396e65b3a6f132da26926aa6fb994fe6b7a1a42fd068be57133
                            • Opcode Fuzzy Hash: 5ab8d9736d911598be80850318e8c54762ddbbabbdd67a03bcaf0a464c5cd704
                            • Instruction Fuzzy Hash: B471B134608248AFEB21DFA4C9D4FAE7BB9EF09300F148559F96D57261CB31AA45DB20
                            APIs
                            • GetParent.USER32(?), ref: 00C4AEF9
                            • GetKeyboardState.USER32(?), ref: 00C4AF0E
                            • SetKeyboardState.USER32(?), ref: 00C4AF6F
                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00C4AF9D
                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00C4AFBC
                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00C4AFFD
                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00C4B020
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: 10017f0de358cab243fe0150d3165e61ae77f30238847d6330089044e7ff4e78
                            • Instruction ID: c3f69c07aef409e756ff4da7b068b82cf383ec8b51c3245f92d97cffadfe8390
                            • Opcode Fuzzy Hash: 10017f0de358cab243fe0150d3165e61ae77f30238847d6330089044e7ff4e78
                            • Instruction Fuzzy Hash: 4151CFE0A447D53EFB3682748845BBBBEA96B06304F088489F1E9458C2C3D8EEC8D751
                            APIs
                            • GetParent.USER32(00000000), ref: 00C4AD19
                            • GetKeyboardState.USER32(?), ref: 00C4AD2E
                            • SetKeyboardState.USER32(?), ref: 00C4AD8F
                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00C4ADBB
                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00C4ADD8
                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00C4AE17
                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00C4AE38
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: bd4cc9a34a996e30879fcbcaf0262af299054515e3c81a38c8226a68173f2e64
                            • Instruction ID: 7ff578e11320e948e3b971c0776f632f43454991f7875ffe013b6f4ed0facb4b
                            • Opcode Fuzzy Hash: bd4cc9a34a996e30879fcbcaf0262af299054515e3c81a38c8226a68173f2e64
                            • Instruction Fuzzy Hash: 5151E7A19887D53DFB3783358C95B7A7EA87F46300F088488E1F5468C3D294EE94E752
                            APIs
                            • GetConsoleCP.KERNEL32(00C23CD6,?,?,?,?,?,?,?,?,00C15BA3,?,?,00C23CD6,?,?), ref: 00C15470
                            • __fassign.LIBCMT ref: 00C154EB
                            • __fassign.LIBCMT ref: 00C15506
                            • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00C23CD6,00000005,00000000,00000000), ref: 00C1552C
                            • WriteFile.KERNEL32(?,00C23CD6,00000000,00C15BA3,00000000,?,?,?,?,?,?,?,?,?,00C15BA3,?), ref: 00C1554B
                            • WriteFile.KERNEL32(?,?,00000001,00C15BA3,00000000,?,?,?,?,?,?,?,?,?,00C15BA3,?), ref: 00C15584
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                            • String ID:
                            • API String ID: 1324828854-0
                            • Opcode ID: e0d381abc6d4173b82b0ce1ca0f79ef8320ad40c77d8990d2aedb0ce05084616
                            • Instruction ID: f54decf40252b52f5c464b9ccc973bfa407a7b0da7e0e3ae4140fb7ff5a9d522
                            • Opcode Fuzzy Hash: e0d381abc6d4173b82b0ce1ca0f79ef8320ad40c77d8990d2aedb0ce05084616
                            • Instruction Fuzzy Hash: DB51A471A00649DFDB10CFA8D885BEEBBFAEF4A300F14415AF555E7291D7309A81DB60
                            APIs
                            • _ValidateLocalCookies.LIBCMT ref: 00C02D4B
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00C02D53
                            • _ValidateLocalCookies.LIBCMT ref: 00C02DE1
                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00C02E0C
                            • _ValidateLocalCookies.LIBCMT ref: 00C02E61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                            • String ID: csm
                            • API String ID: 1170836740-1018135373
                            • Opcode ID: 24f7655872b9f49bb3b5947c9181dfdd1d2b860c3693eba11d8da7360bbe0b6e
                            • Instruction ID: bc7d9cff9c28e0bf9e0dac848f68b31e3e4cd1948a55dac8bc877b83254ed131
                            • Opcode Fuzzy Hash: 24f7655872b9f49bb3b5947c9181dfdd1d2b860c3693eba11d8da7360bbe0b6e
                            • Instruction Fuzzy Hash: A641A334A00319ABCF10DF68C889A9EBBB5BF45325F1481A5E8256B3D2D731AE05CBD0
                            APIs
                              • Part of subcall function 00C6304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C6307A
                              • Part of subcall function 00C6304E: _wcslen.LIBCMT ref: 00C6309B
                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00C61112
                            • WSAGetLastError.WSOCK32 ref: 00C61121
                            • WSAGetLastError.WSOCK32 ref: 00C611C9
                            • closesocket.WSOCK32(00000000), ref: 00C611F9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                            • String ID:
                            • API String ID: 2675159561-0
                            • Opcode ID: 3576ba0ee4e678d310faff29dc3c6235daf57f6b9748e8d731c85f5c9c4ba97b
                            • Instruction ID: 93a6df3419fba1d67a85c31875ddc9727f5e617f2a8aef8be4803eebd3205d8d
                            • Opcode Fuzzy Hash: 3576ba0ee4e678d310faff29dc3c6235daf57f6b9748e8d731c85f5c9c4ba97b
                            • Instruction Fuzzy Hash: 5D41D731600205AFDB209F15C8C5BADBBE9EF45315F1C8059FD199B292C774AE85CBE1
                            APIs
                              • Part of subcall function 00C4DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C4CF22,?), ref: 00C4DDFD
                              • Part of subcall function 00C4DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C4CF22,?), ref: 00C4DE16
                            • lstrcmpiW.KERNEL32(?,?), ref: 00C4CF45
                            • MoveFileW.KERNEL32(?,?), ref: 00C4CF7F
                            • _wcslen.LIBCMT ref: 00C4D005
                            • _wcslen.LIBCMT ref: 00C4D01B
                            • SHFileOperationW.SHELL32(?), ref: 00C4D061
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                            • String ID: \*.*
                            • API String ID: 3164238972-1173974218
                            • Opcode ID: c775cb2d6b0156d788535258edec9a99206a5e5ba16c9dcc3b243069482f6e18
                            • Instruction ID: 66b7134950abe148c5b9472ed92b4cec34f51645feb2125782367e9ed58a8aee
                            • Opcode Fuzzy Hash: c775cb2d6b0156d788535258edec9a99206a5e5ba16c9dcc3b243069482f6e18
                            • Instruction Fuzzy Hash: 7C4155719462199FDF12EBA4D9C1ADEB7B8BF08380F1000E6E505EB152EB35A788DB50
                            APIs
                            • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00C72E1C
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C72E4F
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C72E84
                            • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00C72EB6
                            • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00C72EE0
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C72EF1
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C72F0B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: LongWindow$MessageSend
                            • String ID:
                            • API String ID: 2178440468-0
                            • Opcode ID: 573113001354d3866781c22744954eca2cd343841b4a07f80e8ce28908ca1990
                            • Instruction ID: 25bde10be606183f9581c407ced8561dbf80a6fe6757d472d1236315ad5b3741
                            • Opcode Fuzzy Hash: 573113001354d3866781c22744954eca2cd343841b4a07f80e8ce28908ca1990
                            • Instruction Fuzzy Hash: 123115306041519FDB20CF58DCD4F6937E0FB4A721F194168F9588B2B1CB71AD80DB41
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C47769
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C4778F
                            • SysAllocString.OLEAUT32(00000000), ref: 00C47792
                            • SysAllocString.OLEAUT32(?), ref: 00C477B0
                            • SysFreeString.OLEAUT32(?), ref: 00C477B9
                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00C477DE
                            • SysAllocString.OLEAUT32(?), ref: 00C477EC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                            • String ID:
                            • API String ID: 3761583154-0
                            • Opcode ID: c98fc7a6e67bd21f062f5dc910baa96fdc6646d402e927deca332e4ebcc9ace3
                            • Instruction ID: 1b2aa8c69ee404f6d825bae57c360d1119e760ca8c0e60d4c0140128b87af6df
                            • Opcode Fuzzy Hash: c98fc7a6e67bd21f062f5dc910baa96fdc6646d402e927deca332e4ebcc9ace3
                            • Instruction Fuzzy Hash: 6E219F7660421AAFDB11DFA8CC88EBA77ACFB093647408129FA15DB150D7709D8587A0
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C47842
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C47868
                            • SysAllocString.OLEAUT32(00000000), ref: 00C4786B
                            • SysAllocString.OLEAUT32 ref: 00C4788C
                            • SysFreeString.OLEAUT32 ref: 00C47895
                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00C478AF
                            • SysAllocString.OLEAUT32(?), ref: 00C478BD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                            • String ID:
                            • API String ID: 3761583154-0
                            • Opcode ID: 6493b681f7e677f6ed2dc68830168daba959ec4324338cea7d94f7a3f4d6f696
                            • Instruction ID: abc89fb39786f94af4cdcb2640a78e936ef29df25c34d5d81770222c1f3c9ba2
                            • Opcode Fuzzy Hash: 6493b681f7e677f6ed2dc68830168daba959ec4324338cea7d94f7a3f4d6f696
                            • Instruction Fuzzy Hash: 19216031608205AFDB109FA9DC88EBA77ECFB097607108225F925EB2A1D774DD81CB64
                            APIs
                            • GetStdHandle.KERNEL32(0000000C), ref: 00C504F2
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C5052E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CreateHandlePipe
                            • String ID: nul
                            • API String ID: 1424370930-2873401336
                            • Opcode ID: 4144cc9b12531bfbf749447ec9ca6bfca1e42df0eb464cec21669f7bea7aba1c
                            • Instruction ID: 4568b6b0be16f2b182d5ee84036c9b8ceea5ab61d9b1f4ee5878b289ee066993
                            • Opcode Fuzzy Hash: 4144cc9b12531bfbf749447ec9ca6bfca1e42df0eb464cec21669f7bea7aba1c
                            • Instruction Fuzzy Hash: 272182795003069BDB208F29DC45B9A77A4AF44726F704A19FCB1E61E1E7709A88CF28
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 00C505C6
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C50601
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CreateHandlePipe
                            • String ID: nul
                            • API String ID: 1424370930-2873401336
                            • Opcode ID: d72de521ee7b185e356167bc389d44c13dc6bd71f1b09989e0c6c9684fe664a9
                            • Instruction ID: 605bc4d5b7b360e3b41b5d547515f76674cd401a49f002dc3ea3ab187a07f16f
                            • Opcode Fuzzy Hash: d72de521ee7b185e356167bc389d44c13dc6bd71f1b09989e0c6c9684fe664a9
                            • Instruction Fuzzy Hash: 29217479500306DBDB209F69CC45B9A77A4AF95722F340A19FCB1E72E0DB709AD4CB18
                            APIs
                              • Part of subcall function 00BE600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00BE604C
                              • Part of subcall function 00BE600E: GetStockObject.GDI32(00000011), ref: 00BE6060
                              • Part of subcall function 00BE600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BE606A
                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00C74112
                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00C7411F
                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00C7412A
                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00C74139
                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00C74145
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CreateObjectStockWindow
                            • String ID: Msctls_Progress32
                            • API String ID: 1025951953-3636473452
                            • Opcode ID: c2ecd8b109e9ea077c9bd4b197174bf92a8fa3a196c2cd9ad9cdc3b7beaf7ff8
                            • Instruction ID: 79d6168bd2a8720420d860e381cdb04670292b4a03a7c03b9ad1cd7b433d23be
                            • Opcode Fuzzy Hash: c2ecd8b109e9ea077c9bd4b197174bf92a8fa3a196c2cd9ad9cdc3b7beaf7ff8
                            • Instruction Fuzzy Hash: 841193B11401197EEF119E64CC85EEB7F9DEF09798F018110FA18A2050C7729C61DBA4
                            APIs
                              • Part of subcall function 00C1D7A3: _free.LIBCMT ref: 00C1D7CC
                            • _free.LIBCMT ref: 00C1D82D
                              • Part of subcall function 00C129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000), ref: 00C129DE
                              • Part of subcall function 00C129C8: GetLastError.KERNEL32(00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000,00000000), ref: 00C129F0
                            • _free.LIBCMT ref: 00C1D838
                            • _free.LIBCMT ref: 00C1D843
                            • _free.LIBCMT ref: 00C1D897
                            • _free.LIBCMT ref: 00C1D8A2
                            • _free.LIBCMT ref: 00C1D8AD
                            • _free.LIBCMT ref: 00C1D8B8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: eef9f0f7ce89c446af916082ef0dcf5a34906bd0a27450ed26007c2b7c5374a1
                            • Instruction ID: 178da6200d382d21eeed54ce38044698900e30f7fe9f54f10ee2c294a86c770c
                            • Opcode Fuzzy Hash: eef9f0f7ce89c446af916082ef0dcf5a34906bd0a27450ed26007c2b7c5374a1
                            • Instruction Fuzzy Hash: 7E115171540B04AAD521BFB0CC47FCB7BDC6F02710F440825B29AEA1D2DAA5B5A57690
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00C4DA74
                            • LoadStringW.USER32(00000000), ref: 00C4DA7B
                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00C4DA91
                            • LoadStringW.USER32(00000000), ref: 00C4DA98
                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C4DADC
                            Strings
                            • %s (%d) : ==> %s: %s %s, xrefs: 00C4DAB9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message
                            • String ID: %s (%d) : ==> %s: %s %s
                            • API String ID: 4072794657-3128320259
                            • Opcode ID: 1cde9b6886185bf4cd04b22d706dbd15df59a0507704c6cfa79c011e679aedba
                            • Instruction ID: af9885df731805f4ba2e43436b1db8169117b553901dcd24c18683112bb3a360
                            • Opcode Fuzzy Hash: 1cde9b6886185bf4cd04b22d706dbd15df59a0507704c6cfa79c011e679aedba
                            • Instruction Fuzzy Hash: E10162F25002097FE711ABA09DC9FEB366CE708705F4044A9B71AE2041EA749EC44F74
                            APIs
                            • InterlockedExchange.KERNEL32(015EDE68,015EDE68), ref: 00C5097B
                            • EnterCriticalSection.KERNEL32(015EDE48,00000000), ref: 00C5098D
                            • TerminateThread.KERNEL32(?,000001F6), ref: 00C5099B
                            • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00C509A9
                            • CloseHandle.KERNEL32(?), ref: 00C509B8
                            • InterlockedExchange.KERNEL32(015EDE68,000001F6), ref: 00C509C8
                            • LeaveCriticalSection.KERNEL32(015EDE48), ref: 00C509CF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                            • String ID:
                            • API String ID: 3495660284-0
                            • Opcode ID: 47f6d0f275388115711cd2b2bfe75b2d68fbbf0db67dab7a0ff1625f6e124a47
                            • Instruction ID: 84a19d1258a9a68916deae3b0ca7a18b9379686b73cb6d6e4e72f7dd6169c455
                            • Opcode Fuzzy Hash: 47f6d0f275388115711cd2b2bfe75b2d68fbbf0db67dab7a0ff1625f6e124a47
                            • Instruction Fuzzy Hash: A9F01D32442503ABD7415BA4EEC8BDABB25BF01702F501029F205A08A6C77495B5CF94
                            APIs
                            • GetClientRect.USER32(?,?), ref: 00BE5D30
                            • GetWindowRect.USER32(?,?), ref: 00BE5D71
                            • ScreenToClient.USER32(?,?), ref: 00BE5D99
                            • GetClientRect.USER32(?,?), ref: 00BE5ED7
                            • GetWindowRect.USER32(?,?), ref: 00BE5EF8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Rect$Client$Window$Screen
                            • String ID:
                            • API String ID: 1296646539-0
                            • Opcode ID: 4356ca17a0fcf1f0e6032a6434d211e026732580228c0bf360fbd672def3f5c1
                            • Instruction ID: b2835d64f87b0ec5c523818c8935007cbca27dff1aa79e34462f25212f688262
                            • Opcode Fuzzy Hash: 4356ca17a0fcf1f0e6032a6434d211e026732580228c0bf360fbd672def3f5c1
                            • Instruction Fuzzy Hash: 5CB18B38A1078ADBDB24DFA9C4807EEB7F1FF48314F14841AE8A9D7650DB34AA51DB50
                            APIs
                            • __allrem.LIBCMT ref: 00C100BA
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C100D6
                            • __allrem.LIBCMT ref: 00C100ED
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C1010B
                            • __allrem.LIBCMT ref: 00C10122
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C10140
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                            • String ID:
                            • API String ID: 1992179935-0
                            • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                            • Instruction ID: 134dc4c25ccfdb2cd12188a09c656f3b194d81d5680a4d2a607a74df2c6923da
                            • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                            • Instruction Fuzzy Hash: A9810772600706ABE7249F69CC41BAB73E8AF46324F34413EF561D66C1E7B4DAC1AB50
                            APIs
                              • Part of subcall function 00C63149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00C6101C,00000000,?,?,00000000), ref: 00C63195
                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00C61DC0
                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00C61DE1
                            • WSAGetLastError.WSOCK32 ref: 00C61DF2
                            • inet_ntoa.WSOCK32(?), ref: 00C61E8C
                            • htons.WSOCK32(?,?,?,?,?), ref: 00C61EDB
                            • _strlen.LIBCMT ref: 00C61F35
                              • Part of subcall function 00C439E8: _strlen.LIBCMT ref: 00C439F2
                              • Part of subcall function 00BE6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00BFCF58,?,?,?), ref: 00BE6DBA
                              • Part of subcall function 00BE6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00BFCF58,?,?,?), ref: 00BE6DED
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                            • String ID:
                            • API String ID: 1923757996-0
                            • Opcode ID: 0c541ebcc84e7a6cfdbe8775ed68e62b7064e681c5603a6b5e366c0f6568885f
                            • Instruction ID: b6acc67333c4c6360c5f3930a5d4d309ecedcef56788fc97e1a6174fa5ce9699
                            • Opcode Fuzzy Hash: 0c541ebcc84e7a6cfdbe8775ed68e62b7064e681c5603a6b5e366c0f6568885f
                            • Instruction Fuzzy Hash: 3DA1E230504340AFC324DF65C895F2A77E5AF94318F58898CF9565B2E2CB31EE46CB92
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00C082D9,00C082D9,?,?,?,00C1644F,00000001,00000001,8BE85006), ref: 00C16258
                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00C1644F,00000001,00000001,8BE85006,?,?,?), ref: 00C162DE
                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00C163D8
                            • __freea.LIBCMT ref: 00C163E5
                              • Part of subcall function 00C13820: RtlAllocateHeap.NTDLL(00000000,?,00CB1444,?,00BFFDF5,?,?,00BEA976,00000010,00CB1440,00BE13FC,?,00BE13C6,?,00BE1129), ref: 00C13852
                            • __freea.LIBCMT ref: 00C163EE
                            • __freea.LIBCMT ref: 00C16413
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                            • String ID:
                            • API String ID: 1414292761-0
                            • Opcode ID: 69244297c2352e590324abc5ab45f2b09a877e8fef73af97f1333e0692d0a701
                            • Instruction ID: 3823f460bed1386a8d208170e29d113e4aa0c45c491e60c26dd32ba426393208
                            • Opcode Fuzzy Hash: 69244297c2352e590324abc5ab45f2b09a877e8fef73af97f1333e0692d0a701
                            • Instruction Fuzzy Hash: 7F51E172600216ABEB258F64CC81EEF7BAAEB46710F554229FD25D6150EB34DDC0F660
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C6C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C6B6AE,?,?), ref: 00C6C9B5
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6C9F1
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6CA68
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6CA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C6BCCA
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C6BD25
                            • RegCloseKey.ADVAPI32(00000000), ref: 00C6BD6A
                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00C6BD99
                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00C6BDF3
                            • RegCloseKey.ADVAPI32(?), ref: 00C6BDFF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                            • String ID:
                            • API String ID: 1120388591-0
                            • Opcode ID: 9c6d2eb1febc0d320859196ffad08447c0ad057295757b2118ead4ef119ebcaf
                            • Instruction ID: 0c9df1e62134bdc29fd8e348d526f8b0b562210d845a0034ba41088bee27dc99
                            • Opcode Fuzzy Hash: 9c6d2eb1febc0d320859196ffad08447c0ad057295757b2118ead4ef119ebcaf
                            • Instruction Fuzzy Hash: F1818170108241AFD724DF24C8D5E2ABBE5FF84348F14859CF5598B2A2DB31EE85CB92
                            APIs
                            • VariantInit.OLEAUT32(00000035), ref: 00C3F7B9
                            • SysAllocString.OLEAUT32(00000001), ref: 00C3F860
                            • VariantCopy.OLEAUT32(00C3FA64,00000000), ref: 00C3F889
                            • VariantClear.OLEAUT32(00C3FA64), ref: 00C3F8AD
                            • VariantCopy.OLEAUT32(00C3FA64,00000000), ref: 00C3F8B1
                            • VariantClear.OLEAUT32(?), ref: 00C3F8BB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearCopy$AllocInitString
                            • String ID:
                            • API String ID: 3859894641-0
                            • Opcode ID: 416ed960e8ce29084b2a048e5566427e048c998c4acedc5b388706b94146ee72
                            • Instruction ID: dde235dc793082029040005d8fc1c5dd10cc95a3ebe010b772b3428290aec952
                            • Opcode Fuzzy Hash: 416ed960e8ce29084b2a048e5566427e048c998c4acedc5b388706b94146ee72
                            • Instruction Fuzzy Hash: F6510635E20311BACF24AB66D895B3DB3E4EF45310F24986EE906DF291DB708C41CB96
                            APIs
                              • Part of subcall function 00BE7620: _wcslen.LIBCMT ref: 00BE7625
                              • Part of subcall function 00BE6B57: _wcslen.LIBCMT ref: 00BE6B6A
                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00C594E5
                            • _wcslen.LIBCMT ref: 00C59506
                            • _wcslen.LIBCMT ref: 00C5952D
                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00C59585
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$FileName$OpenSave
                            • String ID: X
                            • API String ID: 83654149-3081909835
                            • Opcode ID: 8bd49c58e1e26e5d95baf25d4643da8f789678dc5fb0a277c07a09e1cdb23553
                            • Instruction ID: 237977c561339183a066dbed782832a92fcaae1b232aad738b339242d4ccfcc3
                            • Opcode Fuzzy Hash: 8bd49c58e1e26e5d95baf25d4643da8f789678dc5fb0a277c07a09e1cdb23553
                            • Instruction Fuzzy Hash: 8AE1C275508340CFC724DF25C881A6AB7E4FF85314F1489ADF8999B2A2EB30DD49CB96
                            APIs
                              • Part of subcall function 00BF9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BF9BB2
                            • BeginPaint.USER32(?,?,?), ref: 00BF9241
                            • GetWindowRect.USER32(?,?), ref: 00BF92A5
                            • ScreenToClient.USER32(?,?), ref: 00BF92C2
                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00BF92D3
                            • EndPaint.USER32(?,?,?,?,?), ref: 00BF9321
                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00C371EA
                              • Part of subcall function 00BF9339: BeginPath.GDI32(00000000), ref: 00BF9357
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                            • String ID:
                            • API String ID: 3050599898-0
                            • Opcode ID: 964c795f4fe907f77709bd84090652abbcbb9279ff3fe116ecb5cac2a057d9d6
                            • Instruction ID: bc688c1f6fc11ab3b1e177eb5e3d2ea0dfa5368353d3ef90a5035ec024e7198f
                            • Opcode Fuzzy Hash: 964c795f4fe907f77709bd84090652abbcbb9279ff3fe116ecb5cac2a057d9d6
                            • Instruction Fuzzy Hash: 5241AC71504205AFD721DF24DCD4FBE7BE8EB55720F1402A9FAA8872A2C7319889DB61
                            APIs
                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 00C5080C
                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00C50847
                            • EnterCriticalSection.KERNEL32(?), ref: 00C50863
                            • LeaveCriticalSection.KERNEL32(?), ref: 00C508DC
                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00C508F3
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C50921
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                            • String ID:
                            • API String ID: 3368777196-0
                            • Opcode ID: e8130e52602f75dffc632264909887c4f911df1bd164a4b14755d0d164e00877
                            • Instruction ID: 8ce03ddb1d371a7182de7fc834ae5846ea540b4b7b7239153cfdeecb416e969c
                            • Opcode Fuzzy Hash: e8130e52602f75dffc632264909887c4f911df1bd164a4b14755d0d164e00877
                            • Instruction Fuzzy Hash: 51414975900206ABDF149F54DC85B6A77B8FF04310F1440A9EE04EB297D730DEA9DBA4
                            APIs
                            • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00C3F3AB,00000000,?,?,00000000,?,00C3682C,00000004,00000000,00000000), ref: 00C7824C
                            • EnableWindow.USER32(?,00000000), ref: 00C78272
                            • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00C782D1
                            • ShowWindow.USER32(?,00000004), ref: 00C782E5
                            • EnableWindow.USER32(?,00000001), ref: 00C7830B
                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00C7832F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Show$Enable$MessageSend
                            • String ID:
                            • API String ID: 642888154-0
                            • Opcode ID: e95b1b2eab4977da88f027021f9121d069665f4423a0ba81adeb0f9b1a6c34df
                            • Instruction ID: 85ee148449c30f36dccefa77e859c3852345b6218ee109dd616bd06b02ba4dea
                            • Opcode Fuzzy Hash: e95b1b2eab4977da88f027021f9121d069665f4423a0ba81adeb0f9b1a6c34df
                            • Instruction Fuzzy Hash: D2418334A41644AFDF15CF25D8DDBA87BE0BB0A715F188269EB1C4B273CB31A949CB50
                            APIs
                            • IsWindowVisible.USER32(?), ref: 00C44C95
                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00C44CB2
                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00C44CEA
                            • _wcslen.LIBCMT ref: 00C44D08
                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00C44D10
                            • _wcsstr.LIBVCRUNTIME ref: 00C44D1A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                            • String ID:
                            • API String ID: 72514467-0
                            • Opcode ID: 2d05725f1e0ca66be7ea3307306745900f7e9e1cc2585e696c1581dee72932d1
                            • Instruction ID: d511f735c6e1572d5ba1b5a95023171fc2746d9d3737c464dfef2c45eb3ac0eb
                            • Opcode Fuzzy Hash: 2d05725f1e0ca66be7ea3307306745900f7e9e1cc2585e696c1581dee72932d1
                            • Instruction Fuzzy Hash: D4212931604205BBEB195B39EC89F7F7BECEF45750F20407DF909CA191DA61CD4092A0
                            APIs
                              • Part of subcall function 00BE3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BE3A97,?,?,00BE2E7F,?,?,?,00000000), ref: 00BE3AC2
                            • _wcslen.LIBCMT ref: 00C5587B
                            • CoInitialize.OLE32(00000000), ref: 00C55995
                            • CoCreateInstance.OLE32(00C7FCF8,00000000,00000001,00C7FB68,?), ref: 00C559AE
                            • CoUninitialize.OLE32 ref: 00C559CC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 3172280962-24824748
                            • Opcode ID: 3b4789d357dc918a6862672cd706a4b478bd0135b63b66a3e0e4b778e3478ddc
                            • Instruction ID: a06fea0f250218b065aec4fa70ee75ef8059598cf096b01a4b8bd7426ddd338c
                            • Opcode Fuzzy Hash: 3b4789d357dc918a6862672cd706a4b478bd0135b63b66a3e0e4b778e3478ddc
                            • Instruction Fuzzy Hash: 03D187786047019FC714DF15C4A4A2ABBE1FF89711F14889DF8999B361CB31ED8ACB92
                            APIs
                              • Part of subcall function 00C40FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C40FCA
                              • Part of subcall function 00C40FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C40FD6
                              • Part of subcall function 00C40FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C40FE5
                              • Part of subcall function 00C40FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C40FEC
                              • Part of subcall function 00C40FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C41002
                            • GetLengthSid.ADVAPI32(?,00000000,00C41335), ref: 00C417AE
                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00C417BA
                            • HeapAlloc.KERNEL32(00000000), ref: 00C417C1
                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00C417DA
                            • GetProcessHeap.KERNEL32(00000000,00000000,00C41335), ref: 00C417EE
                            • HeapFree.KERNEL32(00000000), ref: 00C417F5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                            • String ID:
                            • API String ID: 3008561057-0
                            • Opcode ID: 52d9f6bc093901b218852cf228b2bd84cd2f941d1b9afc37e44eabc01f60c330
                            • Instruction ID: a793b3dab49cdfa896a3ea4ae09eba1dc7af893bb02f05dbc6fdd9dbdd452b59
                            • Opcode Fuzzy Hash: 52d9f6bc093901b218852cf228b2bd84cd2f941d1b9afc37e44eabc01f60c330
                            • Instruction Fuzzy Hash: 10118E31510206FFDB109FA4CC89BAE7BB9FB45355F184028F89597210D735AA84CB60
                            APIs
                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00C414FF
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00C41506
                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00C41515
                            • CloseHandle.KERNEL32(00000004), ref: 00C41520
                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C4154F
                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00C41563
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                            • String ID:
                            • API String ID: 1413079979-0
                            • Opcode ID: 48b958f2754f6b72738a3306f9533b4f770331689edc36bcf4961c2bcb44e24c
                            • Instruction ID: a858580284acec49ec7ca0ffb95990b9943cf5c37ea2a023d90a7a000ea096fb
                            • Opcode Fuzzy Hash: 48b958f2754f6b72738a3306f9533b4f770331689edc36bcf4961c2bcb44e24c
                            • Instruction Fuzzy Hash: 4D11297250120AABDF118F98DD89BDE7BA9FF48754F088019FE59A2060C3758EA0DB60
                            APIs
                            • GetLastError.KERNEL32(?,?,00C03379,00C02FE5), ref: 00C03390
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00C0339E
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00C033B7
                            • SetLastError.KERNEL32(00000000,?,00C03379,00C02FE5), ref: 00C03409
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: 63dde3824b417a87c0920326f80954c328708bfe84ee85788dd5b948e8d1d673
                            • Instruction ID: 6df72f847f175e9e7701a1fb300440fb97f0e84881afcb7246acab65001fd5c7
                            • Opcode Fuzzy Hash: 63dde3824b417a87c0920326f80954c328708bfe84ee85788dd5b948e8d1d673
                            • Instruction Fuzzy Hash: F201D432609351BEE72527B57CC576F2A9CEB063797200229F620861F0FF224F52E644
                            APIs
                            • GetLastError.KERNEL32(?,?,00C15686,00C23CD6,?,00000000,?,00C15B6A,?,?,?,?,?,00C0E6D1,?,00CA8A48), ref: 00C12D78
                            • _free.LIBCMT ref: 00C12DAB
                            • _free.LIBCMT ref: 00C12DD3
                            • SetLastError.KERNEL32(00000000,?,?,?,?,00C0E6D1,?,00CA8A48,00000010,00BE4F4A,?,?,00000000,00C23CD6), ref: 00C12DE0
                            • SetLastError.KERNEL32(00000000,?,?,?,?,00C0E6D1,?,00CA8A48,00000010,00BE4F4A,?,?,00000000,00C23CD6), ref: 00C12DEC
                            • _abort.LIBCMT ref: 00C12DF2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$_free$_abort
                            • String ID:
                            • API String ID: 3160817290-0
                            • Opcode ID: 9eb0818fab385669c631d31b26f88c3925103147c8befb0aff0367c7f3e4f15e
                            • Instruction ID: ad2f9217319911cd5f87d670e62b3eaf9efb8ea45ed966f47b9404161e62e441
                            • Opcode Fuzzy Hash: 9eb0818fab385669c631d31b26f88c3925103147c8befb0aff0367c7f3e4f15e
                            • Instruction Fuzzy Hash: 7AF0A43A6446012BC6223739FC46BDE2559ABC37B5F24041CF838921E2EE2489F2B260
                            APIs
                              • Part of subcall function 00BF9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BF9693
                              • Part of subcall function 00BF9639: SelectObject.GDI32(?,00000000), ref: 00BF96A2
                              • Part of subcall function 00BF9639: BeginPath.GDI32(?), ref: 00BF96B9
                              • Part of subcall function 00BF9639: SelectObject.GDI32(?,00000000), ref: 00BF96E2
                            • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00C78A4E
                            • LineTo.GDI32(?,00000003,00000000), ref: 00C78A62
                            • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00C78A70
                            • LineTo.GDI32(?,00000000,00000003), ref: 00C78A80
                            • EndPath.GDI32(?), ref: 00C78A90
                            • StrokePath.GDI32(?), ref: 00C78AA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                            • String ID:
                            • API String ID: 43455801-0
                            • Opcode ID: 4cf77c9ca0bec4b93444a851baf9869c0c73f34d933489574462db6686b9b1e7
                            • Instruction ID: d60bd87bd57efdd43e47f06e56760178bea56ab2974943c32e5120cd2586a6e0
                            • Opcode Fuzzy Hash: 4cf77c9ca0bec4b93444a851baf9869c0c73f34d933489574462db6686b9b1e7
                            • Instruction Fuzzy Hash: CB11097604014DFFDB129F90DC88FAE7F6DEB08350F048026BA199A1A1C7719E95DBA0
                            APIs
                            • GetDC.USER32(00000000), ref: 00C45218
                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00C45229
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C45230
                            • ReleaseDC.USER32(00000000,00000000), ref: 00C45238
                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00C4524F
                            • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00C45261
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CapsDevice$Release
                            • String ID:
                            • API String ID: 1035833867-0
                            • Opcode ID: 46f0057f6b4991e9d52f40ab7e5e919d78f4651e22d50f771be2068236f3070b
                            • Instruction ID: cd07aff674400d9ffcc0755463d0269012cc0fb4d7466d6b99b9ca62e8d23604
                            • Opcode Fuzzy Hash: 46f0057f6b4991e9d52f40ab7e5e919d78f4651e22d50f771be2068236f3070b
                            • Instruction Fuzzy Hash: 71014475E00715BBEB105BA59C89B5EBFB8FF48751F044069FA08A7281D6709900CBA0
                            APIs
                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00BE1BF4
                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00BE1BFC
                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00BE1C07
                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00BE1C12
                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00BE1C1A
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BE1C22
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Virtual
                            • String ID:
                            • API String ID: 4278518827-0
                            • Opcode ID: cc1f3da19b8a4e90eb150cf98719645ea90ba817793d2aee7eac7e4e64581743
                            • Instruction ID: 31d6f62146134f670f90085d9b6f96de414e467a4df1269724f252b090a251dc
                            • Opcode Fuzzy Hash: cc1f3da19b8a4e90eb150cf98719645ea90ba817793d2aee7eac7e4e64581743
                            • Instruction Fuzzy Hash: 84016CB090275A7DE3008F5A8C85B56FFA8FF19754F00411FA15C47941C7F5A864CBE5
                            APIs
                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00C4EB30
                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00C4EB46
                            • GetWindowThreadProcessId.USER32(?,?), ref: 00C4EB55
                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C4EB64
                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C4EB6E
                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C4EB75
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                            • String ID:
                            • API String ID: 839392675-0
                            • Opcode ID: 8f7387dd84e493461c464218381a73223b035c56141d2c27150450cb0506f068
                            • Instruction ID: bd64c22c8d1ff6038b42f37f934ed59ecdce72ecc3089faee723ee72d0873d33
                            • Opcode Fuzzy Hash: 8f7387dd84e493461c464218381a73223b035c56141d2c27150450cb0506f068
                            • Instruction Fuzzy Hash: 0FF05E7264015ABBE7215B629C8EFEF3E7CEFCAB11F00016CF615E1091D7A05A41CAB5
                            APIs
                            • GetClientRect.USER32(?), ref: 00C37452
                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 00C37469
                            • GetWindowDC.USER32(?), ref: 00C37475
                            • GetPixel.GDI32(00000000,?,?), ref: 00C37484
                            • ReleaseDC.USER32(?,00000000), ref: 00C37496
                            • GetSysColor.USER32(00000005), ref: 00C374B0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClientColorMessagePixelRectReleaseSendWindow
                            • String ID:
                            • API String ID: 272304278-0
                            • Opcode ID: 0705357d9d532680e0deda82dc36584fee5566c971749824e8f86b5077aab80d
                            • Instruction ID: 8de573388fab1d64ffdb6668730ac1b3b5f2780c8609e0ec95b3f6e19a510103
                            • Opcode Fuzzy Hash: 0705357d9d532680e0deda82dc36584fee5566c971749824e8f86b5077aab80d
                            • Instruction Fuzzy Hash: 4B016D31404216EFDB615F64DC88BAE7BB5FF04351F550168F92AA31A1CB312E91EF50
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C4187F
                            • UnloadUserProfile.USERENV(?,?), ref: 00C4188B
                            • CloseHandle.KERNEL32(?), ref: 00C41894
                            • CloseHandle.KERNEL32(?), ref: 00C4189C
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00C418A5
                            • HeapFree.KERNEL32(00000000), ref: 00C418AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                            • String ID:
                            • API String ID: 146765662-0
                            • Opcode ID: f1c2f96c6d790d79cf20759fb1377575037d1048d6663198e5836c01ec66a7c0
                            • Instruction ID: dbe30d86efe62c43e54434e61300cb5a0d71d901013228e074d2eb522bf5332e
                            • Opcode Fuzzy Hash: f1c2f96c6d790d79cf20759fb1377575037d1048d6663198e5836c01ec66a7c0
                            • Instruction Fuzzy Hash: 5AE0E536004102BBEB015FA1ED4CB4EBF39FF49B22B508228F22991470CB3294B0DF50
                            APIs
                              • Part of subcall function 00BE7620: _wcslen.LIBCMT ref: 00BE7625
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C4C6EE
                            • _wcslen.LIBCMT ref: 00C4C735
                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C4C79C
                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00C4C7CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ItemMenu$Info_wcslen$Default
                            • String ID: 0
                            • API String ID: 1227352736-4108050209
                            • Opcode ID: 7652973d89f93945dd963bb2c2ec1e7d513c8515158fe34857c87e888d967f0d
                            • Instruction ID: d36fbc3daaa7651d7cbecffdde5123ce04b8cd78245a95694254cd8e6ba82528
                            • Opcode Fuzzy Hash: 7652973d89f93945dd963bb2c2ec1e7d513c8515158fe34857c87e888d967f0d
                            • Instruction Fuzzy Hash: 0551DB716063419BD7949F29C8C5BABB7E8BF89314F080A2DF9A5D31F0DB60DA04DB52
                            APIs
                            • ShellExecuteExW.SHELL32(0000003C), ref: 00C6AEA3
                              • Part of subcall function 00BE7620: _wcslen.LIBCMT ref: 00BE7625
                            • GetProcessId.KERNEL32(00000000), ref: 00C6AF38
                            • CloseHandle.KERNEL32(00000000), ref: 00C6AF67
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CloseExecuteHandleProcessShell_wcslen
                            • String ID: <$@
                            • API String ID: 146682121-1426351568
                            • Opcode ID: 7f253d7cd85c0b24a0947c47b66f3516403ab76670eebe184dbdf15e0ee968a0
                            • Instruction ID: 1980bf2ec31eef6c3408cdee7690df30e91e7800ac1251ca4c83c61d9169b51f
                            • Opcode Fuzzy Hash: 7f253d7cd85c0b24a0947c47b66f3516403ab76670eebe184dbdf15e0ee968a0
                            • Instruction Fuzzy Hash: 69714970A00655DFCB24DF55D494A9EBBF0EF08314F048499E826AB3A2CB75EE45CF91
                            APIs
                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00C47206
                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00C4723C
                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00C4724D
                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00C472CF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$AddressCreateInstanceProc
                            • String ID: DllGetClassObject
                            • API String ID: 753597075-1075368562
                            • Opcode ID: d63fe6d96e66fe0e2c3fa4f37ac7de16c196c7e941674bf3c1729322bd4b9639
                            • Instruction ID: 10254be7ac9944424b9e0ff363f4ff51ab8252e3b72d49c40bfa76ef11e2bfa1
                            • Opcode Fuzzy Hash: d63fe6d96e66fe0e2c3fa4f37ac7de16c196c7e941674bf3c1729322bd4b9639
                            • Instruction Fuzzy Hash: E4416DB1A04205EFDB25CF64C884B9A7BA9FF44310F1481ADBD099F20AD7B0DA44CBA0
                            APIs
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C73E35
                            • IsMenu.USER32(?), ref: 00C73E4A
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C73E92
                            • DrawMenuBar.USER32 ref: 00C73EA5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Menu$Item$DrawInfoInsert
                            • String ID: 0
                            • API String ID: 3076010158-4108050209
                            • Opcode ID: a0cc1f14c6d989580b512390083cd78b693879f5b339c81b089013bf27a2b69c
                            • Instruction ID: cc9cd0810cf41517420d240f3526a72f0fc9f72c30e29490c1bb59e78e7bcf63
                            • Opcode Fuzzy Hash: a0cc1f14c6d989580b512390083cd78b693879f5b339c81b089013bf27a2b69c
                            • Instruction Fuzzy Hash: 74415975A01249EFDB10DF60D884EAEBBB9FF49354F04812AF919A7250D730AE44EF60
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C43CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C43CCA
                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00C41E66
                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00C41E79
                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00C41EA9
                              • Part of subcall function 00BE6B57: _wcslen.LIBCMT ref: 00BE6B6A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$_wcslen$ClassName
                            • String ID: ComboBox$ListBox
                            • API String ID: 2081771294-1403004172
                            • Opcode ID: 52bebefc75610412c00fdedd401947d42b1a5f948ea9c4306f6bc4a6960dbfef
                            • Instruction ID: f7ad35ee54f3a2ec3e06009094a05a6d04d5a3f2a03a3175d1f86b5dbb81efa5
                            • Opcode Fuzzy Hash: 52bebefc75610412c00fdedd401947d42b1a5f948ea9c4306f6bc4a6960dbfef
                            • Instruction Fuzzy Hash: 6F214775A00105BFDB14ABA5DC8ADFFBBB8EF41390B14412DFC65A31E1DB344E8A8620
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: HKEY_LOCAL_MACHINE$HKLM
                            • API String ID: 176396367-4004644295
                            • Opcode ID: 50dc6ec5a3e42143342688d3e796aa80fddd0e3432ff66b0b879821b8076136e
                            • Instruction ID: bd3a6bb7627c9bda033b25f77011084abf57edc9344c17657d4e9e97950b3c7a
                            • Opcode Fuzzy Hash: 50dc6ec5a3e42143342688d3e796aa80fddd0e3432ff66b0b879821b8076136e
                            • Instruction Fuzzy Hash: 5A31097360016A4BCB30DFACC8C01BF33915BA1754B494129ECA1AB346E670CF40F3A0
                            APIs
                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00C72F8D
                            • LoadLibraryW.KERNEL32(?), ref: 00C72F94
                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00C72FA9
                            • DestroyWindow.USER32(?), ref: 00C72FB1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$DestroyLibraryLoadWindow
                            • String ID: SysAnimate32
                            • API String ID: 3529120543-1011021900
                            • Opcode ID: c5d0135eb400fdb4a7928d37f00d171e650d7df440dfddb94f3969fd68fa5eb5
                            • Instruction ID: f82a7d28a985055655040b2af8d40f8b4b67077f0746a443a46ea3506a0eab25
                            • Opcode Fuzzy Hash: c5d0135eb400fdb4a7928d37f00d171e650d7df440dfddb94f3969fd68fa5eb5
                            • Instruction Fuzzy Hash: 3221CD72200225AFEF104FA4DC80FBB37BDEB59364F108628F968D2190D771DD919760
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00C04D1E,00C128E9,?,00C04CBE,00C128E9,00CA88B8,0000000C,00C04E15,00C128E9,00000002), ref: 00C04D8D
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00C04DA0
                            • FreeLibrary.KERNEL32(00000000,?,?,?,00C04D1E,00C128E9,?,00C04CBE,00C128E9,00CA88B8,0000000C,00C04E15,00C128E9,00000002,00000000), ref: 00C04DC3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: 0b23bac27331b9655416551d70d62f2bd5cf3aa0f6f16c63f70fbebb5ec67656
                            • Instruction ID: 948dbfdfcb5feac9a94f61a8dd048a31de5137e050ba63fdd1cd3821a49f95eb
                            • Opcode Fuzzy Hash: 0b23bac27331b9655416551d70d62f2bd5cf3aa0f6f16c63f70fbebb5ec67656
                            • Instruction Fuzzy Hash: D1F04F75A40209BBDB159F90DC89BAEBFB5EF44756F5400A8F909A22A0CB305A80DB95
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00BE4EDD,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4E9C
                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00BE4EAE
                            • FreeLibrary.KERNEL32(00000000,?,?,00BE4EDD,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4EC0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc
                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                            • API String ID: 145871493-3689287502
                            • Opcode ID: e613e5a61f8b264372436e33b1bc0fd6fe0d6e4509ac13e2e43312f646f1b5b2
                            • Instruction ID: 068cf2621e114a9f763123e766b8eb442c7d9b50a9ba7e25f2c31c6c3e93ee75
                            • Opcode Fuzzy Hash: e613e5a61f8b264372436e33b1bc0fd6fe0d6e4509ac13e2e43312f646f1b5b2
                            • Instruction Fuzzy Hash: 47E0CD36E015A35BD3311B266C58B6F66D8EFC1F62B050179FC08D2100DB64CD4185A0
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C23CDE,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4E62
                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00BE4E74
                            • FreeLibrary.KERNEL32(00000000,?,?,00C23CDE,?,00CB1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00BE4E87
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc
                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                            • API String ID: 145871493-1355242751
                            • Opcode ID: a0c662488c5528c9daf130274f6b674bf218e293a3e0f558420628079e83bbde
                            • Instruction ID: 9be4b8ee60df3c78d0c7b7fac3a3547809684c07af8b68d0c1b0d4721376fe90
                            • Opcode Fuzzy Hash: a0c662488c5528c9daf130274f6b674bf218e293a3e0f558420628079e83bbde
                            • Instruction Fuzzy Hash: D2D0C2329026A35747221B266C18F8F6A58EF89B113490178B808A2110CF20CD42C5D0
                            APIs
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C52C05
                            • DeleteFileW.KERNEL32(?), ref: 00C52C87
                            • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00C52C9D
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C52CAE
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C52CC0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: File$Delete$Copy
                            • String ID:
                            • API String ID: 3226157194-0
                            • Opcode ID: fde980aa90633d4f65fd30e77cea458f9a78e245614f5a7c7666ebf3a6978417
                            • Instruction ID: 51a5e816d2062046bc785c6fb78f07b714f996fff6d470edb59de46f33aa6289
                            • Opcode Fuzzy Hash: fde980aa90633d4f65fd30e77cea458f9a78e245614f5a7c7666ebf3a6978417
                            • Instruction Fuzzy Hash: CBB16075900119ABDF21DBA4CC85EDEB7BDEF09354F0040A6F909E7142EB30AA88DF65
                            APIs
                            • GetCurrentProcessId.KERNEL32 ref: 00C6A427
                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00C6A435
                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00C6A468
                            • CloseHandle.KERNEL32(?), ref: 00C6A63D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process$CloseCountersCurrentHandleOpen
                            • String ID:
                            • API String ID: 3488606520-0
                            • Opcode ID: d29b5fefdd503dc7c2bd5a466612c903856432fff695eede3a29c5807e65cc13
                            • Instruction ID: ae0715ac6360528b87ca003616e2e90c123a406c693cee8c1fc12ea28e305776
                            • Opcode Fuzzy Hash: d29b5fefdd503dc7c2bd5a466612c903856432fff695eede3a29c5807e65cc13
                            • Instruction Fuzzy Hash: BDA1C071604701AFD720DF25C882F2AB7E1AF84714F14885DF5AA9B392DBB0ED45CB92
                            APIs
                              • Part of subcall function 00C4DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C4CF22,?), ref: 00C4DDFD
                              • Part of subcall function 00C4DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C4CF22,?), ref: 00C4DE16
                              • Part of subcall function 00C4E199: GetFileAttributesW.KERNEL32(?,00C4CF95), ref: 00C4E19A
                            • lstrcmpiW.KERNEL32(?,?), ref: 00C4E473
                            • MoveFileW.KERNEL32(?,?), ref: 00C4E4AC
                            • _wcslen.LIBCMT ref: 00C4E5EB
                            • _wcslen.LIBCMT ref: 00C4E603
                            • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00C4E650
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                            • String ID:
                            • API String ID: 3183298772-0
                            • Opcode ID: 7fdfbdc80433c1098e3f2b7f00ff8c6dfea9f0d09ea855c39712dcf521e460c4
                            • Instruction ID: a045e9fcc28f443981de715829c0c9acc74f41728d6a64d7f104ac078cd955b5
                            • Opcode Fuzzy Hash: 7fdfbdc80433c1098e3f2b7f00ff8c6dfea9f0d09ea855c39712dcf521e460c4
                            • Instruction Fuzzy Hash: 8F5152B24083859BC724EB90D881ADF77ECBF84344F00492EF599D3191EF74A688CB66
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C6C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C6B6AE,?,?), ref: 00C6C9B5
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6C9F1
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6CA68
                              • Part of subcall function 00C6C998: _wcslen.LIBCMT ref: 00C6CA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C6BAA5
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C6BB00
                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00C6BB63
                            • RegCloseKey.ADVAPI32(?,?), ref: 00C6BBA6
                            • RegCloseKey.ADVAPI32(00000000), ref: 00C6BBB3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                            • String ID:
                            • API String ID: 826366716-0
                            • Opcode ID: 6f53f69b690d934723403445635adfabc50947fd848898969cfa208d2d0601db
                            • Instruction ID: 701fd40a46d7306f9dbed09fc43d0cf744a261ab9553ab7108cd448fe1c5876e
                            • Opcode Fuzzy Hash: 6f53f69b690d934723403445635adfabc50947fd848898969cfa208d2d0601db
                            • Instruction Fuzzy Hash: 8A619331208241AFD724DF54C4D0E2ABBE5FF84348F54859CF4998B2A2DB31ED85DB92
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 00C48BCD
                            • VariantClear.OLEAUT32 ref: 00C48C3E
                            • VariantClear.OLEAUT32 ref: 00C48C9D
                            • VariantClear.OLEAUT32(?), ref: 00C48D10
                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00C48D3B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Variant$Clear$ChangeInitType
                            • String ID:
                            • API String ID: 4136290138-0
                            • Opcode ID: 8661793f8b4ac87a662e3fa0d12dd77066daad202b3e58f7bf69cfa7e108559e
                            • Instruction ID: 3dab9338245fef5d17e54cb8a5b823ff44033a937bcfaa2e58d5a1988411040e
                            • Opcode Fuzzy Hash: 8661793f8b4ac87a662e3fa0d12dd77066daad202b3e58f7bf69cfa7e108559e
                            • Instruction Fuzzy Hash: B75158B5A0121AEFCB14CF68C894AAEB7F8FF89314B158559E919DB350E730E911CF90
                            APIs
                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00C58BAE
                            • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00C58BDA
                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00C58C32
                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00C58C57
                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00C58C5F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: PrivateProfile$SectionWrite$String
                            • String ID:
                            • API String ID: 2832842796-0
                            • Opcode ID: a8bd433fa2a0ed0d2cb33ff20c8564f83f470c6dbd175bd13ca8d1ed2930a56f
                            • Instruction ID: 95a77d699784cc80bf55a14d32a37cba150442332d1216a85d42324ccc393229
                            • Opcode Fuzzy Hash: a8bd433fa2a0ed0d2cb33ff20c8564f83f470c6dbd175bd13ca8d1ed2930a56f
                            • Instruction Fuzzy Hash: 26514B35A006199FCB15DF65C881E6EBBF5FF48314F088498E849AB362DB31ED95CB90
                            APIs
                            • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00C68F40
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00C68FD0
                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00C68FEC
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00C69032
                            • FreeLibrary.KERNEL32(00000000), ref: 00C69052
                              • Part of subcall function 00BFF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00C51043,?,753CE610), ref: 00BFF6E6
                              • Part of subcall function 00BFF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00C3FA64,00000000,00000000,?,?,00C51043,?,753CE610,?,00C3FA64), ref: 00BFF70D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                            • String ID:
                            • API String ID: 666041331-0
                            • Opcode ID: 81e0f42c01e70c7943217e82905abfc8f585c2c839025c6bfbd4e04ef712bc2b
                            • Instruction ID: a006eeb8844ce2fba019c7fabdb14666a7c1a16e83b628991bd0904d7f67e42b
                            • Opcode Fuzzy Hash: 81e0f42c01e70c7943217e82905abfc8f585c2c839025c6bfbd4e04ef712bc2b
                            • Instruction Fuzzy Hash: 21515B35600245DFCB20DF69C4D49ADBBF1FF49314B4481A8E81A9B362DB31EE89CB91
                            APIs
                            • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00C76C33
                            • SetWindowLongW.USER32(?,000000EC,?), ref: 00C76C4A
                            • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00C76C73
                            • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00C5AB79,00000000,00000000), ref: 00C76C98
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00C76CC7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Long$MessageSendShow
                            • String ID:
                            • API String ID: 3688381893-0
                            • Opcode ID: 35581b52b5f0c4671a9f460694c430d53d12583da26f33c6a470d3440ba31811
                            • Instruction ID: 1b2856a2e43285b899447c3be8e83f362173d2ecddcb093b20409d0bc913a1f2
                            • Opcode Fuzzy Hash: 35581b52b5f0c4671a9f460694c430d53d12583da26f33c6a470d3440ba31811
                            • Instruction Fuzzy Hash: CB41E635A04504AFD725CF39CC98FA97BA5EB09360F148268FCADA72E0C771EE41DA40
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: dbbb1921254d8d8521adf0e4add08d70085118d3e4ec23e31067a0e3744b087c
                            • Instruction ID: bd2dab2e30745d0d94e633c9e1d6a4e2ac6e9cd103660e8a3c208d7238bfd1fd
                            • Opcode Fuzzy Hash: dbbb1921254d8d8521adf0e4add08d70085118d3e4ec23e31067a0e3744b087c
                            • Instruction Fuzzy Hash: 4341FB36A00204AFCB24DF78C881A9DB7F5EF8A314F1545A9E615EB351D731EE51E780
                            APIs
                            • GetCursorPos.USER32(?), ref: 00BF9141
                            • ScreenToClient.USER32(00000000,?), ref: 00BF915E
                            • GetAsyncKeyState.USER32(00000001), ref: 00BF9183
                            • GetAsyncKeyState.USER32(00000002), ref: 00BF919D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AsyncState$ClientCursorScreen
                            • String ID:
                            • API String ID: 4210589936-0
                            • Opcode ID: d9088202dc2dcac579863e56229fc8f7b4e9a5da165d278719edb9e257920836
                            • Instruction ID: 31da242d5843de1e8c26ca26eb1f433c1ce261ca339da2d103b19da0f55e9d20
                            • Opcode Fuzzy Hash: d9088202dc2dcac579863e56229fc8f7b4e9a5da165d278719edb9e257920836
                            • Instruction Fuzzy Hash: 6B41607190850BFBDF159F64C844BFEB7B4FB05324F208369E529A3290C7306A54DB91
                            APIs
                            • GetInputState.USER32 ref: 00C538CB
                            • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00C53922
                            • TranslateMessage.USER32(?), ref: 00C5394B
                            • DispatchMessageW.USER32(?), ref: 00C53955
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C53966
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                            • String ID:
                            • API String ID: 2256411358-0
                            • Opcode ID: b760152b55f756ca9ef5e8f99eaa887b60c90333d56b566c6de9918ba77f97a1
                            • Instruction ID: ec95c8dcc54fef76fb748daa843d93bfb6b6a0d8af9af47a8d761fc924dbaf21
                            • Opcode Fuzzy Hash: b760152b55f756ca9ef5e8f99eaa887b60c90333d56b566c6de9918ba77f97a1
                            • Instruction Fuzzy Hash: 7A31EAB45043C69EEB35CB359858BBA37E4AB11382F48055DEC76820E0E7B597CCCB15
                            APIs
                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00C5C21E,00000000), ref: 00C5CF38
                            • InternetReadFile.WININET(?,00000000,?,?), ref: 00C5CF6F
                            • GetLastError.KERNEL32(?,00000000,?,?,?,00C5C21E,00000000), ref: 00C5CFB4
                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00C5C21E,00000000), ref: 00C5CFC8
                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00C5C21E,00000000), ref: 00C5CFF2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                            • String ID:
                            • API String ID: 3191363074-0
                            • Opcode ID: fc8c8f4b8c9926e60a2abf6d303fc0f3e25631593a8b5e1940bf82451d28bd76
                            • Instruction ID: c681890fd7b9af618b42cdd3f0d89c7f498b6f7c37d7198ee82f099e93c14481
                            • Opcode Fuzzy Hash: fc8c8f4b8c9926e60a2abf6d303fc0f3e25631593a8b5e1940bf82451d28bd76
                            • Instruction Fuzzy Hash: 06317F75600306AFDB24DFE5C8C4AAFBBF9EF14352B10456EF916D2111DB30AE889B64
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00C41915
                            • PostMessageW.USER32(00000001,00000201,00000001), ref: 00C419C1
                            • Sleep.KERNEL32(00000000,?,?,?), ref: 00C419C9
                            • PostMessageW.USER32(00000001,00000202,00000000), ref: 00C419DA
                            • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00C419E2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessagePostSleep$RectWindow
                            • String ID:
                            • API String ID: 3382505437-0
                            • Opcode ID: ab836db9d546b65871a7b11d3fd42ae74b2d6b95f885bc3f922aa21cc1c4cddb
                            • Instruction ID: 06a66cbd8d2a2fed7892ff5d18f7a625a80e99df179ec36bf19105c5e6540e6f
                            • Opcode Fuzzy Hash: ab836db9d546b65871a7b11d3fd42ae74b2d6b95f885bc3f922aa21cc1c4cddb
                            • Instruction Fuzzy Hash: 1931AD71A0021AEFCB04CFA8C999BDE3BB5FB14315F144229FD65AB2D1C7709A94CB90
                            APIs
                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00C75745
                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00C7579D
                            • _wcslen.LIBCMT ref: 00C757AF
                            • _wcslen.LIBCMT ref: 00C757BA
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C75816
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$_wcslen
                            • String ID:
                            • API String ID: 763830540-0
                            • Opcode ID: 51f920fb2bd3cc843d2c75b648850ed2eaa59f2e56206b40137b5b15f857cf89
                            • Instruction ID: 212cfbffc7b8419e448245bb298a063eff7b683c69a13e4f971f215ecd19eaef
                            • Opcode Fuzzy Hash: 51f920fb2bd3cc843d2c75b648850ed2eaa59f2e56206b40137b5b15f857cf89
                            • Instruction Fuzzy Hash: D42165759046189ADB209F65CC85AEE7BBCFF04764F10C21AFA2DEA1C0D7B19A85CF50
                            APIs
                            • IsWindow.USER32(00000000), ref: 00C60951
                            • GetForegroundWindow.USER32 ref: 00C60968
                            • GetDC.USER32(00000000), ref: 00C609A4
                            • GetPixel.GDI32(00000000,?,00000003), ref: 00C609B0
                            • ReleaseDC.USER32(00000000,00000003), ref: 00C609E8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$ForegroundPixelRelease
                            • String ID:
                            • API String ID: 4156661090-0
                            • Opcode ID: 30c5372c65ae88b8e3cd56794b7093d12854b6d866ea9b44722a8e5f60959494
                            • Instruction ID: 9865b7d5c0cd44c15f2c1af3b02783c3de0402ac1fcb9c496d44e5f3cb0bb536
                            • Opcode Fuzzy Hash: 30c5372c65ae88b8e3cd56794b7093d12854b6d866ea9b44722a8e5f60959494
                            • Instruction Fuzzy Hash: 0E218135600204AFD714EF65D889BAFBBE5EF44701F14846CF85AA7352DB70AD44DB50
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 00C1CDC6
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00C1CDE9
                              • Part of subcall function 00C13820: RtlAllocateHeap.NTDLL(00000000,?,00CB1444,?,00BFFDF5,?,?,00BEA976,00000010,00CB1440,00BE13FC,?,00BE13C6,?,00BE1129), ref: 00C13852
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C1CE0F
                            • _free.LIBCMT ref: 00C1CE22
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00C1CE31
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                            • String ID:
                            • API String ID: 336800556-0
                            • Opcode ID: cc3408ce140dde3bf928092c20f8b9a203c5f805b8df099f815d5e79d6b60dda
                            • Instruction ID: e90152dec0c333abc5f8f73aaad9f034811c5cfa54b90a9110b016977993822e
                            • Opcode Fuzzy Hash: cc3408ce140dde3bf928092c20f8b9a203c5f805b8df099f815d5e79d6b60dda
                            • Instruction Fuzzy Hash: E60184726412157F232116BA6CC9EFF696DEFC7BA1315012DF919C7201EA618E91A1B0
                            APIs
                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BF9693
                            • SelectObject.GDI32(?,00000000), ref: 00BF96A2
                            • BeginPath.GDI32(?), ref: 00BF96B9
                            • SelectObject.GDI32(?,00000000), ref: 00BF96E2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ObjectSelect$BeginCreatePath
                            • String ID:
                            • API String ID: 3225163088-0
                            • Opcode ID: 31d073545e6983b691a761704883194d6ee03dc67cb345546aa76e0c1c1b9264
                            • Instruction ID: ee88276f64d5b5fdb76d6c98a6752f7013b4b99d7a049e27141b4baf4a6044c6
                            • Opcode Fuzzy Hash: 31d073545e6983b691a761704883194d6ee03dc67cb345546aa76e0c1c1b9264
                            • Instruction Fuzzy Hash: 10217F70C02349EBDB119F24EC647BD3BA8FB10315F54435AF914A71B0D3709899CB94
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: 4d10cbe7d8eff921487dfb5170df8c9dfa0871acd30ca2baa4a6d88533d80bd8
                            • Instruction ID: 67cf4cee1791b8ab41ab4f4570ce8572aefa6923daed22f59efc0f9002aa777a
                            • Opcode Fuzzy Hash: 4d10cbe7d8eff921487dfb5170df8c9dfa0871acd30ca2baa4a6d88533d80bd8
                            • Instruction Fuzzy Hash: 8101B9A1651605BBE21855119E82FBB735CBB21394F048035FD189A282F760EE52D2B1
                            APIs
                            • GetLastError.KERNEL32(?,?,?,00C0F2DE,00C13863,00CB1444,?,00BFFDF5,?,?,00BEA976,00000010,00CB1440,00BE13FC,?,00BE13C6), ref: 00C12DFD
                            • _free.LIBCMT ref: 00C12E32
                            • _free.LIBCMT ref: 00C12E59
                            • SetLastError.KERNEL32(00000000,00BE1129), ref: 00C12E66
                            • SetLastError.KERNEL32(00000000,00BE1129), ref: 00C12E6F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$_free
                            • String ID:
                            • API String ID: 3170660625-0
                            • Opcode ID: ae1c72aea0495d81c09131cab607b45eecc97455b973e635fe4ab0e8eb329f6f
                            • Instruction ID: a75ca0e1b8455c7a843d9b85615f89ecff2f613f75ebd20ac6cee85162d1d7b8
                            • Opcode Fuzzy Hash: ae1c72aea0495d81c09131cab607b45eecc97455b973e635fe4ab0e8eb329f6f
                            • Instruction Fuzzy Hash: 9D01F93A24560067C71227356C85FEF1559AFC3376F204028F439A22D3EB348DF27120
                            APIs
                            • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?,?,?,00C4035E), ref: 00C4002B
                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?,?), ref: 00C40046
                            • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?,?), ref: 00C40054
                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?), ref: 00C40064
                            • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C3FF41,80070057,?,?), ref: 00C40070
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: From$Prog$FreeStringTasklstrcmpi
                            • String ID:
                            • API String ID: 3897988419-0
                            • Opcode ID: 854fbd77b0caf667b14fc19fc7a157c9fb0ea7503ca9a8a2203a662c285be0d8
                            • Instruction ID: 70597f7ffc3660b325a1b4e23caa8b0b05f8f34bf60ac42520c62694a8e2c81c
                            • Opcode Fuzzy Hash: 854fbd77b0caf667b14fc19fc7a157c9fb0ea7503ca9a8a2203a662c285be0d8
                            • Instruction Fuzzy Hash: CB018F72640205BFDB204F69DC48BAE7BADFB44752F244128FE09D2210D775DE808BA0
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?), ref: 00C4E997
                            • QueryPerformanceFrequency.KERNEL32(?), ref: 00C4E9A5
                            • Sleep.KERNEL32(00000000), ref: 00C4E9AD
                            • QueryPerformanceCounter.KERNEL32(?), ref: 00C4E9B7
                            • Sleep.KERNEL32 ref: 00C4E9F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: PerformanceQuery$CounterSleep$Frequency
                            • String ID:
                            • API String ID: 2833360925-0
                            • Opcode ID: 02a986aed6aa993bd07f5bc9fd46e22d84f9e42649aae09bac5dc6a7a08af60d
                            • Instruction ID: 0cb0601998e234a487a6fa45ec445d0c373798c4733e2a6cd536ddda69860a81
                            • Opcode Fuzzy Hash: 02a986aed6aa993bd07f5bc9fd46e22d84f9e42649aae09bac5dc6a7a08af60d
                            • Instruction Fuzzy Hash: F6016D31C0152ADBCF00AFE5DC89BEDBB78FF18310F41055AE902B2191CB309691C761
                            APIs
                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C41114
                            • GetLastError.KERNEL32(?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C41120
                            • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C4112F
                            • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00C40B9B,?,?,?), ref: 00C41136
                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C4114D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 842720411-0
                            • Opcode ID: 49db687e67500d964e2a887bbe3e70553195288508ca53bfba50304ebe8c960c
                            • Instruction ID: e57c405d68be21f6bd9868c4b10e63babb038c8e93fa934c25584b30c0ab064e
                            • Opcode Fuzzy Hash: 49db687e67500d964e2a887bbe3e70553195288508ca53bfba50304ebe8c960c
                            • Instruction Fuzzy Hash: 4E016975200206BFDB114FA4DC89B6E3B6EFF893A1B240428FA49C3360DA31DD808A60
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C40FCA
                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C40FD6
                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C40FE5
                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C40FEC
                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C41002
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 7a09fd5650830578f5a6306d31648f2bd1807018e396e1275b940bf4782d4027
                            • Instruction ID: 0310d9da6e25aa0ace15ac2abe8b4bb76b838e497caa2f05e37dad7d094271dc
                            • Opcode Fuzzy Hash: 7a09fd5650830578f5a6306d31648f2bd1807018e396e1275b940bf4782d4027
                            • Instruction Fuzzy Hash: 01F04935200302AFDB214FA4AC89F5A3FADFF89762F544428FA49D6251CA70DC908A60
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C4102A
                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C41036
                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C41045
                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C4104C
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C41062
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 135a21813f884bd13819b145e77e879bce798ebad9c99d788a0b5eea4fd4aa42
                            • Instruction ID: 9034c0adb334ca084e6a88b05fe405d7dea6c93e5d94fbd6c00e43d099e1f87b
                            • Opcode Fuzzy Hash: 135a21813f884bd13819b145e77e879bce798ebad9c99d788a0b5eea4fd4aa42
                            • Instruction Fuzzy Hash: 2DF06D35200302EBDB215FA4EC89F5A3BADFF89761F140428FE49D7250CA70D9908A60
                            APIs
                            • CloseHandle.KERNEL32(?,?,?,?,00C5017D,?,00C532FC,?,00000001,00C22592,?), ref: 00C50324
                            • CloseHandle.KERNEL32(?,?,?,?,00C5017D,?,00C532FC,?,00000001,00C22592,?), ref: 00C50331
                            • CloseHandle.KERNEL32(?,?,?,?,00C5017D,?,00C532FC,?,00000001,00C22592,?), ref: 00C5033E
                            • CloseHandle.KERNEL32(?,?,?,?,00C5017D,?,00C532FC,?,00000001,00C22592,?), ref: 00C5034B
                            • CloseHandle.KERNEL32(?,?,?,?,00C5017D,?,00C532FC,?,00000001,00C22592,?), ref: 00C50358
                            • CloseHandle.KERNEL32(?,?,?,?,00C5017D,?,00C532FC,?,00000001,00C22592,?), ref: 00C50365
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CloseHandle
                            • String ID:
                            • API String ID: 2962429428-0
                            • Opcode ID: 9825ba0547688a16bad79577186eb04d03543594da7e16cf59c11f778343d329
                            • Instruction ID: c373249d73083446fbabc050880d571c5a6125c14257b9912f65160eebcaad6e
                            • Opcode Fuzzy Hash: 9825ba0547688a16bad79577186eb04d03543594da7e16cf59c11f778343d329
                            • Instruction Fuzzy Hash: BF01A276800B159FC7309F66D880416F7F5BF503163258A3FD1A692931C371AA98CF84
                            APIs
                            • _free.LIBCMT ref: 00C1D752
                              • Part of subcall function 00C129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000), ref: 00C129DE
                              • Part of subcall function 00C129C8: GetLastError.KERNEL32(00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000,00000000), ref: 00C129F0
                            • _free.LIBCMT ref: 00C1D764
                            • _free.LIBCMT ref: 00C1D776
                            • _free.LIBCMT ref: 00C1D788
                            • _free.LIBCMT ref: 00C1D79A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 726eba148de05042775aa96de5b01e3dae2591bfd4a8cc8217dadef622463779
                            • Instruction ID: 04013d6bbbc786fafb902651152c3d00518902f5f61e5ebd97cab7eb29fa39be
                            • Opcode Fuzzy Hash: 726eba148de05042775aa96de5b01e3dae2591bfd4a8cc8217dadef622463779
                            • Instruction Fuzzy Hash: 78F06232500204AB8621EB68F9C5E9A77DDBB07720F940C05F059DB585CB34FCD0A6E0
                            APIs
                            • GetDlgItem.USER32(?,000003E9), ref: 00C45C58
                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00C45C6F
                            • MessageBeep.USER32(00000000), ref: 00C45C87
                            • KillTimer.USER32(?,0000040A), ref: 00C45CA3
                            • EndDialog.USER32(?,00000001), ref: 00C45CBD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                            • String ID:
                            • API String ID: 3741023627-0
                            • Opcode ID: 20485cec726b7b94a88a8e751c8df12db0945e58dc384de796d72759315d53f6
                            • Instruction ID: 0db47e601c5fb76078888c100b7acc3e2448b14d2319c121a3edc389e2d96edd
                            • Opcode Fuzzy Hash: 20485cec726b7b94a88a8e751c8df12db0945e58dc384de796d72759315d53f6
                            • Instruction Fuzzy Hash: 73018630500B05ABEB315B20DDCEFAA77B8BB04B45F00055DB597A10E1DBF0AA848B91
                            APIs
                            • _free.LIBCMT ref: 00C122BE
                              • Part of subcall function 00C129C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000), ref: 00C129DE
                              • Part of subcall function 00C129C8: GetLastError.KERNEL32(00000000,?,00C1D7D1,00000000,00000000,00000000,00000000,?,00C1D7F8,00000000,00000007,00000000,?,00C1DBF5,00000000,00000000), ref: 00C129F0
                            • _free.LIBCMT ref: 00C122D0
                            • _free.LIBCMT ref: 00C122E3
                            • _free.LIBCMT ref: 00C122F4
                            • _free.LIBCMT ref: 00C12305
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 40319a79f8462705a30db2d85363647710a36e970328480457703e06e17c94e5
                            • Instruction ID: f4963edf42d89b4be4b12bd3013632d5cc850791cc90ef7616c139ad4169feff
                            • Opcode Fuzzy Hash: 40319a79f8462705a30db2d85363647710a36e970328480457703e06e17c94e5
                            • Instruction Fuzzy Hash: 67F05E799001208B8A12AF98BC41BAD3B64F71A770F54070AF810DB3B1C73449B1BFE5
                            APIs
                            • EndPath.GDI32(?), ref: 00BF95D4
                            • StrokeAndFillPath.GDI32(?,?,00C371F7,00000000,?,?,?), ref: 00BF95F0
                            • SelectObject.GDI32(?,00000000), ref: 00BF9603
                            • DeleteObject.GDI32 ref: 00BF9616
                            • StrokePath.GDI32(?), ref: 00BF9631
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Path$ObjectStroke$DeleteFillSelect
                            • String ID:
                            • API String ID: 2625713937-0
                            • Opcode ID: 7a0868fefe0dbfda59e97646ed522f77adcd438939d14941f80dbc9258f83577
                            • Instruction ID: 067ff3053a81d6192d093c5c64f4c87997aa8fb2742012910b0806cca7361f2f
                            • Opcode Fuzzy Hash: 7a0868fefe0dbfda59e97646ed522f77adcd438939d14941f80dbc9258f83577
                            • Instruction Fuzzy Hash: AEF03C30805349EBDB225F65ED6C7BC3BA5EB10322F588358F929960F0C7308995DF60
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: __freea$_free
                            • String ID: a/p$am/pm
                            • API String ID: 3432400110-3206640213
                            • Opcode ID: 1d25bcedfa4f824bb411704f5c4885dc9157366ee1158bb409f663ccf019288c
                            • Instruction ID: 69852697785faee297c3b3e8dbc95fdaa0acacd02cc4d4a693ce92ebcfd28714
                            • Opcode Fuzzy Hash: 1d25bcedfa4f824bb411704f5c4885dc9157366ee1158bb409f663ccf019288c
                            • Instruction Fuzzy Hash: 28D1DF31900246DACB249F68C845BFEB7B1EF07300F6C4159EF219B664D2799EC1EB91
                            APIs
                              • Part of subcall function 00C00242: EnterCriticalSection.KERNEL32(00CB070C,00CB1884,?,?,00BF198B,00CB2518,?,?,?,00BE12F9,00000000), ref: 00C0024D
                              • Part of subcall function 00C00242: LeaveCriticalSection.KERNEL32(00CB070C,?,00BF198B,00CB2518,?,?,?,00BE12F9,00000000), ref: 00C0028A
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C000A3: __onexit.LIBCMT ref: 00C000A9
                            • __Init_thread_footer.LIBCMT ref: 00C67BFB
                              • Part of subcall function 00C001F8: EnterCriticalSection.KERNEL32(00CB070C,?,?,00BF8747,00CB2514), ref: 00C00202
                              • Part of subcall function 00C001F8: LeaveCriticalSection.KERNEL32(00CB070C,?,00BF8747,00CB2514), ref: 00C00235
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                            • String ID: 5$G$Variable must be of type 'Object'.
                            • API String ID: 535116098-3733170431
                            • Opcode ID: 2e4a99e49181d400b0f8dd6e39ef08310cbfe11940171dad818f99b2f190764e
                            • Instruction ID: c5dfd8ffabb65e767984eb12565c108dc1263d6fcad22da91cca2a2a31450d0e
                            • Opcode Fuzzy Hash: 2e4a99e49181d400b0f8dd6e39ef08310cbfe11940171dad818f99b2f190764e
                            • Instruction Fuzzy Hash: F7918C70A04209EFCB24EF54D8D19BDB7B1FF44308F108A99F8169B292DB31AE45DB51
                            APIs
                              • Part of subcall function 00C4B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C421D0,?,?,00000034,00000800,?,00000034), ref: 00C4B42D
                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00C42760
                              • Part of subcall function 00C4B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C421FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00C4B3F8
                              • Part of subcall function 00C4B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00C4B355
                              • Part of subcall function 00C4B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00C42194,00000034,?,?,00001004,00000000,00000000), ref: 00C4B365
                              • Part of subcall function 00C4B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00C42194,00000034,?,?,00001004,00000000,00000000), ref: 00C4B37B
                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C427CD
                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C4281A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                            • String ID: @
                            • API String ID: 4150878124-2766056989
                            • Opcode ID: bf085b7d26f1133d92216f626052483f07d8cd285d7cf99ef7d2a297768c79cd
                            • Instruction ID: a49d5d75d97e5298bdf487862fa5092f3e92533db8f9511c41d8659c52e4498a
                            • Opcode Fuzzy Hash: bf085b7d26f1133d92216f626052483f07d8cd285d7cf99ef7d2a297768c79cd
                            • Instruction Fuzzy Hash: 94411D76900218AFDB10DFA4CD86BDEBBB8BF05700F104099FA55B7191DB70AE85DB61
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00C11769
                            • _free.LIBCMT ref: 00C11834
                            • _free.LIBCMT ref: 00C1183E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free$FileModuleName
                            • String ID: C:\Users\user\Desktop\file.exe
                            • API String ID: 2506810119-1957095476
                            • Opcode ID: 658976c1faa4a4fd54ef9c19a32f4b2ad2001b8a8a9f0ef5c2e4f3d672edddf2
                            • Instruction ID: f08395ccdf7b4b3aaf13d43e405dbba30145ee5a1cf2c1e41167adaddebad5eb
                            • Opcode Fuzzy Hash: 658976c1faa4a4fd54ef9c19a32f4b2ad2001b8a8a9f0ef5c2e4f3d672edddf2
                            • Instruction Fuzzy Hash: 7E31A075A00218EFDB21DF99D881EDEBBFCEB86310F58416AFD1497251D6748E80EB90
                            APIs
                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00C4C306
                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00C4C34C
                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00CB1990,015F5C28), ref: 00C4C395
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Menu$Delete$InfoItem
                            • String ID: 0
                            • API String ID: 135850232-4108050209
                            • Opcode ID: 9bf3dbd273d6eb08b40a7e1f0e306f9e438d1318924d84d432d459af61e7ed1b
                            • Instruction ID: 616814c92264a3b83382dbe849c89e1e3afec596fac1b668054eae530ba412ae
                            • Opcode Fuzzy Hash: 9bf3dbd273d6eb08b40a7e1f0e306f9e438d1318924d84d432d459af61e7ed1b
                            • Instruction Fuzzy Hash: 01419F312053029FD760DF25D8C4B9ABBE8BF85310F00865DF9A5972A1D770E904DB62
                            APIs
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00C7CC08,00000000,?,?,?,?), ref: 00C744AA
                            • GetWindowLongW.USER32 ref: 00C744C7
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C744D7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Long
                            • String ID: SysTreeView32
                            • API String ID: 847901565-1698111956
                            • Opcode ID: 3537ff07fecf6f973c3b2f696d00efd1086429cb5d2eae9e51abbdf26a6c5a0e
                            • Instruction ID: 84165356bc6cac9176d7a563d71ec953ef25bab26dfc5fee8f0de2a4a5291866
                            • Opcode Fuzzy Hash: 3537ff07fecf6f973c3b2f696d00efd1086429cb5d2eae9e51abbdf26a6c5a0e
                            • Instruction Fuzzy Hash: 2C318F31210205AFDB258E78DC85BEA77A9EB08334F208715F979921E0DB70ED509750
                            APIs
                              • Part of subcall function 00C6335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00C63077,?,?), ref: 00C63378
                            • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00C6307A
                            • _wcslen.LIBCMT ref: 00C6309B
                            • htons.WSOCK32(00000000,?,?,00000000), ref: 00C63106
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                            • String ID: 255.255.255.255
                            • API String ID: 946324512-2422070025
                            • Opcode ID: 9f62bc792d5d56891b386225441d1ac274990406023bae2965e293ed78686265
                            • Instruction ID: 7f7ac8a605293a3f2ff3b49c9e730d36bcc76fcd8ddc80e497d27ed281980db8
                            • Opcode Fuzzy Hash: 9f62bc792d5d56891b386225441d1ac274990406023bae2965e293ed78686265
                            • Instruction Fuzzy Hash: 9031C4356042819FCB20CF69C5C5E6A77E0EF55318F248059E9258B392D732DF85C761
                            APIs
                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00C73F40
                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00C73F54
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C73F78
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$Window
                            • String ID: SysMonthCal32
                            • API String ID: 2326795674-1439706946
                            • Opcode ID: a56308295873f99eb57cf0b8fb5188f9ea44a0fbe78e6bb4c670d471ae0453c6
                            • Instruction ID: fd60c93ac9a82e7a98bf9bd725d91673fa06b3dd73ea66e53af81f77ad629c49
                            • Opcode Fuzzy Hash: a56308295873f99eb57cf0b8fb5188f9ea44a0fbe78e6bb4c670d471ae0453c6
                            • Instruction Fuzzy Hash: 1B21AD32600259BFDF118E90CC86FEE3B79EB48754F114254FA196B1D0D6B1A9509B90
                            APIs
                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00C74705
                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00C74713
                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00C7471A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$DestroyWindow
                            • String ID: msctls_updown32
                            • API String ID: 4014797782-2298589950
                            • Opcode ID: dba6817af4b313fd5906aeda9444e93a39add5d7f2da8756f81b63513c97f938
                            • Instruction ID: 1519bed0f8565a10d09230b030fb54f661704614c472070fadb746bea9b38fba
                            • Opcode Fuzzy Hash: dba6817af4b313fd5906aeda9444e93a39add5d7f2da8756f81b63513c97f938
                            • Instruction Fuzzy Hash: 042190B5600209AFDB14DF64DCD1EAB37ADEB8A3A4B044159FA149B251CB30ED11CA60
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                            • API String ID: 176396367-2734436370
                            • Opcode ID: ef795e0ffd2fc4e5ea1a0de57473875fe34d0f20707870173a1428481fa359eb
                            • Instruction ID: 22947ca73e43204290aadb06782b4c89a305f4c4c1d6112190a66994bf4fde0d
                            • Opcode Fuzzy Hash: ef795e0ffd2fc4e5ea1a0de57473875fe34d0f20707870173a1428481fa359eb
                            • Instruction Fuzzy Hash: 53215B7220413166C331AB25EC02FF773D8FF91320F10803AF96997081EB719E45D295
                            APIs
                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00C73840
                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00C73850
                            • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00C73876
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$MoveWindow
                            • String ID: Listbox
                            • API String ID: 3315199576-2633736733
                            • Opcode ID: 1c39e7ad6522c1c427f2bf970c235211f623e976edff28482535b1292faa5fc9
                            • Instruction ID: 6e844a09369ef2b7f354ddbb7de02ec9c47e069ed1ac625b90b62b8b71d9dc6f
                            • Opcode Fuzzy Hash: 1c39e7ad6522c1c427f2bf970c235211f623e976edff28482535b1292faa5fc9
                            • Instruction Fuzzy Hash: B221C272600119BBEF118F54CC85FBB376EEF89754F11C125F9189B190C672DD5297A0
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 00C54A08
                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00C54A5C
                            • SetErrorMode.KERNEL32(00000000,?,?,00C7CC08), ref: 00C54AD0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$InformationVolume
                            • String ID: %lu
                            • API String ID: 2507767853-685833217
                            • Opcode ID: 9ecad0d46d56a77d256e89dd9fc8caff26b24990e6e48f88ba01f325acd75cbf
                            • Instruction ID: 2771fb1d53cf89cb62bb35c8fcd72e5347838c57b5530c5c710e226504e1d44a
                            • Opcode Fuzzy Hash: 9ecad0d46d56a77d256e89dd9fc8caff26b24990e6e48f88ba01f325acd75cbf
                            • Instruction Fuzzy Hash: 48314F75A00109AFDB10DF64C985EAE7BF8EF08308F1480A9F909DB252D771EE85DB61
                            APIs
                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00C7424F
                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00C74264
                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00C74271
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: msctls_trackbar32
                            • API String ID: 3850602802-1010561917
                            • Opcode ID: 2660f5060971f8be5a3c8e3121e6d5b32f029363d76bfe1a35e0a8ebf0c477e9
                            • Instruction ID: 1eaffbca9efd388d42fbb7ec9f1befeb0576535e7d5ef9264765d73d211c55d4
                            • Opcode Fuzzy Hash: 2660f5060971f8be5a3c8e3121e6d5b32f029363d76bfe1a35e0a8ebf0c477e9
                            • Instruction Fuzzy Hash: C411E331240248BFEF205E69CC46FAB3BACEF95B54F114524FA69E2091D371DC619B10
                            APIs
                              • Part of subcall function 00BE6B57: _wcslen.LIBCMT ref: 00BE6B6A
                              • Part of subcall function 00C42DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00C42DC5
                              • Part of subcall function 00C42DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C42DD6
                              • Part of subcall function 00C42DA7: GetCurrentThreadId.KERNEL32 ref: 00C42DDD
                              • Part of subcall function 00C42DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00C42DE4
                            • GetFocus.USER32 ref: 00C42F78
                              • Part of subcall function 00C42DEE: GetParent.USER32(00000000), ref: 00C42DF9
                            • GetClassNameW.USER32(?,?,00000100), ref: 00C42FC3
                            • EnumChildWindows.USER32(?,00C4303B), ref: 00C42FEB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                            • String ID: %s%d
                            • API String ID: 1272988791-1110647743
                            • Opcode ID: 078283d540e6d27f5544ce70542a915ad32694f49142332df84e605a09d634f2
                            • Instruction ID: f670417d42e809201935fcdb7b311717003675e6ed4e1419359c1619d0f2e509
                            • Opcode Fuzzy Hash: 078283d540e6d27f5544ce70542a915ad32694f49142332df84e605a09d634f2
                            • Instruction Fuzzy Hash: A51172716002456BCF157F758CC6FED37AABF94314F0480B9BD099B152DE709A49DB60
                            APIs
                            • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00C758C1
                            • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00C758EE
                            • DrawMenuBar.USER32(?), ref: 00C758FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Menu$InfoItem$Draw
                            • String ID: 0
                            • API String ID: 3227129158-4108050209
                            • Opcode ID: 499ebc7db1b8dc98f299c6bd056e2e85425d7b8d1342b9cad7fb9fce802240d4
                            • Instruction ID: 194388dbad9f0ce97444f3d50c29938288218251607de51db8e087efee8b63f3
                            • Opcode Fuzzy Hash: 499ebc7db1b8dc98f299c6bd056e2e85425d7b8d1342b9cad7fb9fce802240d4
                            • Instruction Fuzzy Hash: D8016D31500219EFDB619F11DC84BAEBBB4FF45360F10C099E94DD6151DB718A85EF21
                            APIs
                            • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00C3D3BF
                            • FreeLibrary.KERNEL32 ref: 00C3D3E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: AddressFreeLibraryProc
                            • String ID: GetSystemWow64DirectoryW$X64
                            • API String ID: 3013587201-2590602151
                            • Opcode ID: 0c91518bd71cb4168f1a40ad0db03d34d8bc49f97cdfd37d687d45c23b39c465
                            • Instruction ID: 93ba23c384a7d5574c85c197bb30b06a4e27f84f6aa52fe5cbcc075feeeea5cc
                            • Opcode Fuzzy Hash: 0c91518bd71cb4168f1a40ad0db03d34d8bc49f97cdfd37d687d45c23b39c465
                            • Instruction Fuzzy Hash: FDF0E5B14656129FD7A16B11AC98A6E3734AF11701F9980A9F01BE7030DB71CF948F52
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7c00cb6e6e77343bec44cffdb83fb8304c3e099a718f03f564eafa0db86d4b03
                            • Instruction ID: bf4801b0861496669fe2f5c52c75ab2a7b61a94be701c4d4fb3108f6f2eb5fc9
                            • Opcode Fuzzy Hash: 7c00cb6e6e77343bec44cffdb83fb8304c3e099a718f03f564eafa0db86d4b03
                            • Instruction Fuzzy Hash: E3C16D75A40206EFDB14CFA4C898BAEB7B5FF48304F208598E515EB251D771EE81DB90
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: __alldvrm$_strrchr
                            • String ID:
                            • API String ID: 1036877536-0
                            • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                            • Instruction ID: 9fe9f13daac20edf32ae723768999743013e26d6c604a4ce76ce7700faa735dd
                            • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                            • Instruction Fuzzy Hash: 0EA16A72D00386AFD719CF59C8817EEBBE4EF67354F2841ADE5559B281C2348AC2E750
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearInitInitializeUninitialize
                            • String ID:
                            • API String ID: 1998397398-0
                            • Opcode ID: f4fad5b0ef895029697ab5699d0db0a13cce5d81544c2f20e1b0ad99c4d0098b
                            • Instruction ID: 20f9293e46766b9506cfbb6da6e10f1708bf2ad846f331f6a33e7d21e1ed226a
                            • Opcode Fuzzy Hash: f4fad5b0ef895029697ab5699d0db0a13cce5d81544c2f20e1b0ad99c4d0098b
                            • Instruction Fuzzy Hash: CCA147752047409FC710DF29C895A2AB7E5FF88314F04889DF98A9B362DB30EE05CB92
                            APIs
                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00C7FC08,?), ref: 00C405F0
                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00C7FC08,?), ref: 00C40608
                            • CLSIDFromProgID.OLE32(?,?,00000000,00C7CC40,000000FF,?,00000000,00000800,00000000,?,00C7FC08,?), ref: 00C4062D
                            • _memcmp.LIBVCRUNTIME ref: 00C4064E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FromProg$FreeTask_memcmp
                            • String ID:
                            • API String ID: 314563124-0
                            • Opcode ID: e1abbf359eb2bbf8677506445480bf7c75bff428e85ab6a3d3c3b44a239c1546
                            • Instruction ID: d24bfb0ba51cb3c7aec44871a4765791fe560b0420bc0583465b10fa2d65e60a
                            • Opcode Fuzzy Hash: e1abbf359eb2bbf8677506445480bf7c75bff428e85ab6a3d3c3b44a239c1546
                            • Instruction Fuzzy Hash: DA81DB75A00109EFCB04DF94C984EEEB7B9FF89315F204598F616AB250DB71AE46CB60
                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00C6A6AC
                            • Process32FirstW.KERNEL32(00000000,?), ref: 00C6A6BA
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • Process32NextW.KERNEL32(00000000,?), ref: 00C6A79C
                            • CloseHandle.KERNEL32(00000000), ref: 00C6A7AB
                              • Part of subcall function 00BFCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00C23303,?), ref: 00BFCE8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                            • String ID:
                            • API String ID: 1991900642-0
                            • Opcode ID: 86d1a1a787713b367acaec1c5d07a1e5864de7c356ae3b962b2898314539e986
                            • Instruction ID: e756175684f54ccae45db7775ce3f9f7be477138e91cccf1063bb82a78bd5f49
                            • Opcode Fuzzy Hash: 86d1a1a787713b367acaec1c5d07a1e5864de7c356ae3b962b2898314539e986
                            • Instruction Fuzzy Hash: 18518D71508340AFD710EF25C886A6FBBE8FF89754F40496DF58997262EB30D944CB92
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: f9bd9e76709d39de315308709d933d7ce96e81cf4a13f147bc6fb70bd68c7b0f
                            • Instruction ID: c448f5c7caf8183d2c321bcc1caeb35faaabe994e8c6727f31e017e66026f0ce
                            • Opcode Fuzzy Hash: f9bd9e76709d39de315308709d933d7ce96e81cf4a13f147bc6fb70bd68c7b0f
                            • Instruction Fuzzy Hash: 6F413E35500521ABDB317BBDAC456BE3AA4EF62330F1C4225FC2DD69D1E6748AC1B272
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00C762E2
                            • ScreenToClient.USER32(?,?), ref: 00C76315
                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00C76382
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$ClientMoveRectScreen
                            • String ID:
                            • API String ID: 3880355969-0
                            • Opcode ID: 7af45c509e1eb99295cb70f95d11bc5603e5dd14a0f879e38554d2ef8e5a6e40
                            • Instruction ID: ba1add34d649d6eebeb0a6b4bbc139806c335e9abab25ab1480d076f121188cc
                            • Opcode Fuzzy Hash: 7af45c509e1eb99295cb70f95d11bc5603e5dd14a0f879e38554d2ef8e5a6e40
                            • Instruction Fuzzy Hash: CF514F74A00649EFDF10DF64D881AAE7BB5FF45360F148259F929972A0D730EE81CB50
                            APIs
                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00C61AFD
                            • WSAGetLastError.WSOCK32 ref: 00C61B0B
                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00C61B8A
                            • WSAGetLastError.WSOCK32 ref: 00C61B94
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$socket
                            • String ID:
                            • API String ID: 1881357543-0
                            • Opcode ID: 3f4eee8ba60849dc7d89f8ae0e07fcde191ff6e87b1c51c40a3cde8452ec5f5f
                            • Instruction ID: 04fac840866a313c09f856ecbbc54249a00a37769f9c98163fb8b7f47b25622f
                            • Opcode Fuzzy Hash: 3f4eee8ba60849dc7d89f8ae0e07fcde191ff6e87b1c51c40a3cde8452ec5f5f
                            • Instruction Fuzzy Hash: C04171746402006FE720AF25C886F2977E5AB84718F58849CFA2A9F3D3D772DD418B90
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 44aaf8f960ef17fdb00c66169235b7f20a22249f70861f95baad4f27e42c2638
                            • Instruction ID: 98b2336549af0d84b78408303bbf0b6153d3cc96579536170ca80e2f7026d51b
                            • Opcode Fuzzy Hash: 44aaf8f960ef17fdb00c66169235b7f20a22249f70861f95baad4f27e42c2638
                            • Instruction Fuzzy Hash: 86412971A00314BFD7249F38CC41BEABBE9EB8A710F10852EF511DB681D3719D81AB90
                            APIs
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00C55783
                            • GetLastError.KERNEL32(?,00000000), ref: 00C557A9
                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00C557CE
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00C557FA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CreateHardLink$DeleteErrorFileLast
                            • String ID:
                            • API String ID: 3321077145-0
                            • Opcode ID: eff10c942da8b96f64c4de365fdc3dda8ff5826a1b7430f077d9ab228cc00571
                            • Instruction ID: dff486197b4ca4b60ae27a265121c08f5ad505157841994c143841504ba0a1d7
                            • Opcode Fuzzy Hash: eff10c942da8b96f64c4de365fdc3dda8ff5826a1b7430f077d9ab228cc00571
                            • Instruction Fuzzy Hash: 38414E39610A50DFCB11DF15C494A5EBBF2EF99321B198488EC5AAB362CB30FD45CB91
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00C06D71,00000000,00000000,00C082D9,?,00C082D9,?,00000001,00C06D71,8BE85006,00000001,00C082D9,00C082D9), ref: 00C1D910
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C1D999
                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00C1D9AB
                            • __freea.LIBCMT ref: 00C1D9B4
                              • Part of subcall function 00C13820: RtlAllocateHeap.NTDLL(00000000,?,00CB1444,?,00BFFDF5,?,?,00BEA976,00000010,00CB1440,00BE13FC,?,00BE13C6,?,00BE1129), ref: 00C13852
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                            • String ID:
                            • API String ID: 2652629310-0
                            • Opcode ID: 0dc56998cd4ee78953e107ad5b97eab04915ddfe75cb240f10c34304d19621cc
                            • Instruction ID: d0632ff2238b0b55506a464b5900b2eda37d85d58abb481bc5bc6bb0a8dab41e
                            • Opcode Fuzzy Hash: 0dc56998cd4ee78953e107ad5b97eab04915ddfe75cb240f10c34304d19621cc
                            • Instruction Fuzzy Hash: 7531CE72A1020AABDB24DF65DC81EEE7BA5EB42310F054168FC15D7190EB35DE90EBA0
                            APIs
                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00C75352
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C75375
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C75382
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00C753A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: LongWindow$InvalidateMessageRectSend
                            • String ID:
                            • API String ID: 3340791633-0
                            • Opcode ID: 9a3421f8f5fdf3100af3189d4b80a8572e6d68cb3654fadf8434fc45ade9ca14
                            • Instruction ID: 16af9a11e6ca026ba2224fea4162ca0c8cb888924c63a6ad6c6574826d1f3ece
                            • Opcode Fuzzy Hash: 9a3421f8f5fdf3100af3189d4b80a8572e6d68cb3654fadf8434fc45ade9ca14
                            • Instruction Fuzzy Hash: BB31C334A55A0CEFEB309F24CC56FE837A5AB04390F58C105FA29962F1C7F0AE809B51
                            APIs
                            • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00C4ABF1
                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00C4AC0D
                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00C4AC74
                            • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00C4ACC6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: e04a91dede7c162a87074a5b83811e7c529e22f2045dc418af03b10d5e86debf
                            • Instruction ID: 3bdd34712fc6609a467f363667b847958d5a47a45a297450fc8b30898fb63ee4
                            • Opcode Fuzzy Hash: e04a91dede7c162a87074a5b83811e7c529e22f2045dc418af03b10d5e86debf
                            • Instruction Fuzzy Hash: D8313570A80719AFEF34CB658C84BFE7BA5BB89310F04431AE4A5931D0C3768A819792
                            APIs
                            • ClientToScreen.USER32(?,?), ref: 00C7769A
                            • GetWindowRect.USER32(?,?), ref: 00C77710
                            • PtInRect.USER32(?,?,00C78B89), ref: 00C77720
                            • MessageBeep.USER32(00000000), ref: 00C7778C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Rect$BeepClientMessageScreenWindow
                            • String ID:
                            • API String ID: 1352109105-0
                            • Opcode ID: a00cf0e5cd7fb0383b1d54a51e0bc506b2c5baf521723170ea18aa390f77c7ed
                            • Instruction ID: 19454872015ccf7334697863fe2cb122bcdfb523924975e45fcc6da6f7cdb102
                            • Opcode Fuzzy Hash: a00cf0e5cd7fb0383b1d54a51e0bc506b2c5baf521723170ea18aa390f77c7ed
                            • Instruction Fuzzy Hash: 8541AD34A05259EFCB06CF59C894FAD77F5FB48314F1882A8E8289B261C330AA41CF90
                            APIs
                            • GetForegroundWindow.USER32 ref: 00C716EB
                              • Part of subcall function 00C43A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C43A57
                              • Part of subcall function 00C43A3D: GetCurrentThreadId.KERNEL32 ref: 00C43A5E
                              • Part of subcall function 00C43A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00C425B3), ref: 00C43A65
                            • GetCaretPos.USER32(?), ref: 00C716FF
                            • ClientToScreen.USER32(00000000,?), ref: 00C7174C
                            • GetForegroundWindow.USER32 ref: 00C71752
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                            • String ID:
                            • API String ID: 2759813231-0
                            • Opcode ID: b56b7b1a9a575e98e5b9f6fea0bfc94130be1db42ea344f4df0ad52bba56accf
                            • Instruction ID: d12113a512eff1c0e8dcfe6a553fde8a64dfeff45f594171c7a68f20fd4fcf73
                            • Opcode Fuzzy Hash: b56b7b1a9a575e98e5b9f6fea0bfc94130be1db42ea344f4df0ad52bba56accf
                            • Instruction Fuzzy Hash: E6313275D00149AFC714DFAAC8C1DAEBBF9EF48304B5480AAE429E7251DB31DE45CBA0
                            APIs
                              • Part of subcall function 00BE7620: _wcslen.LIBCMT ref: 00BE7625
                            • _wcslen.LIBCMT ref: 00C4DFCB
                            • _wcslen.LIBCMT ref: 00C4DFE2
                            • _wcslen.LIBCMT ref: 00C4E00D
                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00C4E018
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$ExtentPoint32Text
                            • String ID:
                            • API String ID: 3763101759-0
                            • Opcode ID: 74d248eec4b18b8750f241975da1f9ebee149aefa278990cccfdc83a307db216
                            • Instruction ID: 26e216d6fa453163fc9776ecb73e2d02c1a676f8766f82214e906cce2400f685
                            • Opcode Fuzzy Hash: 74d248eec4b18b8750f241975da1f9ebee149aefa278990cccfdc83a307db216
                            • Instruction Fuzzy Hash: DE21E271900215AFCB20EFA8D881BAEB7F8FF45710F104069E915BB281D7709E41DBA1
                            APIs
                              • Part of subcall function 00BF9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BF9BB2
                            • GetCursorPos.USER32(?), ref: 00C79001
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00C37711,?,?,?,?,?), ref: 00C79016
                            • GetCursorPos.USER32(?), ref: 00C7905E
                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00C37711,?,?,?), ref: 00C79094
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                            • String ID:
                            • API String ID: 2864067406-0
                            • Opcode ID: 6b2fbc4063586f8c4945209cdb9b552a6a66f708dccde239a6a57147b91aaae3
                            • Instruction ID: 89f08ec3dc6719e9f915611b86bf82f5526aa7297a216fb9097544a8b2c43557
                            • Opcode Fuzzy Hash: 6b2fbc4063586f8c4945209cdb9b552a6a66f708dccde239a6a57147b91aaae3
                            • Instruction Fuzzy Hash: 37217F35610018EFDB258F95C898FFE7BF9FB89360F148159F91947261C7329A90EB60
                            APIs
                            • GetFileAttributesW.KERNEL32(?,00C7CB68), ref: 00C4D2FB
                            • GetLastError.KERNEL32 ref: 00C4D30A
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C4D319
                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00C7CB68), ref: 00C4D376
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CreateDirectory$AttributesErrorFileLast
                            • String ID:
                            • API String ID: 2267087916-0
                            • Opcode ID: 4734866fd679562e8a448dd578e3e2e17df953d22c8128c29ff89a54f8ef2742
                            • Instruction ID: 1345cdf1c459c1b2d3de7e2cd9e2eda17f4b761a38e88eead6b6d5e19ac2fd29
                            • Opcode Fuzzy Hash: 4734866fd679562e8a448dd578e3e2e17df953d22c8128c29ff89a54f8ef2742
                            • Instruction Fuzzy Hash: AB218D705082029F8710EF29C88196E77E4BF56764F504A5DF4AAD32A1D730DE89CB93
                            APIs
                              • Part of subcall function 00C41014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C4102A
                              • Part of subcall function 00C41014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C41036
                              • Part of subcall function 00C41014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C41045
                              • Part of subcall function 00C41014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C4104C
                              • Part of subcall function 00C41014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C41062
                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00C415BE
                            • _memcmp.LIBVCRUNTIME ref: 00C415E1
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C41617
                            • HeapFree.KERNEL32(00000000), ref: 00C4161E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                            • String ID:
                            • API String ID: 1592001646-0
                            • Opcode ID: 0c9fdfd7ab855a49a56bc3fd4f852b5e9bb01ee18db2b540e9049b8e131d30fd
                            • Instruction ID: f218a8c893e1f614961c931fc6fd92cf7f3b8152bebf764caea37eb27534a145
                            • Opcode Fuzzy Hash: 0c9fdfd7ab855a49a56bc3fd4f852b5e9bb01ee18db2b540e9049b8e131d30fd
                            • Instruction Fuzzy Hash: 5C219D31E00109EFDF00DFA4C945BEEB7B8FF44354F094459E895AB241E730AA85DBA0
                            APIs
                            • GetWindowLongW.USER32(?,000000EC), ref: 00C7280A
                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C72824
                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C72832
                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00C72840
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Long$AttributesLayered
                            • String ID:
                            • API String ID: 2169480361-0
                            • Opcode ID: b0efbb3eab5d859e85861688b26269a984d404ef7a8a0a143ad5c9f55345ece5
                            • Instruction ID: 826e181cfd1649b3f065f0f77d491e86c05996a97cc375ca5e1ef9e9bd75298c
                            • Opcode Fuzzy Hash: b0efbb3eab5d859e85861688b26269a984d404ef7a8a0a143ad5c9f55345ece5
                            • Instruction Fuzzy Hash: 1F21D031204111AFD7149B24C885FAA7B99EF85324F14C15CF42A8B6E2CB72FD82CBD1
                            APIs
                              • Part of subcall function 00C48D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00C4790A,?,000000FF,?,00C48754,00000000,?,0000001C,?,?), ref: 00C48D8C
                              • Part of subcall function 00C48D7D: lstrcpyW.KERNEL32(00000000,?,?,00C4790A,?,000000FF,?,00C48754,00000000,?,0000001C,?,?,00000000), ref: 00C48DB2
                              • Part of subcall function 00C48D7D: lstrcmpiW.KERNEL32(00000000,?,00C4790A,?,000000FF,?,00C48754,00000000,?,0000001C,?,?), ref: 00C48DE3
                            • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00C48754,00000000,?,0000001C,?,?,00000000), ref: 00C47923
                            • lstrcpyW.KERNEL32(00000000,?,?,00C48754,00000000,?,0000001C,?,?,00000000), ref: 00C47949
                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00C48754,00000000,?,0000001C,?,?,00000000), ref: 00C47984
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: lstrcmpilstrcpylstrlen
                            • String ID: cdecl
                            • API String ID: 4031866154-3896280584
                            • Opcode ID: ac08619a8f8aa18a05607f8db03a6dddd0f469bc686d41c328fa523101891061
                            • Instruction ID: 549c765d3511b5a1b1fd37dc55af72ae269419e0d9ac370b604c9840b73d23f5
                            • Opcode Fuzzy Hash: ac08619a8f8aa18a05607f8db03a6dddd0f469bc686d41c328fa523101891061
                            • Instruction Fuzzy Hash: 2811263A200342ABCF15AF38D844E7E77E9FFA5350B40412AF906C72A4EB319901C7A1
                            APIs
                            • GetWindowLongW.USER32(?,000000F0), ref: 00C77D0B
                            • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00C77D2A
                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00C77D42
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00C5B7AD,00000000), ref: 00C77D6B
                              • Part of subcall function 00BF9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BF9BB2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$Long
                            • String ID:
                            • API String ID: 847901565-0
                            • Opcode ID: 68f2a3237d92b9df0bac5a0718960a1fde8d27043cc5efbebb957af88a9bf8fa
                            • Instruction ID: 0ad89dab53c51e9c35d898325ae5f9cb3b34e5d9210371e6348dc8f5d9239fb2
                            • Opcode Fuzzy Hash: 68f2a3237d92b9df0bac5a0718960a1fde8d27043cc5efbebb957af88a9bf8fa
                            • Instruction Fuzzy Hash: CB119D31604659AFCB209F68CC44BAA3BA5AF45360F258728FC3DD72F0D7319A60DB90
                            APIs
                            • SendMessageW.USER32(?,00001060,?,00000004), ref: 00C756BB
                            • _wcslen.LIBCMT ref: 00C756CD
                            • _wcslen.LIBCMT ref: 00C756D8
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C75816
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend_wcslen
                            • String ID:
                            • API String ID: 455545452-0
                            • Opcode ID: d4583dce18d5c70013253d4247fb4e6ac402cba2b0f829d7e1dcfd7c72783008
                            • Instruction ID: 9044e7c8da1bb9c084a00c75ec847020e8608bc28a7e4a997ab3850fad0e1d34
                            • Opcode Fuzzy Hash: d4583dce18d5c70013253d4247fb4e6ac402cba2b0f829d7e1dcfd7c72783008
                            • Instruction Fuzzy Hash: C911D371A0060896DB209F61CC85BEE7BACEF10760F50C12AFA2DD61C1E7B0DA80CB64
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 366157c6897122cc034ea73b859e69208a5362f9165a2507dfb85a2a6029fed5
                            • Instruction ID: 9a21c4fe52705373aa1ed978feeafe3c52d01f6b51a124d3020c2ef59b6c4db8
                            • Opcode Fuzzy Hash: 366157c6897122cc034ea73b859e69208a5362f9165a2507dfb85a2a6029fed5
                            • Instruction Fuzzy Hash: A60162B22096167EF71226787CC1FAB661DEF433B8F380329FA31551D2DB648D907160
                            APIs
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00C41A47
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C41A59
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C41A6F
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C41A8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 9a7f15806364fba247787ee75803b4c9b16459d1ab7488c4e23455678c50a91b
                            • Instruction ID: 61ab03ac773fdb0148d976acf7baad5a8f15ad4cced76390b241bbde3bf19574
                            • Opcode Fuzzy Hash: 9a7f15806364fba247787ee75803b4c9b16459d1ab7488c4e23455678c50a91b
                            • Instruction Fuzzy Hash: ED115A3AD01219FFEB10DBA4C984FADBB78FB04350F200091EA00B7290C6716E50EB94
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 00C4E1FD
                            • MessageBoxW.USER32(?,?,?,?), ref: 00C4E230
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00C4E246
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00C4E24D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                            • String ID:
                            • API String ID: 2880819207-0
                            • Opcode ID: ffb1e11c4002a99910f6c8e210df99dddf86907ddcfcfffa71e07265f6914d63
                            • Instruction ID: eb54f9e36b79086d8cec0ddb3c3639c2ba3d19046135ff7cb0b245a1d7399c07
                            • Opcode Fuzzy Hash: ffb1e11c4002a99910f6c8e210df99dddf86907ddcfcfffa71e07265f6914d63
                            • Instruction Fuzzy Hash: 60110872904215BBC7119BA89C45B9F7FECBB45320F454329F825E3291D6B08E0087A0
                            APIs
                            • CreateThread.KERNEL32(00000000,?,00C0CFF9,00000000,00000004,00000000), ref: 00C0D218
                            • GetLastError.KERNEL32 ref: 00C0D224
                            • __dosmaperr.LIBCMT ref: 00C0D22B
                            • ResumeThread.KERNEL32(00000000), ref: 00C0D249
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Thread$CreateErrorLastResume__dosmaperr
                            • String ID:
                            • API String ID: 173952441-0
                            • Opcode ID: 6dc6c4078c63c74086ff600c3401fbb83f5f59a57d0e9e9472e3361252f5850a
                            • Instruction ID: 607bf5b7e04e3f2ab2e06d9f614247156652d43bb822289e28a8a4adb65ce0f3
                            • Opcode Fuzzy Hash: 6dc6c4078c63c74086ff600c3401fbb83f5f59a57d0e9e9472e3361252f5850a
                            • Instruction Fuzzy Hash: 8B014536804205BBCB206BE5DC09BAF3A68EF81331F100228F93A920E0CF70CD81D7A0
                            APIs
                              • Part of subcall function 00BF9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00BF9BB2
                            • GetClientRect.USER32(?,?), ref: 00C79F31
                            • GetCursorPos.USER32(?), ref: 00C79F3B
                            • ScreenToClient.USER32(?,?), ref: 00C79F46
                            • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00C79F7A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Client$CursorLongProcRectScreenWindow
                            • String ID:
                            • API String ID: 4127811313-0
                            • Opcode ID: 4f364f0aeae38eeb719de519b964e4dc58ee8c87954c9a1554443037b3288395
                            • Instruction ID: 994595f998ee68df74be397f834dae730ada200ecc602db82b70aed7595b9d17
                            • Opcode Fuzzy Hash: 4f364f0aeae38eeb719de519b964e4dc58ee8c87954c9a1554443037b3288395
                            • Instruction Fuzzy Hash: 7511573290051AABDB10EFA8D889EEE77B8FB05311F408455F915E3140D730BB91DBA1
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00BE604C
                            • GetStockObject.GDI32(00000011), ref: 00BE6060
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BE606A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CreateMessageObjectSendStockWindow
                            • String ID:
                            • API String ID: 3970641297-0
                            • Opcode ID: da7293e51369d6a3e278de2d1ad490944d2d500d7c5ec8018a4ccf5624bba457
                            • Instruction ID: ce5bd170eb032e544bd19dd2322ec2d75e38ff7be56b25e76b730abd4ba2c48a
                            • Opcode Fuzzy Hash: da7293e51369d6a3e278de2d1ad490944d2d500d7c5ec8018a4ccf5624bba457
                            • Instruction Fuzzy Hash: 5011A172501559BFEF165F959C84FEE7BADEF183A4F040215FA1452011CB32ACA0DB90
                            APIs
                            • ___BuildCatchObject.LIBVCRUNTIME ref: 00C03B56
                              • Part of subcall function 00C03AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00C03AD2
                              • Part of subcall function 00C03AA3: ___AdjustPointer.LIBCMT ref: 00C03AED
                            • _UnwindNestedFrames.LIBCMT ref: 00C03B6B
                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00C03B7C
                            • CallCatchBlock.LIBVCRUNTIME ref: 00C03BA4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                            • String ID:
                            • API String ID: 737400349-0
                            • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                            • Instruction ID: d43c95508b000b706e2ae856fa1909efc94d2f603eb73648dd1dcd163e059d5d
                            • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                            • Instruction Fuzzy Hash: 62014072100188BBDF115F95CC42EEB3F6DEF48758F044414FE5856161C732D961EBA0
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00BE13C6,00000000,00000000,?,00C1301A,00BE13C6,00000000,00000000,00000000,?,00C1328B,00000006,FlsSetValue), ref: 00C130A5
                            • GetLastError.KERNEL32(?,00C1301A,00BE13C6,00000000,00000000,00000000,?,00C1328B,00000006,FlsSetValue,00C82290,FlsSetValue,00000000,00000364,?,00C12E46), ref: 00C130B1
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00C1301A,00BE13C6,00000000,00000000,00000000,?,00C1328B,00000006,FlsSetValue,00C82290,FlsSetValue,00000000), ref: 00C130BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID:
                            • API String ID: 3177248105-0
                            • Opcode ID: 37944c84ff4e175974d0e3773eed073004b03c06c0475ba92c227c6ba964b789
                            • Instruction ID: bc6b2268b10e97790f5663e67ce2b668251b42b37e723af756c904919d6a39bc
                            • Opcode Fuzzy Hash: 37944c84ff4e175974d0e3773eed073004b03c06c0475ba92c227c6ba964b789
                            • Instruction Fuzzy Hash: 1901FC32301663ABC7314B799C84B9B7BD89F4A765B110624F919E3180D721DA81D7E0
                            APIs
                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00C4747F
                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00C47497
                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00C474AC
                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00C474CA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Type$Register$FileLoadModuleNameUser
                            • String ID:
                            • API String ID: 1352324309-0
                            • Opcode ID: 5d9999d58ba20f8b02ad14debd19d661097acb0e67bd0b09e436305801961b3e
                            • Instruction ID: 553fa08ccfaa2fda582c47d4d17c6cf89974b0143b4b39fba2cf046cdf5492c4
                            • Opcode Fuzzy Hash: 5d9999d58ba20f8b02ad14debd19d661097acb0e67bd0b09e436305801961b3e
                            • Instruction Fuzzy Hash: B911ADB1205311ABE7208F14DC48BB67FFCFB00B00F10866DA62AD6191D7B0E944DFA0
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00C4ACD3,?,00008000), ref: 00C4B0C4
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C4ACD3,?,00008000), ref: 00C4B0E9
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00C4ACD3,?,00008000), ref: 00C4B0F3
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C4ACD3,?,00008000), ref: 00C4B126
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CounterPerformanceQuerySleep
                            • String ID:
                            • API String ID: 2875609808-0
                            • Opcode ID: 9230a73562189fd9e3e684097d5c685870e74e2acd37c741ad642ced58d29ce2
                            • Instruction ID: c97774f918f4aa177cb53d4e665aaa071d64703f340fb55a5980a1e9a7dea48a
                            • Opcode Fuzzy Hash: 9230a73562189fd9e3e684097d5c685870e74e2acd37c741ad642ced58d29ce2
                            • Instruction Fuzzy Hash: 0F115B71C0192DE7CF04AFE5E9987EEBB78FF09711F104099D951B2181CB309A90CB51
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00C77E33
                            • ScreenToClient.USER32(?,?), ref: 00C77E4B
                            • ScreenToClient.USER32(?,?), ref: 00C77E6F
                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00C77E8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClientRectScreen$InvalidateWindow
                            • String ID:
                            • API String ID: 357397906-0
                            • Opcode ID: a430fe04a290033cf81e6b448d1bb2eeca1bba93b1de60b39c3e7c721ea2f072
                            • Instruction ID: 7274f3ad9bb1b12d4f0c2020475c4d4312d95b19cdc41d0fe9bb4555c0efeb63
                            • Opcode Fuzzy Hash: a430fe04a290033cf81e6b448d1bb2eeca1bba93b1de60b39c3e7c721ea2f072
                            • Instruction Fuzzy Hash: D51144B9D0020AAFDB41DF98D884AEEBBF5FF08310F509156E915E3210D735AA94CF51
                            APIs
                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00C42DC5
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C42DD6
                            • GetCurrentThreadId.KERNEL32 ref: 00C42DDD
                            • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00C42DE4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                            • String ID:
                            • API String ID: 2710830443-0
                            • Opcode ID: 1ed90ae68dc27beb228ac6fe79aa0dd6c45b7d191345244872efac9dd051b2b4
                            • Instruction ID: cd3a47b2554f3831a94973f5e5834cf201f74163b10a9f0dbef73501fed10a8c
                            • Opcode Fuzzy Hash: 1ed90ae68dc27beb228ac6fe79aa0dd6c45b7d191345244872efac9dd051b2b4
                            • Instruction Fuzzy Hash: 8BE01271501625BBD7201B739C8EFEF7E6CFF56BB1F800119F509D10909AA5C981C6B0
                            APIs
                              • Part of subcall function 00BF9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BF9693
                              • Part of subcall function 00BF9639: SelectObject.GDI32(?,00000000), ref: 00BF96A2
                              • Part of subcall function 00BF9639: BeginPath.GDI32(?), ref: 00BF96B9
                              • Part of subcall function 00BF9639: SelectObject.GDI32(?,00000000), ref: 00BF96E2
                            • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00C78887
                            • LineTo.GDI32(?,?,?), ref: 00C78894
                            • EndPath.GDI32(?), ref: 00C788A4
                            • StrokePath.GDI32(?), ref: 00C788B2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                            • String ID:
                            • API String ID: 1539411459-0
                            • Opcode ID: 3198a2d1a32dd29d69768e3d5ac907f69763790c4ef154cb20bf4d47d84ada42
                            • Instruction ID: ffc821e00a922376615cb525c03920abe57df182c95704d41d6dbba3ee5ec205
                            • Opcode Fuzzy Hash: 3198a2d1a32dd29d69768e3d5ac907f69763790c4ef154cb20bf4d47d84ada42
                            • Instruction Fuzzy Hash: 3CF03A36041259BADB126F94AC0DFCE3E59AF06710F448104FB25650E1C7755665CBE5
                            APIs
                            • GetSysColor.USER32(00000008), ref: 00BF98CC
                            • SetTextColor.GDI32(?,?), ref: 00BF98D6
                            • SetBkMode.GDI32(?,00000001), ref: 00BF98E9
                            • GetStockObject.GDI32(00000005), ref: 00BF98F1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Color$ModeObjectStockText
                            • String ID:
                            • API String ID: 4037423528-0
                            • Opcode ID: 24610d50ea41fa94060d7629b892f7c983e4f4d277eaf84c63ca219ef52a66e3
                            • Instruction ID: f8cad9d447c39fc71753695eaacbc6cd9a7a7adb60fcd268457a94e3c2f08604
                            • Opcode Fuzzy Hash: 24610d50ea41fa94060d7629b892f7c983e4f4d277eaf84c63ca219ef52a66e3
                            • Instruction Fuzzy Hash: 96E06D31244285ABEB215B78AC49BEC3F60EB12376F14C32DF6FA580E1C3B246809B10
                            APIs
                            • GetCurrentThread.KERNEL32 ref: 00C41634
                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,00C411D9), ref: 00C4163B
                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00C411D9), ref: 00C41648
                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,00C411D9), ref: 00C4164F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CurrentOpenProcessThreadToken
                            • String ID:
                            • API String ID: 3974789173-0
                            • Opcode ID: 41307b1b617f933b2e46d653e8da9aabd475a7294d074c042b027afb4bfc03a8
                            • Instruction ID: 0a506358e34efd90d076052ee90b9b0e7a2505cec25f60d1624c65b880ee39b9
                            • Opcode Fuzzy Hash: 41307b1b617f933b2e46d653e8da9aabd475a7294d074c042b027afb4bfc03a8
                            • Instruction Fuzzy Hash: B3E08631601212DBD7201FA0AD4DB8A3B7CFF447A1F19480CF699D9090D63485C0C7A4
                            APIs
                            • GetDesktopWindow.USER32 ref: 00C3D858
                            • GetDC.USER32(00000000), ref: 00C3D862
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C3D882
                            • ReleaseDC.USER32(?), ref: 00C3D8A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: 2b72302fdc2359c586eca1bb5dd1e17b6052f520882c7d60640a0ac7d08ee8a3
                            • Instruction ID: 2d75af1cb7fb40293165b5e96519d851438959a7285e507c0e8054803c315c60
                            • Opcode Fuzzy Hash: 2b72302fdc2359c586eca1bb5dd1e17b6052f520882c7d60640a0ac7d08ee8a3
                            • Instruction Fuzzy Hash: 83E01AB0800206DFCB41AFA1D88876DBBF2FB08310F108049F81AE7250CB385985AF80
                            APIs
                            • GetDesktopWindow.USER32 ref: 00C3D86C
                            • GetDC.USER32(00000000), ref: 00C3D876
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C3D882
                            • ReleaseDC.USER32(?), ref: 00C3D8A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: edad8024a4a507674768a1cb40cf37f13543fdb8e3e936a91d91232009ec2cfc
                            • Instruction ID: 6933cc13cc49540759bc34ace861eb6c06c976a47936aa7049899162d36aaced
                            • Opcode Fuzzy Hash: edad8024a4a507674768a1cb40cf37f13543fdb8e3e936a91d91232009ec2cfc
                            • Instruction Fuzzy Hash: 1BE09A75800205DFCB51AFA1D88876DBBF5BB08311B148449F95AE7250DB3859459F50
                            APIs
                              • Part of subcall function 00BE7620: _wcslen.LIBCMT ref: 00BE7625
                            • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00C54ED4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Connection_wcslen
                            • String ID: *$LPT
                            • API String ID: 1725874428-3443410124
                            • Opcode ID: 632f3747a6dfb561a6136ed8c9de312ee162efab90b283a781a0e0d95808f849
                            • Instruction ID: 4d04edf7cb7f6c51c2f04407856a7b5b0d99623f54828b52e92b81b49b0d9751
                            • Opcode Fuzzy Hash: 632f3747a6dfb561a6136ed8c9de312ee162efab90b283a781a0e0d95808f849
                            • Instruction Fuzzy Hash: 239151799002449FCB18DF99C494EA9BBF1BF44308F148099E81A5F352D771EEC9CB95
                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 00C0E30D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ErrorHandling__start
                            • String ID: pow
                            • API String ID: 3213639722-2276729525
                            • Opcode ID: 305de2701be41cb87a45dee299a2a1fa2dcea7670f3c566b4a0e8d79c7760935
                            • Instruction ID: 695742f0cfdc613b4b41125760011c00da9f63485b8baa9e9b68586365e34ce0
                            • Opcode Fuzzy Hash: 305de2701be41cb87a45dee299a2a1fa2dcea7670f3c566b4a0e8d79c7760935
                            • Instruction Fuzzy Hash: 70513A71A4C2069ACB157754D9013FE2FF4AF41740F344EA8E4A5822F9EB348DD1FA86
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: #
                            • API String ID: 0-1885708031
                            • Opcode ID: 3cbcd824ff2c6a1e030cb11dfeb813bba3cec9c255bc550ed7421e881355cd09
                            • Instruction ID: ff2af06037e09f06d9ba0994cb3ab2e43f06914dfb4f2f91537cc4a1c93a1d02
                            • Opcode Fuzzy Hash: 3cbcd824ff2c6a1e030cb11dfeb813bba3cec9c255bc550ed7421e881355cd09
                            • Instruction Fuzzy Hash: 5E51237590024ADFDB15DF28C481ABE7BE4EF56310F244095F9A19B2E0E730DE46CBA0
                            APIs
                            • Sleep.KERNEL32(00000000), ref: 00BFF2A2
                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00BFF2BB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: GlobalMemorySleepStatus
                            • String ID: @
                            • API String ID: 2783356886-2766056989
                            • Opcode ID: 3819c673cabc6110c3a72c6c4fa7dcf0adb95b8f9ed2986a22aa1bb199391e47
                            • Instruction ID: c380c5814f0b89860f6fff86bd8b75cd3c5a12b00b4aa588aa5a57f78db4169e
                            • Opcode Fuzzy Hash: 3819c673cabc6110c3a72c6c4fa7dcf0adb95b8f9ed2986a22aa1bb199391e47
                            • Instruction Fuzzy Hash: 765137714087859BD320AF11EC86BAFBBF8FF84300F81889DF1D941195EB718569CB66
                            APIs
                            • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00C657E0
                            • _wcslen.LIBCMT ref: 00C657EC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: BuffCharUpper_wcslen
                            • String ID: CALLARGARRAY
                            • API String ID: 157775604-1150593374
                            • Opcode ID: cdfedff3e8c12556b98dfffb2607587fda1bc0970bc121427545e07214d1ab84
                            • Instruction ID: 5a9f47a3bed5f95161c51a2cff443cf0cf1e38e8eb8a0cc90e73f923a679a1f0
                            • Opcode Fuzzy Hash: cdfedff3e8c12556b98dfffb2607587fda1bc0970bc121427545e07214d1ab84
                            • Instruction Fuzzy Hash: 4141A071A0020A9FCB24DFA9C8C19BEBBF5FF59314F204069E515A7292E7309E85CB90
                            APIs
                            • _wcslen.LIBCMT ref: 00C5D130
                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00C5D13A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CrackInternet_wcslen
                            • String ID: |
                            • API String ID: 596671847-2343686810
                            • Opcode ID: 5eb09c4cc7eaf74285c7cd311c0cda24d83a85a98f6aec599d51d4acf1148b04
                            • Instruction ID: b724747b96649a139ac75927d279433e14b54423cf72e795c82de3749cac4817
                            • Opcode Fuzzy Hash: 5eb09c4cc7eaf74285c7cd311c0cda24d83a85a98f6aec599d51d4acf1148b04
                            • Instruction Fuzzy Hash: 37313E75D00209ABCF15EFA5CC85AEF7FB9FF14350F000059F815A61A1DB31AA46DB64
                            APIs
                            • DestroyWindow.USER32(?,?,?,?), ref: 00C73621
                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00C7365C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$DestroyMove
                            • String ID: static
                            • API String ID: 2139405536-2160076837
                            • Opcode ID: f73a3b011761f68c8f0aea90982c6cd4439c98ab603636643bf4b319c32521f8
                            • Instruction ID: 1f35f99e260390904357b8500b792041b547cc2caf8b6d0dbcdfcfe1a31346e5
                            • Opcode Fuzzy Hash: f73a3b011761f68c8f0aea90982c6cd4439c98ab603636643bf4b319c32521f8
                            • Instruction Fuzzy Hash: 94318B71110244AADB109F78DC80FFB73A9FF88720F10C619F9A997290DA31AE81E764
                            APIs
                            • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00C7461F
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00C74634
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: '
                            • API String ID: 3850602802-1997036262
                            • Opcode ID: 20046dff56681c2af71e38669c027cc411da4961aa77c482cd7802d6fdf871b4
                            • Instruction ID: f747621990920651eae308dbdf39d83d2dbe719ae5dc66ec68331c48582a0b4c
                            • Opcode Fuzzy Hash: 20046dff56681c2af71e38669c027cc411da4961aa77c482cd7802d6fdf871b4
                            • Instruction Fuzzy Hash: 39313874A0020A9FDB18CFA9C991BDA7BB5FF09300F14806AE918AB351D770EA41CF90
                            APIs
                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00C7327C
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C73287
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: Combobox
                            • API String ID: 3850602802-2096851135
                            • Opcode ID: 98da8161a47b1ab86e5013a6b3f2d1144f59a32a5c57e9e0366cdce1bf585bc1
                            • Instruction ID: ce6bc76fd8258dbf87c02d7f0d104e4de926e4123299274c1148592db0a657ef
                            • Opcode Fuzzy Hash: 98da8161a47b1ab86e5013a6b3f2d1144f59a32a5c57e9e0366cdce1bf585bc1
                            • Instruction Fuzzy Hash: FB11B6713001497FEF159E54DC84FBB3B6AEB583A4F108128F92C97292D6319E519760
                            APIs
                              • Part of subcall function 00BE600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00BE604C
                              • Part of subcall function 00BE600E: GetStockObject.GDI32(00000011), ref: 00BE6060
                              • Part of subcall function 00BE600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BE606A
                            • GetWindowRect.USER32(00000000,?), ref: 00C7377A
                            • GetSysColor.USER32(00000012), ref: 00C73794
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                            • String ID: static
                            • API String ID: 1983116058-2160076837
                            • Opcode ID: f29af8d8a2a89ea7940cddbb2c6f832e9f7be632b63021c5a1b3a86db6934717
                            • Instruction ID: e8e5d31291bed66385bbf2d1c03cd451f89aac175ba02cec23e7bbb983182c08
                            • Opcode Fuzzy Hash: f29af8d8a2a89ea7940cddbb2c6f832e9f7be632b63021c5a1b3a86db6934717
                            • Instruction Fuzzy Hash: BB1129B261020AAFDB00DFB8CD85EEE7BB8FB08354F018918F969E2250D735E9519B50
                            APIs
                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00C5CD7D
                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00C5CDA6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Internet$OpenOption
                            • String ID: <local>
                            • API String ID: 942729171-4266983199
                            • Opcode ID: d4b7cd31f648cf9db4c6882ed6f6738b24dafdd465d4d252085f6548a820c3e3
                            • Instruction ID: 128ba4308312f3f73ac45159a6be9603596f8704b790ba5cffc9e4f791138d6f
                            • Opcode Fuzzy Hash: d4b7cd31f648cf9db4c6882ed6f6738b24dafdd465d4d252085f6548a820c3e3
                            • Instruction Fuzzy Hash: 9A11A3792057367ED7284B668CC5FE7BEB8EB127A5F00422AF919C2080D6609998D6F4
                            APIs
                            • GetWindowTextLengthW.USER32(00000000), ref: 00C734AB
                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00C734BA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: LengthMessageSendTextWindow
                            • String ID: edit
                            • API String ID: 2978978980-2167791130
                            • Opcode ID: 197d2609bae3371d83f0a874dcd2c15769ee89f3b36ffb4eb34227613c5a26d1
                            • Instruction ID: 6023c0038ef44ff1253cc7063b25c4a97575b217fd4f4fa4f1bdaadd7650093f
                            • Opcode Fuzzy Hash: 197d2609bae3371d83f0a874dcd2c15769ee89f3b36ffb4eb34227613c5a26d1
                            • Instruction Fuzzy Hash: 4911BF71200148ABEB164E64DC84BAB3B6AEB14374F508724FA79931D0C732DE91AB50
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                            • CharUpperBuffW.USER32(?,?,?), ref: 00C46CB6
                            • _wcslen.LIBCMT ref: 00C46CC2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: STOP
                            • API String ID: 1256254125-2411985666
                            • Opcode ID: 1caff7ef80adc3b1cec74ee3ea9f4c49cb333bf8abb9dbf54dbe9c345f99f10f
                            • Instruction ID: 6dc85898278a9ff865e19b982f2708c516dbf02041216c5cd5be879711e9b5bb
                            • Opcode Fuzzy Hash: 1caff7ef80adc3b1cec74ee3ea9f4c49cb333bf8abb9dbf54dbe9c345f99f10f
                            • Instruction Fuzzy Hash: 5501C032A105278ACB20AFFEDCC09BF77F9FF627147500928E86296198EB31DE40C651
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C43CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C43CCA
                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00C41D4C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: 312ed86e94e3afc59a1b8be3e58638c44b7a442a9cc9c9349ed693767a24dad9
                            • Instruction ID: a270aada65aabe54d55134bc7e36f0c1b9f73f841c6250698610eca919c4fee8
                            • Opcode Fuzzy Hash: 312ed86e94e3afc59a1b8be3e58638c44b7a442a9cc9c9349ed693767a24dad9
                            • Instruction Fuzzy Hash: 9001D871A41215AB8B15FFA5CC51DFE77A8FB46390B140A19FC72573D1EB30594C8660
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C43CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C43CCA
                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00C41C46
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: c61a9ec783245aaeb47b8d61ca75285f53ac2685bf7a14d3e482c6cdee40fed4
                            • Instruction ID: 971ad51796eac13c33c6d8676418ce79222a7605aec0d2380d1de8138b7e2ccd
                            • Opcode Fuzzy Hash: c61a9ec783245aaeb47b8d61ca75285f53ac2685bf7a14d3e482c6cdee40fed4
                            • Instruction Fuzzy Hash: 0901A77568115967CB14FB91CD91AFF77E8AB52380F140019BC5667281EA209F4C96B1
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C43CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C43CCA
                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00C41CC8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: bf25f535854a25fe86eb8f19fbb7b7febe6674e245c4c6a3415fcac17e570552
                            • Instruction ID: f2eb340ccd64a38eefb36c4a4be6ed07dfffe2d706a0131ba0f7e2a6bcb91538
                            • Opcode Fuzzy Hash: bf25f535854a25fe86eb8f19fbb7b7febe6674e245c4c6a3415fcac17e570552
                            • Instruction Fuzzy Hash: 9C01D67169015967CB14FBA5CE81AFE77E8AB12380F580019BC4273281FA209F8CD671
                            APIs
                              • Part of subcall function 00BE9CB3: _wcslen.LIBCMT ref: 00BE9CBD
                              • Part of subcall function 00C43CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00C43CCA
                            • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00C41DD3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: a0e6509345eefbec47f71358e940b1402fbab1dbbf0d3248108ef61e71b67e8e
                            • Instruction ID: cb619febd808e54cee4bb0289f2249267688e4d3fb31847339d353f5c919f2e6
                            • Opcode Fuzzy Hash: a0e6509345eefbec47f71358e940b1402fbab1dbbf0d3248108ef61e71b67e8e
                            • Instruction Fuzzy Hash: 5CF0A4B1F5121567DB15F7A5CC92BFE77A8BB02390F580919BC62632C1EB605A4C8260
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: 3, 3, 16, 1
                            • API String ID: 176396367-3042988571
                            • Opcode ID: 8e99bf54cdb2714123404209552a80b11ddd034015c2bc03f9b90b06fb9cf723
                            • Instruction ID: 5f0bc55c41dfbfc391c99c332750036c401053e052e12653e4c348ff989dc9bd
                            • Opcode Fuzzy Hash: 8e99bf54cdb2714123404209552a80b11ddd034015c2bc03f9b90b06fb9cf723
                            • Instruction Fuzzy Hash: D0E02B4220522010D23512799CC5A7F568DDFC5B507101D3BFE81C22A6EE948E91E3A0
                            APIs
                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00C40B23
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Message
                            • String ID: AutoIt$Error allocating memory.
                            • API String ID: 2030045667-4017498283
                            • Opcode ID: 1af4756d196d5af4bd9f4978c1782048699bb5563a21249207bafa84445012dc
                            • Instruction ID: 17def4ef2e1d87eb08d66965705fd479b0c6737ba283981ff61cfbee678ab522
                            • Opcode Fuzzy Hash: 1af4756d196d5af4bd9f4978c1782048699bb5563a21249207bafa84445012dc
                            • Instruction Fuzzy Hash: 11E0D83228430A26D21436547C43F997BC49F05B65F10447EFB5C594C38AE1649046A9
                            APIs
                              • Part of subcall function 00BFF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00C00D71,?,?,?,00BE100A), ref: 00BFF7CE
                            • IsDebuggerPresent.KERNEL32(?,?,?,00BE100A), ref: 00C00D75
                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00BE100A), ref: 00C00D84
                            Strings
                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00C00D7F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                            • API String ID: 55579361-631824599
                            • Opcode ID: 4ea7b1e6a04a4fc0c669378b15698eba070628fefd3f1ada723f85a732ea57f6
                            • Instruction ID: 433ad7cdd989c985f5c124404aeeb582e943f8eab71377edcc4ac891155bd96c
                            • Opcode Fuzzy Hash: 4ea7b1e6a04a4fc0c669378b15698eba070628fefd3f1ada723f85a732ea57f6
                            • Instruction Fuzzy Hash: 96E092B02007428BD330AFB9E8483567BE0BF00740F01896DE49AC7692EBF4E584CBA1
                            APIs
                            • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00C5302F
                            • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00C53044
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: Temp$FileNamePath
                            • String ID: aut
                            • API String ID: 3285503233-3010740371
                            • Opcode ID: 65b0b80d368839094b786713b6dbe1ca5a96e7a9a885a887426c395431bf2428
                            • Instruction ID: 3b4abac032d65c42cc39de1cfb0c1f2ba1f88aaf2c0af547f0b2746c8dd22875
                            • Opcode Fuzzy Hash: 65b0b80d368839094b786713b6dbe1ca5a96e7a9a885a887426c395431bf2428
                            • Instruction Fuzzy Hash: C0D05EB250032967DB20A7A4AC4EFCB3A6CDB05750F0002A1B669E2092DAB49E84CBD0
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: LocalTime
                            • String ID: %.3d$X64
                            • API String ID: 481472006-1077770165
                            • Opcode ID: 1c86ad74fe65bc182f7e20cf97f91209889a99eb0d4a2d04cfb6bcef6a83388f
                            • Instruction ID: f1ae9f8b66fb74b204dacc163fb01888bbd72a46b193df453f3967abc1779121
                            • Opcode Fuzzy Hash: 1c86ad74fe65bc182f7e20cf97f91209889a99eb0d4a2d04cfb6bcef6a83388f
                            • Instruction Fuzzy Hash: 52D012A1819109E9CB9096E1EC859BBB3BCBB08301F6084A2F907D2041D635C9586B61
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C7236C
                            • PostMessageW.USER32(00000000), ref: 00C72373
                              • Part of subcall function 00C4E97B: Sleep.KERNEL32 ref: 00C4E9F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: 467bb938c448cd4bf03b63ab7a3a6819c2beb718d23bde9e67b4c204d472de86
                            • Instruction ID: 0427e3e46c4a6f69bf612512923a63f11ff3b9795c7a40047d0088e65e961fd2
                            • Opcode Fuzzy Hash: 467bb938c448cd4bf03b63ab7a3a6819c2beb718d23bde9e67b4c204d472de86
                            • Instruction Fuzzy Hash: AFD012327D5311BBE7A4B771EC8FFCA7A18AB15B14F01491AB749EA1D0C9F0B881CA54
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C7232C
                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00C7233F
                              • Part of subcall function 00C4E97B: Sleep.KERNEL32 ref: 00C4E9F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: 1975d0dd01d6d62883cfaed66cf05867cb03b8607c9f84723d822fc36dffa970
                            • Instruction ID: 010e1554d40dfa0acc9bdb22c730637c602a258399aee1dc044b4b18e02eb558
                            • Opcode Fuzzy Hash: 1975d0dd01d6d62883cfaed66cf05867cb03b8607c9f84723d822fc36dffa970
                            • Instruction Fuzzy Hash: A8D01236794311B7E7A4B771EC8FFCA7A18AB10B14F01491AB749EA1D0C9F0A881CA54
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00C1BE93
                            • GetLastError.KERNEL32 ref: 00C1BEA1
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C1BEFC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1662250738.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                            • Associated: 00000000.00000002.1662237411.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000C7C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662294262.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662329785.0000000000CAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1662345565.0000000000CB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_be0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast
                            • String ID:
                            • API String ID: 1717984340-0
                            • Opcode ID: 72146adacb8a9aa8bba8dc5d877b86fc328a7dd0a8519b2563da3c4af11a52d0
                            • Instruction ID: 056c6f095578f4cf14e5289b7b2e5bb65049e1b7e807f6e5bd4336f1e7d9077f
                            • Opcode Fuzzy Hash: 72146adacb8a9aa8bba8dc5d877b86fc328a7dd0a8519b2563da3c4af11a52d0
                            • Instruction Fuzzy Hash: 2141A638604206EFCF219FA5CD44BEA7BA59F43310F144169F969571E1DB308E82EF60